Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
48 commits
Select commit Hold shift + click to select a range
b49d07f
Updated to latest package Microsoft.Skype.Bots.Media and fixed build …
BalajiUmmadisetti Aug 13, 2024
0da18fb
AudioVideoPlaybackBot config changes for extended service
BalajiUmmadisetti Aug 23, 2024
bdf0194
Merge branch 'master' into v-balajium/AudioVidepBotExtendedserviceCha…
BalajiUmmadisetti Aug 23, 2024
3bdec24
config changes
BalajiUmmadisetti Aug 23, 2024
233dbee
Updated Readme
BalajiUmmadisetti Aug 23, 2024
60540af
resolved pr comments
BalajiUmmadisetti Aug 28, 2024
9410b9a
updated discription in config files
BalajiUmmadisetti Aug 28, 2024
500e671
testing changes -- needs to revert
BalajiUmmadisetti Sep 20, 2024
f59c781
AudioVideoPlaybackBot package updates and fire wall readme update
BalajiUmmadisetti Sep 25, 2024
cc0f866
add screenshot
v-shazilms Sep 30, 2024
7b00c84
readme update
BalajiUmmadisetti Sep 30, 2024
18a4aac
Merge branch 'v-balajium/AudioVidepBotExtendedserviceChanges' of http…
BalajiUmmadisetti Sep 30, 2024
71650d3
Images update
BalajiUmmadisetti Sep 30, 2024
58c4d3f
alligment changes for readme file
v-shazilms Oct 10, 2024
6322df4
undo the commit
v-shazilms Oct 10, 2024
ff029bf
correcting the allignment for readme file
v-shazilms Oct 10, 2024
09599ec
made few more changes
v-shazilms Oct 10, 2024
54a84ef
made changes
v-shazilms Oct 10, 2024
36438fd
made one change
v-shazilms Oct 10, 2024
b70957d
few more chnages
v-shazilms Oct 10, 2024
95bf7ed
made mroe changes
v-shazilms Oct 10, 2024
75abb92
made changes
v-shazilms Oct 10, 2024
1069118
made few more changes
v-shazilms Oct 10, 2024
8f79220
made changes to other readme file
v-shazilms Oct 10, 2024
5ea0ebe
made allignment changes in avb readme
v-shazilms Oct 10, 2024
b9063a4
Read me format
BalajiUmmadisetti Oct 10, 2024
0bc55f9
spacing fix
BalajiUmmadisetti Oct 10, 2024
ddb8399
correcttion work
v-shazilms Oct 10, 2024
cceedbf
made some correction
v-shazilms Oct 10, 2024
5819f72
correction work
v-shazilms Oct 10, 2024
826d639
made some corrections
v-shazilms Oct 11, 2024
543a965
made chanegs
v-shazilms Oct 11, 2024
5388050
worked on pr comments
v-shazilms Oct 11, 2024
cf338b9
take latest from main
BalajiUmmadisetti Oct 11, 2024
5b1653c
Merge branch 'v-balajium/AudioVidepBotExtendedserviceChanges' of http…
BalajiUmmadisetti Oct 11, 2024
76d6eab
made correction
v-shazilms Oct 11, 2024
8b1cfd2
Merge branch 'v-balajium/AudioVidepBotExtendedserviceChanges' of http…
v-shazilms Oct 11, 2024
9e591e5
Numbering format
BalajiUmmadisetti Oct 11, 2024
03a2eda
Numbering format
BalajiUmmadisetti Oct 11, 2024
1141611
Format
BalajiUmmadisetti Oct 11, 2024
b5d74a2
formats changes
v-shazilms Oct 11, 2024
40733ac
firewall readme format chanegs
v-shazilms Oct 11, 2024
f7e457f
Formating changes
BalajiUmmadisetti Oct 16, 2024
102228b
Formatting chnages
BalajiUmmadisetti Oct 16, 2024
81fcefa
Formatting changes
BalajiUmmadisetti Oct 16, 2024
c1880c0
Formating changes
BalajiUmmadisetti Oct 16, 2024
a17f7f0
Formating changes
BalajiUmmadisetti Oct 16, 2024
70d4217
changed controlListenUris string to uris
BalajiUmmadisetti Oct 16, 2024
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -3,42 +3,175 @@

## Step 1: Create a Virtual Network and Subnet for Azure Firewall

1. Go to Virtual Network or create a new one if it doesn't exist.
2. Create a subnet for the firewall with the purpose set to "Azure Firewall". ![Create subnet](Images/CreateSubnet.png)
3. Go to the firewall section and click on "Add firewall". ![Create firewall](Images/CreateFirewall.png)
1. Go to Virtual Network or create a new one if it doesn't exist.
2. Create a subnet for the firewall with the purpose set to "Azure Firewall". ![Create subnet](Images/CreateSubnet.png)
3. Go to the firewall section and click on "Add firewall". ![Create firewall](Images/CreateFirewall.png)

## Step 2: Configure Firewall Settings

1. Choose a name for the firewall (e.g., "MyFirewall").
2. Create a new firewall policy. ![Create policy](Images/CreatePolicy.png)
3. Select the existing Virtual Network.
4. Create a new public IP address (e.g., "MyFWPublicIP").
5. Review and create the firewall.
1. Choose a name for the firewall (e.g., "MyFirewall").
2. Create a new firewall policy. ![Create policy](Images/CreatePolicy.png)
3. Select the existing Virtual Network.
4. Create a new public IP address (e.g., "MyFWPublicIP").
5. Review and create the firewall.

## Step 3: Configure Firewall Policy

1. Open the firewall policy created in Step 2.
2. Navigate to Settings.

### Configure Application Rules (Ingress)

1. Add an application rule:
* Give a descriptive name.
* Select "Application rule collection" as the rule type.
* Assign the lowest number as the priority.
* Specify a name for the rule.
* Define the source (e.g., your VM subnet) or use `*` to allow all IP addresses.
* Allow specific domains (e.g., `policyrecordingbot.eastus.cloudapp.azure.com`).
* Save the rule.

### Configure Network Rules (Egress)

1. Add a network rule:
* Give a descriptive name.
* Select "Network rule collection" as the rule type.
* Assign the lowest number as the priority.
* Specify a name for the rule.
* Define the source (e.g., your VM subnet) or use `*` to allow all IP addresses.
* Specify external IPs or ranges (e.g., `0.0.0.0/0` for all).
* Specify allowed protocols and ports.(TCP: 5060, 5061 ,UDP: 10000-20000)
* Save the rule.
1. Open the firewall policy created in Step 2.
2. Navigate to Settings.

## Step 4: Configure Application Rules (Ingress)

Add an application rule:
a. Give a descriptive name.
b. Select "Application rule collection" as the rule type.
c. Assign the lowest number as the priority.
d. Specify a name for the rule.
e. Define the source (e.g., your VM subnet) or use `*` to allow all IP addresses.
f. Allow specific domains (e.g., `policyrecordingbot.eastus.cloudapp.azure.com`).
g. Save the rule.

## Step 5: Configure Network Rules (Egress)

Add a network rule:
a. Give a descriptive name.
b. Select "Network rule collection" as the rule type.
c. Assign the lowest number as the priority.
d. Specify a name for the rule.
e. Define the source (e.g., your VM subnet) or use `*` to allow all IP addresses.
f. Specific external IPs or ranges (e.g., 192.168.1.0/24 for a subnet) instead of using 0.0.0.0/0 for all. This ensures that only trusted sources can access your service. If you want to allow access from all IPs, you can configure it as 0.0.0.0/0.
g. Specify only particular protocols and ports you want to allow. For example, you may configure TCP ports like 9444, 8445, 9442, 443, and port ranges like 10100-10199 and 20100-20199. If you want to restrict access to everything else, you should mention specific configurations like below:
Allowed TCP ports: 9444, 8445, 9442, 443, 9441, 10100-10199, 20100-20199.
All other ports and protocols will be restricted.
h. Save the rule.

## Step 6: Firewall Configuration Summary

1. Specify External IPs or Ranges
Allow only specific external IPs or ranges (e.g., 192.168.1.0/24 for a subnet) instead of using 0.0.0.0/0 for all. This ensures that only trusted sources can access your service. If you want to allow access from all IPs, you can configure it as 0.0.0.0/0.

Example:
To allow access from a specific subnet:
Allow: 192.168.1.0/24

To allow access from all IPs:
Allow: 0.0.0.0/0

2. Specify Allowed Protocols and Ports
You can specify only particular protocols and ports you want to allow. For example, configure the following:
Allowed TCP Ports: 9444 (SignalingPort)
8445 (MediaPort)
9442 (TcpForwardingPort)
443 (DefaultEndpoint)
9441 (localPort)
10100-10199 (InstanceCallControlEndpoint)
20100-20199 (InstanceMediaControlEndpoint)

* All other ports and protocols will be restricted.

Example of Ingress Allow Rules:

a. Allow TCP Port 9444:
Rule Name: Allow SignalingPort
Action: Allow
Protocol: TCP
Port: 9444

b. Allow TCP Port 8445:
Rule Name: Allow MediaPort
Action: Allow
Protocol: TCP
Port: 8445

c. Allow TCP Port 9442:
Rule Name: Allow TcpForwardingPort
Action: Allow
Protocol: TCP
Port: 9442

d. Allow TCP Port 443:
Rule Name: Allow DefaultEndpoint
Action: Allow
Protocol: TCP
Port: 443

e. Allow TCP Port 9441:
Rule Name: Allow LocalPort
Action: Allow
Protocol: TCP
Port: 9441

f. Allow TCP Port Range 10100-10199:
Rule Name: Allow InstanceCallControlEndpoint
Action: Allow
Protocol: TCP
Port Range: 10100-10199

g. Allow TCP Port Range 20100-20199:
Rule Name: Allow InstanceMediaControlEndpoint
Action: Allow
Protocol: TCP
Port Range: 20100-20199

3. Restrict All Other Ingress Ports and Protocols:
After creating the allow rules, add a rule to deny all other traffic. This ensures that any port or protocol not explicitly allowed is blocked.

Example of Deny Rule:
Deny All Other Ingress Traffic:
Rule Name: Deny All Other Ingress Traffic
Action: Deny
Protocol: Any
Port: Any

Example of Egress Allow Rules
a. Allow TCP Port 9444:
Rule Name: Allow Egress SignalingPort
Action: Allow
Protocol: TCP
Port: 9444

b. Allow TCP Port 8445:
Rule Name: Allow Egress MediaPort
Action: Allow
Protocol: TCP
Port: 8445

c. Allow TCP Port 9442:
Rule Name: Allow Egress TcpForwardingPort
Action: Allow
Protocol: TCP
Port: 9442

d. Allow TCP Port 443:
Rule Name: Allow Egress DefaultEndpoint
Action: Allow
Protocol: TCP
Port: 443

e. Allow TCP Port 9441:
Rule Name: Allow Egress LocalPort
Action: Allow
Protocol: TCP
Port: 9441

f. Allow TCP Port Range 10100-10199:
Rule Name: Allow Egress InstanceCallControlEndpoint
Action: Allow
Protocol: TCP
Port Range: 10100-10199

g. Allow TCP Port Range 20100-20199:
Rule Name: Allow Egress InstanceMediaControlEndpoint
Action: Allow
Protocol: TCP
Port Range: 20100-20199

4. Restrict All Other Egress Ports and Protocols
* Similarly, add a rule to deny all other egress traffic.

Example of Deny Rule:
Deny All Other Egress Traffic:
Rule Name: Deny All Other Egress Traffic
Action: Deny
Protocol: Any
Port: Any
Loading