Skip to content

Commit 25b4240

Browse files
Merge pull request #287641 from halkazwini/nw-flow-cli
Freshness: Quickstart: Diagnose a virtual machine network traffic filter problem using the Azure CLI
2 parents 9c5bce2 + cae4adb commit 25b4240

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

articles/network-watcher/diagnose-vm-network-traffic-filtering-problem-cli.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -6,16 +6,17 @@ author: halkazwini
66
ms.author: halkazwini
77
ms.service: azure-network-watcher
88
ms.topic: quickstart
9-
ms.date: 08/23/2023
9+
ms.date: 09/30/2024
1010
ms.custom: devx-track-azurecli, mode-api
11+
1112
#Customer intent: I want to diagnose a virtual machine (VM) network traffic filter using IP flow verify to know which security rule is denying the traffic and causing the communication problem to the VM.
1213
---
1314

1415
# Quickstart: Diagnose a virtual machine network traffic filter problem using the Azure CLI
1516

1617
In this quickstart, you deploy a virtual machine and use Network Watcher [IP flow verify](network-watcher-ip-flow-verify-overview.md) to test the connectivity to and from different IP addresses. Using the IP flow verify results, you determine the security rule that's blocking the traffic and causing the communication failure and learn how you can resolve it. You also learn how to use the [effective security rules](effective-security-rules-overview.md) for a network interface to determine why a security rule is allowing or denying traffic.
1718

18-
:::image type="content" source="./media/diagnose-vm-network-traffic-filtering-problem-cli/ip-flow-verify-quickstart-diagram.png" alt-text="Diagram shows the resources created in Network Watcher quickstart." lightbox="./media/diagnose-vm-network-traffic-filtering-problem-cli/ip-flow-verify-quickstart-diagram.png":::
19+
:::image type="content" source="./media/diagnose-vm-network-traffic-filtering-problem-cli/ip-flow-verify-quickstart-diagram.png" alt-text="Diagram shows the resources created in Network Watcher quickstart.":::
1920

2021
If you don't have an Azure subscription, create a [free account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F) before you begin.
2122

@@ -210,8 +211,7 @@ When no longer needed, use [az group delete](/cli/azure/group) to delete **myRes
210211
az group delete --name 'myResourceGroup' --yes
211212
```
212213

213-
## Next steps
214-
215-
In this quickstart, you created a VM and diagnosed inbound and outbound network traffic filters. You learned that network security group rules allow or deny traffic to and from a VM. Learn more about [security rules](../virtual-network/network-security-groups-overview.md?toc=%2fazure%2fnetwork-watcher%2ftoc.json) and how to [create security rules](../virtual-network/manage-network-security-group.md?toc=%2fazure%2fnetwork-watcher%2ftoc.json#create-a-security-rule).
214+
## Next step
216215

217-
Even with the proper network traffic filters in place, communication to a virtual machine can still fail, due to routing configuration. To learn how to diagnose virtual machine routing problems, see [Diagnose a virtual machine network routing problem](diagnose-vm-network-routing-problem-powershell.md). To diagnose outbound routing, latency, and traffic filtering problems with one tool, see [Troubleshoot connections with Azure Network Watcher](network-watcher-connectivity-powershell.md).
216+
> [!div class="nextstepaction"]
217+
> [Diagnose a virtual machine network routing problem](diagnose-vm-network-routing-problem.md)

0 commit comments

Comments
 (0)