Azure Local | HomeLab – Firewall requirements

AzureLocalHomeLab
Reading Time: 3 minutes

Setting up Azure Local requires more than just preparing the hardware and configuring the operating system. One of the most important but often overlooked aspects is ensuring that the necessary firewall rules and outbound connectivity are in place before the installation begins. Azure Local relies heavily on Azure services during deployment, registration, and ongoing management, which means the node must be able to reach a specific set of endpoints throughout the entire setup process. Without this connectivity, the installation may fail midway, Arc registration might not complete, or the node could become stuck waiting for services it cannot access.

When the Azure Local installer starts, it immediately begins communicating with Azure to validate licensing, retrieve configuration packages, and authenticate the environment. This communication happens over secure outbound connections, and the node must be able to reach Azure Resource Manager, Azure Active Directory, and several service-specific endpoints. These connections ensure that the node can register itself, download the necessary components, and establish trust with the tenant you prepared earlier. If any of these endpoints are blocked by a firewall or proxy, the installer may report vague errors that are difficult to troubleshoot, making it essential to verify connectivity ahead of time.

During the Azure Arc onboarding phase, the node also needs to communicate with the Azure Connected Machine agent services. This step is crucial because Azure Local uses Arc as its management plane, and the node cannot proceed without successfully registering. The Arc agent requires access to endpoints responsible for identity, telemetry, configuration, and extension management. Even temporary interruptions can cause delays or failures, so stable outbound connectivity is key. In environments with strict firewall policies, it is wise to review the required URLs and ensure they are allowed before you begin the installation.

Once Azure Local is fully deployed, the node continues to rely on these endpoints for updates, monitoring, and lifecycle operations. Azure Local is designed to behave like an extension of Azure, which means it expects to maintain a continuous connection to the cloud. Ensuring that the required firewall rules are in place from the beginning helps avoid operational issues later and keeps the environment aligned with Microsoft’s support requirements. https://learn.microsoft.com/en-us/azure/azure-local/concepts/firewall-requirements?view=azloc-2512#required-firewall-urls-for-azure-local-deployments

Image
PurposeRequired URL / PatternNotes
Azure Resource Managerhttps://management.azure.comUsed for deployment, configuration, and resource operations.
Azure Active Directory (Microsoft Entra ID)https://login.microsoftonline.comRequired for authentication and token retrieval.
Azure Active Directory (MSA/Token CDN)https://aadcdn.msftauth.netSupports identity flows and token services.
Azure Active Directory (Login CDN)https://logincdn.msftauth.netRequired for login UI and authentication redirects.
Azure Arc Agent Servicehttps://agentserviceapi.azure-automation.netEnables Arc onboarding and agent communication.
Azure Arc Hybrid Computehttps://hybridcompute.azure-automation.netRequired for Arc machine registration and management.
Azure Arc Guest Configurationhttps://guestconfiguration.azure.comSupports policy and configuration management.
Azure Arc Extension Servicehttps://extensionservice.azure-automation.netRequired for installing and managing Arc extensions.
Azure Monitoring / Telemetryhttps://dc.services.visualstudio.comSends diagnostic and telemetry data.
Azure Package Downloadshttps://packages.microsoft.comRequired for downloading components and updates.
Azure Local Updateshttps://*.azureedge.netUsed for content delivery and update packages.
Time Synchronizationtime.windows.comRequired for accurate time during installation and

Using an Azure Arc Gateway is a smart way to simplify firewall management in environments where outbound connectivity is tightly controlled. Instead of allowing every Azure Local node to reach dozens of Azure endpoints directly, the Arc Gateway acts as a single, centralized relay. All Arc‑related traffic flows through that gateway, dramatically reducing the number of URLs you need to maintain and monitor.

When you deploy Azure Local without a gateway, each node must independently reach the full list of required Azure services for authentication, configuration, telemetry, extension management, and updates. That means every node needs outbound access to identity endpoints, Arc agent services, package repositories, and time sources. In a homelab this is manageable, but in a production environment with strict firewall rules, maintaining that list across multiple nodes can become tedious and error‑prone.

To maintain this list which is also linked before, you can simplify it also with an Azure ARC Gateway. https://www.gettothe.cloud/azure-local-homelab-setup-arc-gateway

Share and Enjoy !

Shares
Designer (23)

Stay close to the action—follow GetToThe.Cloud across social!
Deep dives and hands‑on how‑tos on Azure Local, hybrid cloud, automation, PowerShell/Bicep, AVD + FSLogix, image pipelines, monitoring, networking, and resilient design when the internet/Azure is down.

🔗 Our channels
▶️ YouTube: https://www.youtube.com/channel/UCa33PgGdXt-Dr4w3Ub9hrdQ
💼 LinkedIn Group: https://www.linkedin.com/groups/9181126/
✖️ X (Twitter): https://x.com/Gettothecloud
🎵 TikTok: https://www.tiktok.com/@gettothecloud
🐙 GitHub: https://github.com/GetToThe-Cloud/Website
💬 Slack: DM us for an invite
📲 WhatsApp: DM for the community link

We use cookies to personalise content and ads, to provide social media features and to analyse our traffic. We also share information about your use of our site with our social media, advertising and analytics partners. View more
Cookies settings
Accept
Privacy & Cookie policy
Privacy & Cookies policy
Cookie name Active

Who we are

Our website address is: https://www.gettothe.cloud

Comments

When visitors leave comments on the site we collect the data shown in the comments form, and also the visitor’s IP address and browser user agent string to help spam detection. An anonymized string created from your email address (also called a hash) may be provided to the Gravatar service to see if you are using it. The Gravatar service privacy policy is available here: https://automattic.com/privacy/. After approval of your comment, your profile picture is visible to the public in the context of your comment.

Media

If you upload images to the website, you should avoid uploading images with embedded location data (EXIF GPS) included. Visitors to the website can download and extract any location data from images on the website.

Cookies

If you leave a comment on our site you may opt-in to saving your name, email address and website in cookies. These are for your convenience so that you do not have to fill in your details again when you leave another comment. These cookies will last for one year. If you visit our login page, we will set a temporary cookie to determine if your browser accepts cookies. This cookie contains no personal data and is discarded when you close your browser. When you log in, we will also set up several cookies to save your login information and your screen display choices. Login cookies last for two days, and screen options cookies last for a year. If you select "Remember Me", your login will persist for two weeks. If you log out of your account, the login cookies will be removed. If you edit or publish an article, an additional cookie will be saved in your browser. This cookie includes no personal data and simply indicates the post ID of the article you just edited. It expires after 1 day.

Embedded content from other websites

Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website. These websites may collect data about you, use cookies, embed additional third-party tracking, and monitor your interaction with that embedded content, including tracking your interaction with the embedded content if you have an account and are logged in to that website.

Who we share your data with

If you request a password reset, your IP address will be included in the reset email.

How long we retain your data

If you leave a comment, the comment and its metadata are retained indefinitely. This is so we can recognize and approve any follow-up comments automatically instead of holding them in a moderation queue. For users that register on our website (if any), we also store the personal information they provide in their user profile. All users can see, edit, or delete their personal information at any time (except they cannot change their username). Website administrators can also see and edit that information.

What rights you have over your data

If you have an account on this site, or have left comments, you can request to receive an exported file of the personal data we hold about you, including any data you have provided to us. You can also request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes.

Where we send your data

Visitor comments may be checked through an automated spam detection service.
Save settings
Cookies settings