Adjusting firewall configuration

Consideration

You can associate a custom application security group (ASG) or a custom network security group (NSG) with the temporary virtual machine that HYCU for Azure creates for data protection purposes. For instructions on how to do this, contact HYCU Customer Support.

Procedure

If you have Azure Firewall configured, you must adjust the firewall rules and open the required ports for HYCU for Azure to operate properly and protect your data:

Purpose Protocol Destination Port
Access to Azure Service Bus TCP hycu-dpaas-sb-prod.servicebus.windows.net 5671
Authorization TCP login.microsoftonline.com 443
Compute/networking TCP management.azure.com 443
Access to storage accountsa TCP

<StorageAccountName>.blob.core.windows.net

i Important  Using the Azure Storage service tag is recommended.

443

a If you are not using the Storage service tag, keep in mind the following:

  • You must open access to all storage accounts that you use when backing up data, creating copies of backup data, and archiving data.

  • Restoring individual files cannot be performed because a temporary storage account is created during the restore.

  • You must open access to the HYCU log storage account. To obtain the storage account name that is used for HYCU logs, contact HYCU Customer Support.

i Important  Only if a custom firewall rule is applied. Traffic to the *.azure.com, *.core.windows.net, *.servicebus.windows.net, and *.microsoftonline.com endpoints must be allowed.

If you employ HYCU Protégé in your environment, make sure to additionally adjust firewall configuration as follows:

Purpose Protocol Source Destination Port
HYCU Protégéa TCP HYCU backup controller IP address or host name Firewall IP address 443
Firewall IP address HYCU backup controller IP address or host name

a The HYCU backup controller must have access to all storage accounts that are used when migrating data to and from Azure.