Skip to content

Commit 6145c90

Browse files
authored
Update tcp-ip-connectivity-issues-troubleshooting.md
1 parent 5454f61 commit 6145c90

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

support/windows-client/networking/tcp-ip-connectivity-issues-troubleshooting.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: TCP/IP connectivity issues troubleshooting
33
description: Learn how to troubleshoot TCP/IP connectivity and what you should do if you come across TCP reset in a network capture.
4-
ms.date: 04/28/2025
4+
ms.date: 04/29/2025
55
ms.topic: troubleshooting
66
manager: dcscontentpm
77
ms.collection: highpri
@@ -41,7 +41,7 @@ TCP is characterized as a connection-oriented and reliable protocol. It ensures
4141

4242
- A four-way closure, where both the sender and receiver agree to close the session, is known as a graceful closure. This is identified by the FIN flag in the TCP header being set to 1.
4343
- After the four-way closure, the machine waits for 4 minutes (by default) before releasing the port. This is termed as TIME_WAIT state. During this TIME_WAIT state, any pending packets for the TCP connection can be processed. Once the TIME_WAIT state completes, all resources allocated for the connection are released.
44-
- A TCP reset is an abrupt session closure, causing the immediate release of allocated resources and erasure of all connection information. This is identified by the RESET flag in the TCP header being set to 1.
44+
- A TCP reset is an abrupt session closure, causing the immediate release of allocated resources and erasure of all connection information. This is identified by setting the RESET flag in the TCP header to 1.
4545

4646
A network trace collected simultaneously on the source and the destination helps you to determine the flow of the traffic and identify the point of failure.
4747

@@ -70,7 +70,7 @@ The same TCP conversation seen in the network trace collected on the destination
7070

7171
:::image type="content" source="media/tcp-ip-connectivity-issues-troubleshooting/destination-side-same-filter.png" alt-text="Screenshot of frame summary with filter in Network Monitor.":::
7272

73-
If the TCP SYN packets are reaching the destination, but the destination doesn't response, verify whether the TCP port being connected to on destination machine is in the LISTENING state. This can be checked in the output of the command `netstat -anob`.
73+
If the TCP SYN packets reach the destination, but the destination doesn't respond, verify whether the connected TCP port on destination machine is in the LISTENING state. This can be checked in the output of the command `netstat -anob`.
7474

7575
If the port is listening and there's still no response, there could be a drop at the Windows Filtering Platform (WFP).
7676

@@ -119,15 +119,15 @@ An ACK+RST flagged TCP packet can also occur when a TCP SYN packet is sent out.
119119
:::image type="content" source="media/tcp-ip-connectivity-issues-troubleshooting/ack-rst-flag-packet.png" alt-text="Screenshot of packet with ACK RSK flag.":::In such cases, it's essential to investigate the application causing the reset (identified by port numbers) to understand why the connection is being reset.
120120

121121
> [!NOTE]
122-
> The above information pertains to resets from a TCP perspective and not UDP. UDP is a connectionless protocol, and packets are sent unreliably. So, retransmissions or resets aren't observed when using UDP as a transport protocol. However, UDP utilizes ICMP as an error reporting protocol. When a UDP packet is sent to a port that isn't listed at the destination, the destination will immediately respond with an ICMP "**Destination Host Unreachable: Port Unreachable**" message.
122+
> The preceding information pertains to resets from a TCP perspective and not UDP. UDP is a connectionless protocol, and packets are sent unreliably. Therefore, retransmissions or resets aren't observed when using UDP as a transport protocol. However, UDP utilizes ICMP as an error reporting protocol. When a UDP packet is sent to a port that isn't listed at the destination, the destination immediately responds with an ICMP "**Destination Host Unreachable: Port Unreachable**" message.
123123
124124
```output
125125
10.10.10.1 10.10.10.2 UDP UDP:SrcPort=49875,DstPort=3343
126126
127127
10.10.10.2 10.10.10.1 ICMP ICMP:Destination Unreachable Message, Port Unreachable,10.10.10.2:3343
128128
```
129129

130-
During the troubleshooting of TCP/IP connectivity issues, you might observe in the network trace that a machine receives packets but doesn't respond to them. This could indicate a drop at the destination server's network stack.
130+
During the troubleshooting of TCP/IP connectivity issues, you might observe in the network trace that a machine receives packets but doesn't respond to them. This might indicate a drop at the destination server's network stack.
131131

132132
To determine whether the local Windows Firewall is dropping the packet, enable auditing for the Windows Filtering Platform (WFP) on the machine using the following command.
133133

0 commit comments

Comments
 (0)