You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
**Check for NSG when using Standard SKU Public IP**
76
-
When using a Standard SKU and Public IPs, there must be an NSG created and an explicit rule to allow the traffic to the NVA.
91
+
**Check for NSG when using Standard SKU public IP**
92
+
93
+
When using a Standard SKU and public IPs, there must be an NSG created and an explicit rule to allow the traffic to the NVA.
77
94
78
95
**Check whether the traffic can be routed to the NVA**
79
96
80
97
1. On [Azure portal](https://portal.azure.com), open **Network Watcher**, select **Next Hop**.
81
-
2. Specify a VM that is configured to redirect the traffic to the NVA, and a destination IP address at which to view the next hop.
82
-
3. If the NVA is not listed as the **next hop**, check and update the Azure route tables.
98
+
99
+
1. Specify a VM that is configured to redirect the traffic to the NVA, and a destination IP address at which to view the next hop.
100
+
101
+
1. If the NVA is not listed as the **next hop**, check and update the Azure route tables.
83
102
84
103
**Check whether the traffic can reach the NVA**
85
104
86
105
1. In [Azure portal](https://portal.azure.com), open **Network Watcher**, and then select **IP Flow Verify**.
87
-
2. Specify the VM and the IP address of the NVA, and then check whether the traffic is blocked by any Network security groups (NSG).
88
-
3. If there is an NSG rule that blocks the traffic, locate the NSG in **effective security** rules and then update it to allow traffic to pass. Then run **IP Flow Verify** again and use **Connection troubleshoot** to test TCP communications from VM to your internal or external IP address.
106
+
107
+
1. Specify the VM and the IP address of the NVA, and then check whether the traffic is blocked by any Network security groups (NSG).
108
+
109
+
1. If there is an NSG rule that blocks the traffic, locate the NSG in **effective security** rules and then update it to allow traffic to pass. Then run **IP Flow Verify** again and use **Connection troubleshoot** to test TCP communications from VM to your internal or external IP address.
89
110
90
111
**Check whether NVA and VMs are listening for expected traffic**
91
112
@@ -102,15 +123,16 @@ When using a Standard SKU and Public IPs, there must be an NSG created and an ex
102
123
```console
103
124
netstat -an | grep -i listen
104
125
```
105
-
2. If you don't see the TCP port that's used by the NVA software that's listed in the results you must configure the application on the NVA and VM to listen and respond to traffic that reaches those ports. [Contact the NVA vendor for assistance as needed](https://mskb.pkisolutions.com/kb/2984655).
106
126
107
-
## Check NVA Performance
127
+
1. If you don't see the TCP port that's used by the NVA software that's listed in the results you must configure the application on the NVA and VM to listen and respond to traffic that reaches those ports. [Contact the NVA vendor for assistance as needed](https://mskb.pkisolutions.com/kb/2984655).
128
+
129
+
## Check NVA performance
108
130
109
131
### Validate VM CPU
110
132
111
133
If CPU usage gets close to 100 percent, you may experience issues that affect network packet drops. Your VM reports average CPU for a specific time span in the Azure portal. During a CPU spike, investigate which process on the guest VM is causing the high CPU, and mitigate it, if possible. You may also have to resize the VM to a larger SKU size or, for virtual machine scale set, increase the instance count or set to auto-scale on CPU usage. For either of these issues, [contact the NVA vendor for assistance](https://mskb.pkisolutions.com/kb/2984655), as needed.
112
134
113
-
### Validate VM Network statistics
135
+
### Validate VM network statistics
114
136
115
137
If the VM network use spikes or shows periods of high usage, you may also have to increase the SKU size of the VM to obtain higher throughput capabilities. You can also redeploy the VM by having Accelerated Networking enabled. To verify whether the NVA supports Accelerated Networking feature, [contact the NVA vendor for assistance](https://mskb.pkisolutions.com/kb/2984655), as needed.
116
138
@@ -129,8 +151,9 @@ Capture a simultaneous network trace on the source VM, the NVA, and the destinat
129
151
130
152
sudo tcpdump -s0 -i eth0 -X -w vmtrace.cap
131
153
132
-
2. Use **PsPing** or **Nmap** from the source VM to the destination VM (for example: `PsPing 10.0.0.4:80` or `Nmap -p 80 10.0.0.4`).
133
-
3. Open the network trace from the destination VM by using [Network Monitor](https://download.cnet.com/s/network-monitor) or tcpdump. Apply a display filter for the IP of the Source VM you ran **PsPing** or **Nmap** from, such as `IPv4.address==10.0.0.4 (Windows netmon)` or `tcpdump -nn -r vmtrace.cap src or dst host 10.0.0.4` (Linux).
154
+
1. Use **PsPing** or **Nmap** from the source VM to the destination VM (for example: `PsPing 10.0.0.4:80` or `Nmap -p 80 10.0.0.4`).
155
+
156
+
1. Open the network trace from the destination VM by using [Network Monitor](https://download.cnet.com/s/network-monitor) or tcpdump. Apply a display filter for the IP of the Source VM you ran **PsPing** or **Nmap** from, such as `IPv4.address==10.0.0.4 (Windows netmon)` or `tcpdump -nn -r vmtrace.cap src or dst host 10.0.0.4` (Linux).
0 commit comments