Hello Handian Sudianto,
You cannot restrict RDP to only WAC using firewall/IP rules. The correct approach is to disable direct RDP and use Azure Arc (RDP over SSH) for secure access.
Here's a bit more detailed explanation on why:
**How WAC connects :
**WAC does not use fixed IP addresses. It connects either via:
Azure Arc (secure, tunneled access), or
Regular RDP (if enabled)
Because there are no fixed IPs, you cannot allow “only WAC” via firewall rules.
**
Why your approach won’t work**
- Firewall rules work with IPs or ranges.
- WAC traffic doesn’t come from a known/static range.
- So you can’t allow WAC and block everything else using RDP rules.
Recommended solution: Use Azure Arc RDP over SSH
- RDP is tunneled securely via Azure Arc
- Port 3389 is not exposed to LAN or internet
- No inbound RDP firewall rules needed
- Access is controlled via Azure identity (secure)
This gives you remote access without opening RDP at all.
Best practices:
- Disable direct RDP (port 3389)
- Use Azure Arc for access
- Optionally use identity controls like Just-In-Time (JIT)
References: