Skip to content

Commit 2391e2d

Browse files
committed
GitHub issue 93634
1 parent 4913646 commit 2391e2d

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

articles/network-watcher/network-watcher-connectivity-overview.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -3,13 +3,13 @@ title: Introduction to Azure Network Watcher Connection Troubleshoot | Microsoft
33
description: This page provides an overview of the Network Watcher connection troubleshooting capability
44
services: network-watcher
55
documentationcenter: na
6-
author: damendo
6+
author: shijaiswal
77
ms.service: network-watcher
88
ms.topic: article
99
ms.tgt_pltfrm: na
1010
ms.workload: infrastructure-services
11-
ms.date: 07/11/2017
12-
ms.author: damendo
11+
ms.date: 11/02/2022
12+
ms.author: shijaiswal
1313
---
1414

1515
# Introduction to connection troubleshoot in Azure Network Watcher
@@ -23,7 +23,7 @@ The connection troubleshoot feature of Network Watcher provides the capability t
2323

2424
The following table shows the properties returned when connection troubleshoot has finished running.
2525

26-
|Property |Description |
26+
|**Property** |**Description** |
2727
|---------|---------|
2828
|ConnectionStatus | The status of the connectivity check. Possible results are **Reachable** and **Unreachable**. |
2929
|AvgLatencyInMs | Average latency during the connectivity check in milliseconds. (Only shown if check status is reachable) |
@@ -66,11 +66,11 @@ The following is an example of an issue found on a hop.
6666

6767
Connection troubleshoot returns fault types about the connection. The following table provides a list of the current fault types returned.
6868

69-
|Type |Description |
69+
|**Type** |**Description** |
7070
|---------|---------|
7171
|CPU | High CPU utilization. |
7272
|Memory | High Memory utilization. |
73-
|GuestFirewall | Traffic is blocked due to a virtual machine firewall configuration. |
73+
|GuestFirewall | Traffic is blocked due to a virtual machine firewall configuration. <br><br> Note that a TCP ping is a unique use case in which, if there is no allowed rule, the firewall itself responds to the client's TCP ping request even though the TCP ping doesn't reach the target IP address/FQDN. This event is not logged. If there is a network rule that allows access to the target IP address/FQDN, the ping request reaches the target server and its response is relayed back to the client. This event is logged in the Network rules log. |
7474
|DNSResolution | DNS resolution failed for the destination address. |
7575
|NetworkSecurityRule | Traffic is blocked by an NSG Rule (Rule is returned) |
7676
|UserDefinedRoute|Traffic is dropped due to a user defined or system route. |

0 commit comments

Comments
 (0)