Microsoft.Network loadBalancers/inboundNatRules 2019-11-01

Template format

To create a Microsoft.Network/loadBalancers/inboundNatRules resource, add the following JSON to the resources section of your template.

{
  "name": "string",
  "type": "Microsoft.Network/loadBalancers/inboundNatRules",
  "apiVersion": "2019-11-01",
  "properties": {
    "frontendIPConfiguration": {
      "id": "string"
    },
    "protocol": "string",
    "frontendPort": "integer",
    "backendPort": "integer",
    "idleTimeoutInMinutes": "integer",
    "enableFloatingIP": "boolean",
    "enableTcpReset": "boolean"
  }
}

Property values

The following tables describe the values you need to set in the schema.

Microsoft.Network/loadBalancers/inboundNatRules object

Name Type Required Value
name string Yes The name of the inbound nat rule.
type enum Yes inboundNatRules
-or-
Microsoft.Network/loadBalancers/inboundNatRules

See Set name and type for child resources.
apiVersion enum Yes 2019-11-01
properties object Yes Properties of load balancer inbound nat rule. - InboundNatRulePropertiesFormat object

InboundNatRulePropertiesFormat object

Name Type Required Value
frontendIPConfiguration object No A reference to frontend IP addresses. - SubResource object
protocol enum No The reference to the transport protocol used by the load balancing rule. - Udp, Tcp, All
frontendPort integer No The port for the external endpoint. Port numbers for each rule must be unique within the Load Balancer. Acceptable values range from 1 to 65534.
backendPort integer No The port used for the internal endpoint. Acceptable values range from 1 to 65535.
idleTimeoutInMinutes integer No The timeout for the TCP idle connection. The value can be set between 4 and 30 minutes. The default value is 4 minutes. This element is only used when the protocol is set to TCP.
enableFloatingIP boolean No Configures a virtual machine's endpoint for the floating IP capability required to configure a SQL AlwaysOn Availability Group. This setting is required when using the SQL AlwaysOn Availability Groups in SQL server. This setting can't be changed after you create the endpoint.
enableTcpReset boolean No Receive bidirectional TCP Reset on TCP flow idle timeout or unexpected connection termination. This element is only used when the protocol is set to TCP.

SubResource object

Name Type Required Value
id string No Resource ID.

Quickstart templates

The following quickstart templates deploy this resource type.

Template Description
Azure Container Service Engine (acs-engine) - Swarm Mode

Deploy to Azure
The Azure Container Service Engine (acs-engine) generates ARM (Azure Resource Manager) templates for Docker enabled clusters on Microsoft Azure with your choice of DC/OS, Kubernetes, Swarm Mode, or Swarm orchestrators. The input to the tool is a cluster definition. The cluster definition is very similar to (in many cases the same as) the ARM template syntax used to deploy a Microsoft Azure Container Service cluster.
2 VMs in a Load Balancer and configure NAT rules on the LB

Deploy to Azure
This template allows you to create 2 Virtual Machines in an Availability Set and configure NAT rules through the load balancer. This template also deploys a Storage Account, Virtual Network, Public IP address and Network Interfaces. In this template, we use the resource loops capability to create the network interfaces and virtual machines
VMs in Availability Zones with a Load Balancer and NAT

Deploy to Azure
This template allows you to create Virtual Machines distributed across Availability Zones with a Load Balancer and configure NAT rules through the load balancer. This template also deploys a Virtual Network, Public IP address and Network Interfaces. In this template, we use the resource loops capability to create the network interfaces and virtual machines
Barracuda Web Application Firewall with Backend IIS Servers

Deploy to Azure
This Azure quickstart template deploys a Barracuda Web Application Firewall Solution on Azure with required number of backend Windows 2012 based IIS Web Servers.Templates includes latest Barracuda WAF with Pay as you go license and latest Windows 2012 R2 Azure Image for IIS.The Barracuda Web Application Firewall inspects inbound web traffic and blocks SQL injections, Cross-Site Scripting, malware uploads & application DDoS and other attacks targeted at your web applications. One External LB is deployed with NAT rules to enable Remote desktop access to backend web servers. Please follow post deployment configuration guide available in GitHub template directory to learn more about post deployment steps related to Barracuda web application firewall and web applications publishing.
Docker Swarm Cluster

Deploy to Azure
This template creates a high-availability Docker Swarm cluster
GlassFish on SUSE

Deploy to Azure
This template deploys a load balanced GlassFish (v3 or v4) cluster, consisting of a user defined number of SUSE (OpenSUSE or SLES) VMs.
KEMP LoadMaster HA Pair

Deploy to Azure
This template deploys a KEMP LoadMaster HA Pair
Deploy Open edX Dogwood (Multi-VM).

Deploy to Azure
This template creates a network of Ubuntu VMs, and deploys Open edX Dogwood on them. Deployment supports 1-9 application VMs and backend Mongo and MySQL VMs.
Puppet Enterprise on Azure with RHEL & Windows Nodes

Deploy to Azure
This quickstart template deploys a Puppet Enterprise Solution on Azure Virtual Machine running Ubuntu 14.04 with pre-configured puppet agents running RHEL 7.2 and Windows Server 2016. Template will build everything starting from Azure Infrastructure components to Puppet Master & multiple Windows and RHEL puppet Agents installation, configuration etc. To start with, this template will deploy one Puppet Master server vm and multiple RHEL and Windows Agents as specified during deployment.