Azure NSG VirtualNetwork ServiceTag is allowing External IP addresses

Apurva Pathak 755 Reputation points
2025-05-23T11:38:55.41+00:00

Hi folks,

I'm facing a weird scenario while testing an Azure NSG rule for an external IP.

I have an NSG with an outbound rule to allow traffic from VirtualNetwork to VirtualNetwork on Any port, Any protocol.

However, for some godly reasons, this rule appears to be allowing public IP connections. I validated this with Network Watcher NSG Diagnostics as well Connection Troubleshoot, both show the same results.

I even, tried running a traceroute from the OS, of the VM to which this NSG is applied to, and the traffic crossed the NGS.

Could anyone please help me understand this behavior. Is it an issue with NSG which I shall report to MS or am I missing something here.

PS: this IP is of m.facebook.com and certainly not hosted with us.

Name:    star-mini.c10r.facebook.com

Addresses:  2a03:2880:f158:181:face:b00c:0:25de          

157.240.214.35

Aliases:  m.facebook.com

PFB snips of NSG rule and the test results.

NSG Rule:{564F72E9-9CB1-4524-BACC-5D5572972BC1} Diagnostics results:User's image

Thanks!

Azure Network Watcher
Azure Network Watcher
An Azure service that is used to monitor, diagnose, and gain insights into network performance and health.
{count} votes

Accepted answer
  1. Sindhuja Dasari 1,520 Reputation points Microsoft External Staff Moderator
    2025-05-26T09:08:06.2733333+00:00

    Hello Apurva Pathak

    Thanks for your response.

    Yes, we do have a plan to introduce customer service tags aka IP groups, but this is still in design so no timelines to share yet.

    Just summarizing our private message conversation here for community benefit.:

    Since you are routing all the VM traffic from the spoke VNet to the Hub VNet where the virtual appliance is located, the traffic will traverse from the source VNet to the destination VNet via VNet peering. Therefore, the NSG outbound rules prioritize VNet-to-VNet traffic, allowing traffic from the source VM to the destination firewall as next hop.

    When you add a UDR on your Spoke Subnets to use Azure Firewall for default outbound (0.0.0.0/0 -> Azure Firewall IP), the VirtualNetwork service tag on the NSG attached to the Spoke Subnets gets 0.0.0.0/0 prefix value.

    Refer https://learn.microsoft.com/en-us/answers/questions/1279843/issue-with-virtualnetwork-service-tag-when-using-u


    Please don’t forget to close the thread by clicking "Accept the answer" and "Yes" wherever the information provided helps you, as this can be beneficial to other community members.

    1 person found this answer helpful.
    0 comments No comments

0 additional answers

Sort by: Most helpful

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.