Configuration Limitations
-
The following configurations are not supported to deploy Secure Web Appliance on Azure Marketplace:
-
Layer4 traffic monitor
-
Web traffic tap
-
-
You can create multiple interfaces in the Secure Web Virtual Appliance using the Microsoft Azure CLI only.
-
From the Azure user interface, Secure Web Appliance instance can be configured with only one interface.
Additional Information
-
Azure instance of Secure Web Appliance does not have WAAgent support that is required to report the health status of the instance to the Azure infrastructure. Though Azure reports deployment failure (timeout) for Secure Web Appliance, the instance will be provisioned successfully. Select Boot diagnostics to check the current status of the virtual machine.
-
Inbound rules are the set of rules which specify whether to allow or deny specific traffic incoming to the virtual machine.
To change the inbound rules (access to Secure Web Appliance):
-
Select the desired VM instance under Virtual Machines.
-
Select the Networking option.
Now, you can view the inbound rules getting listed against the management interface.
Note
Do not delete the inbuilt three security rules that already exist.
The three default inbound rules are Azure specific services like virtual network, loadbalancer, and the service that makes all the inbound traffic block by default except the allowed ones.
-
-
If instances are rebooted in Azure, dynamically allotted Public IPs may get changed. See https://www.linkedin.com/pulse/how-remote-desktop-centos-virtual-machine-running-azure-cretu
-
Although Azure user interface supports deployment of Secure Web Appliance with a single interface, you can deploy instances with multiple interfaces using the Azure CLI.
For deploying Azure instances with more than one interface, see Deploy Secure Web Appliance on Azure Environment using CLI.