You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/network-watcher/packet-capture-manage.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,7 +27,7 @@ In this article, you learn how to use the Azure Network Watcher [packet capture]
27
27
28
28
- An Azure storage account with VM outbound TCP connectivity to it over port `443`. If you don't have a storage account, see [Create a storage account using the Azure portal](../storage/common/storage-account-create.md?tabs=azure-portal&toc=/azure/network-watcher/toc.json).
29
29
- The storage account must be accessible from the subnet of the target virtual machine or scale set. For more information, see [Configure Azure Storage firewalls and virtual networks](../storage/common/storage-network-security.md?tabs=azure-portal&toc=/azure/network-watcher/toc.json).
30
-
- The storage account key access must be enabled to allow requests using shared access signatures (SAS) from Network Watcher.
30
+
- The storage account key access must be enabled to allow requests from Network Watcher using a shared access signatures (SAS) token.
31
31
32
32
- Sign in to the [Azure portal](https://portal.azure.com) with your Azure account.
33
33
@@ -41,7 +41,7 @@ In this article, you learn how to use the Azure Network Watcher [packet capture]
41
41
42
42
- An Azure storage account with VM outbound TCP connectivity to it over port `443`. If you don't have a storage account, see [Create a storage account using PowerShell](../storage/common/storage-account-create.md?tabs=azure-powershell&toc=/azure/network-watcher/toc.json).
43
43
- The storage account must be accessible from the subnet of the target virtual machine or scale set. For more information, see [Configure Azure Storage firewalls and virtual networks](../storage/common/storage-network-security.md?tabs=azure-powershell&toc=/azure/network-watcher/toc.json).
44
-
- The storage account key access must be enabled to allow requests using shared access signatures (SAS) from Network Watcher.
44
+
- The storage account key access must be enabled to allow requests from Network Watcher using a shared access signatures (SAS) token.
45
45
46
46
- Azure Cloud Shell or Azure PowerShell.
47
47
@@ -59,7 +59,7 @@ In this article, you learn how to use the Azure Network Watcher [packet capture]
59
59
60
60
- An Azure storage account with VM outbound TCP connectivity to it over port `443`. If you don't have a storage account, see [Create a storage account using the Azure CLI](../storage/common/storage-account-create.md?tabs=azure-cli&toc=/azure/network-watcher/toc.json).
61
61
- The storage account must be accessible from the subnet of the target virtual machine or scale set. For more information, see [Configure Azure Storage firewalls and virtual networks](../storage/common/storage-network-security.md?tabs=azure-cli&toc=/azure/network-watcher/toc.json).
62
-
- The storage account key access must be enabled to allow requests using shared access signatures (SAS) from Network Watcher.
62
+
- The storage account key access must be enabled to allow requests from Network Watcher using a shared access signatures (SAS) token.
63
63
64
64
- Azure Cloud Shell or Azure CLI.
65
65
@@ -70,9 +70,9 @@ In this article, you learn how to use the Azure Network Watcher [packet capture]
70
70
---
71
71
72
72
> [!NOTE]
73
-
> Azure creates a Network Watcher instance in the virtual machine's region if Network Watcher wasn't enabled for that region. For more information, see [Enable or disable Azure Network Watcher](network-watcher-create.md).
74
-
75
-
If a network security group is associated to the network interface, or subnet that the network interface is in, ensure that rules exist to allow outbound connectivity over the previous ports. Similarly, ensure outbound connectivity over the previous ports when adding user-defined routes to your network.
73
+
> -Azure creates a Network Watcher instance in the virtual machine's region if Network Watcher wasn't enabled for that region. For more information, see [Enable or disable Azure Network Watcher](network-watcher-create.md).
74
+
>
75
+
> -If a network security group is associated to the network interface, or subnet that the network interface is in, ensure that rules exist to allow outbound connectivity. Similarly, ensure outbound connectivity when adding user-defined routes to your network.
0 commit comments