Skip to content

Commit 2ac9c48

Browse files
committed
added tabs and cleaned up verbiage
1 parent 8ef0f4b commit 2ac9c48

File tree

1 file changed

+44
-21
lines changed

1 file changed

+44
-21
lines changed

articles/virtual-network/virtual-network-troubleshoot-nva.md

Lines changed: 44 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: asudbring
66
manager: dcscontentpm
77
ms.service: azure-virtual-network
88
ms.topic: troubleshooting
9-
ms.date: 10/26/2018
9+
ms.date: 04/03/2025
1010
ms.author: allensu
1111
---
1212

@@ -26,17 +26,25 @@ Technical support for third-party NVAs and their integration with the Azure plat
2626
## Checklist for troubleshooting with NVA vendor
2727

2828
- Software updates for NVA VM software
29+
2930
- Service Account setup and functionality
31+
3032
- User-defined routes (UDRs) on virtual network subnets that direct traffic to NVA
33+
3134
- UDRs on virtual network subnets that direct traffic from NVA
35+
3236
- Routing tables and rules within the NVA (for example, from NIC1 to NIC2)
37+
3338
- Tracing on NVA NICs to verify receiving and sending network traffic
39+
3440
- When using a Standard SKU and Public IPs, there must be an NSG created and an explicit rule to allow the traffic to be routed to the NVA.
3541

3642
## Basic troubleshooting steps
3743

3844
- Check the basic configuration
45+
3946
- Check NVA performance
47+
4048
- Advanced network troubleshooting
4149

4250
## Check the minimum configuration requirements for NVAs on Azure
@@ -45,47 +53,60 @@ Each NVA has basic configuration requirements to function correctly on Azure. Th
4553

4654
**Check whether IP forwarding is enabled on NVA**
4755

48-
Use Azure portal
56+
### [Portal](#tab/portal)
4957

5058
1. Locate the NVA resource in the [Azure portal](https://portal.azure.com), select Networking, and then select the Network interface.
51-
2. On the Network interface page, select IP configuration.
52-
3. Make sure that IP forwarding is enabled.
5359

54-
Use PowerShell
60+
1. On the Network interface page, select IP configuration.
61+
62+
1. Ensure that the IP forwarding checkbox is selected.
63+
64+
### [PowerShell](#tab/powershell)
65+
66+
1. Open PowerShell and sign-in to your Azure account.
5567

56-
1. Open PowerShell and then sign in to your Azure account.
57-
2. Run the following command (replace the bracketed values with your information):
68+
1. Execute the following command. Replace the bracketed values with your information:
5869

5970
```powershell
6071
Get-AzNetworkInterface -ResourceGroupName <ResourceGroupName> -Name <NicName>
6172
```
6273

63-
3. Check the **EnableIPForwarding** property.
64-
4. If IP forwarding is not enabled, run the following commands to enable it:
74+
1. Check the **EnableIPForwarding** property.
75+
76+
1. If IP forwarding is not enabled, execute the following commands to enable it:
6577

6678
```powershell
6779
$nic2 = Get-AzNetworkInterface -ResourceGroupName <ResourceGroupName> -Name <NicName>
6880
$nic2.EnableIPForwarding = 1
6981
Set-AzNetworkInterface -NetworkInterface $nic2
70-
Execute: $nic2 #and check for an expected output:
82+
$nic2 | Format-List
83+
```
84+
The output should look similar to the following:
85+
86+
```output
7187
EnableIPForwarding : True
7288
NetworkSecurityGroup : null
7389
```
7490

75-
**Check for NSG when using Standard SKU Public IP**
76-
When using a Standard SKU and Public IPs, there must be an NSG created and an explicit rule to allow the traffic to the NVA.
91+
**Check for NSG when using Standard SKU public IP**
92+
93+
When using a Standard SKU and public IPs, there must be an NSG created and an explicit rule to allow the traffic to the NVA.
7794

7895
**Check whether the traffic can be routed to the NVA**
7996

8097
1. On [Azure portal](https://portal.azure.com), open **Network Watcher**, select **Next Hop**.
81-
2. Specify a VM that is configured to redirect the traffic to the NVA, and a destination IP address at which to view the next hop.
82-
3. If the NVA is not listed as the **next hop**, check and update the Azure route tables.
98+
99+
1. Specify a VM that is configured to redirect the traffic to the NVA, and a destination IP address at which to view the next hop.
100+
101+
1. If the NVA is not listed as the **next hop**, check and update the Azure route tables.
83102

84103
**Check whether the traffic can reach the NVA**
85104

86105
1. In [Azure portal](https://portal.azure.com), open **Network Watcher**, and then select **IP Flow Verify**.
87-
2. Specify the VM and the IP address of the NVA, and then check whether the traffic is blocked by any Network security groups (NSG).
88-
3. If there is an NSG rule that blocks the traffic, locate the NSG in **effective security** rules and then update it to allow traffic to pass. Then run **IP Flow Verify** again and use **Connection troubleshoot** to test TCP communications from VM to your internal or external IP address.
106+
107+
1. Specify the VM and the IP address of the NVA, and then check whether the traffic is blocked by any Network security groups (NSG).
108+
109+
1. If there is an NSG rule that blocks the traffic, locate the NSG in **effective security** rules and then update it to allow traffic to pass. Then run **IP Flow Verify** again and use **Connection troubleshoot** to test TCP communications from VM to your internal or external IP address.
89110

90111
**Check whether NVA and VMs are listening for expected traffic**
91112

@@ -102,15 +123,16 @@ When using a Standard SKU and Public IPs, there must be an NSG created and an ex
102123
```console
103124
netstat -an | grep -i listen
104125
```
105-
2. If you don't see the TCP port that's used by the NVA software that's listed in the results you must configure the application on the NVA and VM to listen and respond to traffic that reaches those ports. [Contact the NVA vendor for assistance as needed](https://mskb.pkisolutions.com/kb/2984655).
106126

107-
## Check NVA Performance
127+
1. If you don't see the TCP port that's used by the NVA software that's listed in the results you must configure the application on the NVA and VM to listen and respond to traffic that reaches those ports. [Contact the NVA vendor for assistance as needed](https://mskb.pkisolutions.com/kb/2984655).
128+
129+
## Check NVA performance
108130

109131
### Validate VM CPU
110132

111133
If CPU usage gets close to 100 percent, you may experience issues that affect network packet drops. Your VM reports average CPU for a specific time span in the Azure portal. During a CPU spike, investigate which process on the guest VM is causing the high CPU, and mitigate it, if possible. You may also have to resize the VM to a larger SKU size or, for virtual machine scale set, increase the instance count or set to auto-scale on CPU usage. For either of these issues, [contact the NVA vendor for assistance](https://mskb.pkisolutions.com/kb/2984655), as needed.
112134

113-
### Validate VM Network statistics
135+
### Validate VM network statistics
114136

115137
If the VM network use spikes or shows periods of high usage, you may also have to increase the SKU size of the VM to obtain higher throughput capabilities. You can also redeploy the VM by having Accelerated Networking enabled. To verify whether the NVA supports Accelerated Networking feature, [contact the NVA vendor for assistance](https://mskb.pkisolutions.com/kb/2984655), as needed.
116138

@@ -129,8 +151,9 @@ Capture a simultaneous network trace on the source VM, the NVA, and the destinat
129151

130152
sudo tcpdump -s0 -i eth0 -X -w vmtrace.cap
131153

132-
2. Use **PsPing** or **Nmap** from the source VM to the destination VM (for example: `PsPing 10.0.0.4:80` or `Nmap -p 80 10.0.0.4`).
133-
3. Open the network trace from the destination VM by using [Network Monitor](https://download.cnet.com/s/network-monitor) or tcpdump. Apply a display filter for the IP of the Source VM you ran **PsPing** or **Nmap** from, such as `IPv4.address==10.0.0.4 (Windows netmon)` or `tcpdump -nn -r vmtrace.cap src or dst host 10.0.0.4` (Linux).
154+
1. Use **PsPing** or **Nmap** from the source VM to the destination VM (for example: `PsPing 10.0.0.4:80` or `Nmap -p 80 10.0.0.4`).
155+
156+
1. Open the network trace from the destination VM by using [Network Monitor](https://download.cnet.com/s/network-monitor) or tcpdump. Apply a display filter for the IP of the Source VM you ran **PsPing** or **Nmap** from, such as `IPv4.address==10.0.0.4 (Windows netmon)` or `tcpdump -nn -r vmtrace.cap src or dst host 10.0.0.4` (Linux).
134157

135158
### Analyze traces
136159

0 commit comments

Comments
 (0)