Hi @Tim Negele,
Thanks for contacting Microsoft Q&A platform.
Below are some possible reasons for this behavior, please check and let us know.
- Ensure that the NSG associated with your pfSense firewall allows inbound traffic on ports 22 (SSH) and 443 (HTTPS). Verify that the NSG rules are correctly configured and applied to the network interface of the firewall VM.
- Double-check the configuration of pfSense to ensure that it is properly configured to accept SSH and HTTPS traffic. Verify that the firewall rules allow incoming connections on ports 22 and 443.
- Verify that the pfSense virtual machine is running and has the correct network configuration. Ensure that it has a valid IP address assigned and that the network interface is attached to the correct virtual network.
- Check the subnet and virtual network configuration to ensure that the pfSense firewall VM is deployed in the correct subnet and virtual network. Ensure that the subnet allows inbound and outbound traffic as necessary.
- Enable NSG flow logs to monitor traffic and check if the traffic is being blocked by NSG rules. Review the logs to identify any denied traffic and adjust NSG rules accordingly.
- Verify that there are no Azure-specific networking issues, such as route table misconfigurations or network connectivity problems within the Azure environment. Check the Azure portal for any service health advisories or incidents related to networking.
- If possible, try to connect to the pfSense firewall VM from another VM within the same virtual network to see if the issue is specific to external connectivity or affects internal communication as well.
Hope this helps you.