Azure Local | HomeLab setup – ARC Gateway

AzureLocalHomeLab
Reading Time: 7 minutes

Azure Arc Gateway is a managed component that funnels Azure Connected Machine and Arc agent traffic through a centralized gateway, so on‑premises or edge machines only need to reach a small set of public endpoints rather than many Azure services directly. It’s designed for environments with strict egress controls, TLS inspection, or corporate proxies and helps organizations onboard large fleets without opening broad outbound access.

Image

What Azure Arc Gateway does (functionality and benefits)

Azure Arc Gateway provides a consolidated egress channel for Azure Arc‑enabled servers and Kubernetes, meaning individual on‑premises or edge machines do not need direct access to the full set of Azure management endpoints. By routing agent traffic through the gateway, organizations can reduce firewall rule sprawl and limit public network access to a small number of fully qualified domain names rather than dozens of service endpoints, which greatly eases onboarding in locked‑down networks and corporate DMZs. The gateway also centralizes telemetry and control plane traffic, enabling auditing and visibility of what the Connected Machine agent sends to Azure; this helps with compliance, troubleshooting, and incident response because traffic can be logged and inspected at a single choke point.

Because all communication remains outbound initiated and TLS encrypted, the gateway preserves a low attack surface: Azure does not open inbound connections to your hosts and agents validate certificates when connecting to Azure through the gateway. The feature is explicitly designed to work with enterprise proxies and TLS inspection scenarios; you can configure agents or network proxy rules so gateway domains are routed appropriately, which simplifies proxy authentication and certificate handling across large fleets. Operationally, the gateway becomes a critical piece of infrastructure, so teams should plan for monitoring, high availability, and testing of any Arc extensions that might still require additional endpoints beyond the gateway.

In practice, adopting Azure Arc Gateway is most valuable when you manage many Arc resources behind strict egress controls, need a single auditable egress path for compliance, or want to minimize the number of public endpoints your security team must approve. It reduces operational overhead, improves visibility into agent traffic, and aligns Arc connectivity with enterprise proxy and TLS inspection policies, while still keeping the security posture of outbound‑only, encrypted communications

  • Centralized egress proxy for Arc agents. Instead of each agent reaching many Azure endpoints, the gateway funnels agent traffic through a managed path so you only need to allow a small set of fully qualified domain names (FQDNs) outbound.
  • Reduces network complexity. Microsoft documents that using the Arc Gateway can reduce the number of required public endpoints to seven FQDNs for Arc‑enabled servers, simplifying firewall and proxy configuration.
  • Auditing and visibility. Gateway lets you view and audit the traffic that the Azure Connected Machine agent sends to Azure, which helps compliance and troubleshooting.
  • Works with enterprise proxies. You can configure agents to use a corporate proxy that routes via the gateway, easing onboarding in locked‑down environments.
  • Outbound‑only model and TLS. All agent communication is outbound and encrypted with TLS; Azure never initiates inbound connections to your machines

Firewall / proxy specifics — what to open and why

Allow outbound HTTPS (TCP 443) from your Arc hosts to the Azure Arc Gateway FQDNs and ensure DNS resolution for those names, because agent communication is TLS‑encrypted and initiated outbound only. Prefer allowing by FQDN rather than by IP because Azure IP ranges change. If you use a corporate proxy that performs TLS inspection, either bypass inspection for the gateway domains or import the proxy’s signing CA into the hosts’ trust store so the agent can validate certificates; otherwise TLS validation will fail. Configure proxy authentication at the system level (WinHTTP on Windows, environment variables or system proxy on Linux) so the Connected Machine agent can authenticate and route traffic. Allow DNS (UDP/TCP 53) to your DNS servers and enable logging on the proxy/firewall to monitor agent traffic. Before enforcing deny rules, test from representative hosts by resolving the gateway FQDNs and making an HTTPS request to confirm DNS, proxy auth, and TLS behavior.

To summaries:

  • Allow outbound TCP 443 (HTTPS) to the Arc Gateway FQDNs. When Gateway is used, open outbound HTTPS to the gateway FQDNs (the seven public names the gateway exposes) rather than a long list of Azure endpoints.
  • DNS resolution must be allowed. Firewalls must permit DNS lookups for those FQDNs so agents can resolve the gateway addresses.
  • Proxy authentication and TLS inspection: If your proxy performs TLS inspection (MITM), either configure the proxy to bypass inspection for Arc agent/gateway traffic or ensure the proxy trusts the certificates used by the agent/gateway; otherwise agent TLS validation will fail.
  • Do not rely on IP allowlists. Azure uses dynamic IP ranges; Microsoft recommends allowing by FQDN and not by IP where possible.
  • Extensions and add‑ons: Some Arc extensions or management solutions require additional endpoints; review extension docs and open those endpoints as needed.
  • Logging and audit: Enable logging on the gateway/proxy so you can audit agent traffic and detect anomalies—this is one of the gateway’s benefits
AttributeDirect AgentArc Gateway
Number of public endpointsMany Azure endpoints; higher complexityReduced to ~7 FQDNs
Firewall RulesBroad; many FQDNs/IPsSmall set of outbound FQDNs
Proxy SupportWorks but complexDesigned to integrate with enterprise proxies
Audit / VisibilityLimited per‑agent logsCentralized auditing of agent traffic
Recommended whenSmall environments or permissive egressLarge fleets, strict egress, compliance needs

Ready‑to‑apply firewall rule checklist

Essentials to allow

  • Ports: TCP 443 outbound from Arc‑enabled machines to the Arc Gateway FQDNs.
  • DNS: Allow DNS resolution for the gateway FQDNs (UDP/TCP 53 to your DNS servers).
  • Protocol: HTTPS/TLS (do not terminate or re‑sign unless proxy is trusted).
  • Direction: Outbound only; Azure does not initiate inbound connections to your hosts. .

FQDNs to allow

  • Primary: the Azure Arc Gateway FQDNs created when you provision the gateway (the gateway exposes ~seven public FQDNs for Arc agents). Replace placeholders below with the exact FQDNs shown in your Azure portal:
    • arc-gateway-<region>.azure-arc.microsoft.com ; *.arc-gateway.<tenant>.azure.com ; (use the exact names from your gateway resource). Do not rely on static IPs — use FQDN allowlists. .

Firewall rules (example, vendor‑agnostic)

Rule 1 (Allow): Source = Arc subnet or host IPs; Destination = gateway FQDNs; Protocol = TCP; Port = 443; Action = Allow.

Rule 2 (Allow DNS): Source = Arc hosts; Destination = DNS servers; Protocol = UDP/TCP; Port = 53; Action = Allow.

Rule 3 (Deny other outbound Azure endpoints): Source = Arc hosts; Destination = Azure management endpoints; Action = Deny (only after validating gateway works and extensions tested).

Proxy exceptions and TLS inspection

If your proxy performs TLS inspection, either exempt the Azure Arc Gateway domains from interception or ensure the proxy’s signing CA is installed and trusted on every Arc host so the agent can validate re‑signed certificates; otherwise TLS handshakes will fail. Configure system‑level proxy settings (WinHTTP on Windows, environment variables or system proxy on Linux) so the Connected Machine agent can authenticate and route through the corporate proxy, and use a PAC file to send gateway FQDNs directly while routing other traffic via the proxy. Allow DNS resolution for gateway names and enable proxy/firewall logging to monitor agent connections. Validate by resolving gateway FQDNs and performing an HTTPS request from representative hosts before enforcing deny rules.

  • Bypass TLS inspection for gateway FQDNs where possible. If TLS inspection is mandatory, import and trust the proxy’s CA on Arc hosts and ensure the proxy does not break certificate pinning for agent traffic. If the proxy re‑signs TLS, the agent must trust the proxy CA or connections will fail.
  • Proxy auth: If your proxy requires authentication, configure the Connected Machine agent or host system proxy settings (WinHTTP / environment variables) so the agent can authenticate and route via the proxy to the gateway FQDNs

Azure ARC Gateway for Azure Local

The Azure Arc gateway for Azure Local (formerly Azure Stack HCI) streamlines deployments by reducing the number of outbound endpoints required for Azure-connected operations. Available for Azure Local versions 2506 and later, it introduces two main components: the Arc gateway resource, which serves as a unified entry point for Azure traffic, and the Arc proxy, a forward‑proxy service added to Arc agents on each machine.

When enabled during deployment, the gateway centralizes HTTPS traffic from Azure Local hosts, Azure Arc Resource Bridge, AKS clusters, and Azure Local VMs. Traffic not supported by the gateway is automatically routed through the enterprise proxy or firewall. HTTP traffic is never routed through the gateway and must be allowed directly.

Supported scenarios include enabling the gateway during new deployments and sharing a single gateway across Azure Local infrastructure and workloads (within the same subscription). It cannot be enabled after deployment. Some Azure endpoints—such as authentication, Key Vault, and certificate revocation list URLs—must still bypass the gateway and be explicitly allowed.

The gateway does not support TLS‑terminating proxies. Azure provides portal, CLI, and PowerShell methods to create, update, or delete the gateway resource, though creation may be delayed due to temporary Azure Front Door issues.

https://learn.microsoft.com/en-us/azure/azure-local/deploy/deployment-azure-arc-gateway-overview?view=azloc-2512&tabs=portal

Setup Azure ARC Gateway

Browse to https://portal.azure.com/#view/Microsoft_Azure_ArcCenterUX/ArcCenterMenuBlade/~/arcGateways and click Create

Image

Provide the correct information and click Create.

Connect ARC resource to ARC Gateway

Once the Arc Gateway is deployed, the next step is to associate your Azure Local resources with it so they can route all Arc‑related traffic through the gateway instead of reaching Azure directly. This association is what turns the gateway from “just another Arc‑enabled server” into the central relay point for your environment.

In Azure, the association is done at the resource level. Each Azure Local node, cluster resource, or Arc‑enabled server must be linked to the gateway so that the Connected Machine agent knows where to send its traffic. Without this step, the node will continue attempting to communicate with Azure endpoints directly, which defeats the purpose of using a gateway in the first place.

The association process is straightforward. In the Azure portal, navigate to the Arc Gateway resource and open the Associated Resources section. From there, you can add the machines or clusters that should use the gateway. When you select a resource, Azure updates its configuration so that all Arc agent communication—identity, telemetry, extension management, policy, and configuration—flows through the gateway. This effectively centralizes outbound connectivity and reduces the number of firewall rules you need to maintain.

Once the association is complete, the Arc agent on each node automatically reconfigures itself. You don’t need to reinstall anything or run additional scripts. The agent simply begins using the gateway as its proxy. This is particularly useful in environments with strict egress controls, because it ensures that only the gateway requires outbound access to Azure, while the nodes communicate solely over your internal network.

Image

Share and Enjoy !

Shares
Designer (23)

Stay close to the action—follow GetToThe.Cloud across social!
Deep dives and hands‑on how‑tos on Azure Local, hybrid cloud, automation, PowerShell/Bicep, AVD + FSLogix, image pipelines, monitoring, networking, and resilient design when the internet/Azure is down.

🔗 Our channels
▶️ YouTube: https://www.youtube.com/channel/UCa33PgGdXt-Dr4w3Ub9hrdQ
💼 LinkedIn Group: https://www.linkedin.com/groups/9181126/
✖️ X (Twitter): https://x.com/Gettothecloud
🎵 TikTok: https://www.tiktok.com/@gettothecloud
🐙 GitHub: https://github.com/GetToThe-Cloud/Website
💬 Slack: DM us for an invite
📲 WhatsApp: DM for the community link

We use cookies to personalise content and ads, to provide social media features and to analyse our traffic. We also share information about your use of our site with our social media, advertising and analytics partners. View more
Cookies settings
Accept
Privacy & Cookie policy
Privacy & Cookies policy
Cookie name Active

Who we are

Our website address is: https://www.gettothe.cloud

Comments

When visitors leave comments on the site we collect the data shown in the comments form, and also the visitor’s IP address and browser user agent string to help spam detection. An anonymized string created from your email address (also called a hash) may be provided to the Gravatar service to see if you are using it. The Gravatar service privacy policy is available here: https://automattic.com/privacy/. After approval of your comment, your profile picture is visible to the public in the context of your comment.

Media

If you upload images to the website, you should avoid uploading images with embedded location data (EXIF GPS) included. Visitors to the website can download and extract any location data from images on the website.

Cookies

If you leave a comment on our site you may opt-in to saving your name, email address and website in cookies. These are for your convenience so that you do not have to fill in your details again when you leave another comment. These cookies will last for one year. If you visit our login page, we will set a temporary cookie to determine if your browser accepts cookies. This cookie contains no personal data and is discarded when you close your browser. When you log in, we will also set up several cookies to save your login information and your screen display choices. Login cookies last for two days, and screen options cookies last for a year. If you select "Remember Me", your login will persist for two weeks. If you log out of your account, the login cookies will be removed. If you edit or publish an article, an additional cookie will be saved in your browser. This cookie includes no personal data and simply indicates the post ID of the article you just edited. It expires after 1 day.

Embedded content from other websites

Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website. These websites may collect data about you, use cookies, embed additional third-party tracking, and monitor your interaction with that embedded content, including tracking your interaction with the embedded content if you have an account and are logged in to that website.

Who we share your data with

If you request a password reset, your IP address will be included in the reset email.

How long we retain your data

If you leave a comment, the comment and its metadata are retained indefinitely. This is so we can recognize and approve any follow-up comments automatically instead of holding them in a moderation queue. For users that register on our website (if any), we also store the personal information they provide in their user profile. All users can see, edit, or delete their personal information at any time (except they cannot change their username). Website administrators can also see and edit that information.

What rights you have over your data

If you have an account on this site, or have left comments, you can request to receive an exported file of the personal data we hold about you, including any data you have provided to us. You can also request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes.

Where we send your data

Visitor comments may be checked through an automated spam detection service.
Save settings
Cookies settings