Skip to content

Commit 521b86b

Browse files
committed
freshness
1 parent f6f8757 commit 521b86b

File tree

1 file changed

+20
-23
lines changed

1 file changed

+20
-23
lines changed

articles/network-watcher/network-watcher-deep-packet-inspection.md

Lines changed: 20 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -1,37 +1,34 @@
11
---
2-
title: Packet inspection with Azure Network Watcher
3-
description: This article describes how to use Azure Network Watcher to perform deep packet inspection collected from a VM.
4-
services: network-watcher
2+
title: Inspect and analyze packet capture files
3+
titleSuffix: Azure Network Watcher
4+
description: Learn how to inspect and analyze packet capture network data previously captured using Azure Network Watcher.
55
author: halkazwini
6-
ms.assetid: 7b907d00-9c35-40f5-a61e-beb7b782276f
6+
ms.author: halkazwini
77
ms.service: network-watcher
88
ms.topic: how-to
9-
ms.workload: infrastructure-services
10-
ms.date: 01/07/2021
11-
ms.author: halkazwini
9+
ms.date: 01/31/2024
10+
#CustomerIntent: As a network administrator, I want to inspect packets captured by Network Watcher to investigate network issues.
1211
---
1312

14-
# Packet inspection with Azure Network Watcher
15-
16-
Using the packet capture feature of Network Watcher, you can initiate and manage captures sessions on your Azure VMs from the portal, PowerShell, CLI, and programmatically through the SDK and REST API. Packet capture allows you to address scenarios that require packet level data by providing the information in a readily usable format. Leveraging freely available tools to inspect the data, you can examine communications sent to and from your VMs and gain insights into your network traffic. Some example uses of packet capture data include: investigating network or application issues, detecting network misuse and intrusion attempts, or maintaining regulatory compliance. In this article, we show how to open a packet capture file provided by Network Watcher using a popular open source tool. We'll also provide examples showing how to calculate a connection latency, identify abnormal traffic, and examine networking statistics.
13+
# Inspect and analyze Network Watcher packet capture files
1714

18-
## Before you begin
15+
Using the packet capture feature of Network Watcher, you can initiate and manage capture sessions on your Azure virtual machines (VMs) and virtual machine scale sets from the Azure portal, PowerShell, Azure CLI, and programmatically through the SDK and REST API.
1916

20-
This article goes through some pre-configured scenarios on a packet capture that was run previously. These scenarios illustrate capabilities that can be accessed by reviewing a packet capture. This scenario uses [WireShark](https://www.wireshark.org/) to inspect the packet capture.
17+
Packet capture allows you to address scenarios that require packet level data by providing the information in a readily usable format. Using freely available tools to inspect the data, you can examine communications sent to and from your VMs or scale sets to gain insights into your network traffic. Some example uses of packet capture data include investigating network or application issues, detecting network misuse and intrusion attempts, or maintaining regulatory compliance.
2118

22-
This scenario assumes you already ran a packet capture on a virtual machine. To learn how to create a packet capture visit [Manage packet captures with the portal](network-watcher-packet-capture-manage-portal.md) or with REST by visiting [Managing Packet Captures with REST API](network-watcher-packet-capture-manage-rest.md).
19+
In this article, you learn how to open a packet capture file provided by Network Watcher using a popular open source tool. You'll also learn how to calculate a connection latency, identify abnormal traffic, and examine networking statistics.
2320

24-
## Scenario
21+
## Prerequisites
2522

26-
In this scenario, you:
23+
- A packet capture file created using Network Watcher. For more information, see [Manage packet captures for virtual machines using the Azure portal](network-watcher-packet-capture-manage-portal.md).
2724

28-
* Review a packet capture
25+
- Wireshark. For more information, see [https://www.wireshark.org/](https://www.wireshark.org/).
2926

3027
## Calculate network latency
3128

3229
In this scenario, we show how to view the initial Round Trip Time (RTT) of a Transmission Control Protocol (TCP) conversation occurring between two endpoints.
3330

34-
When a TCP connection is established, the first three packets sent in the connection follow a pattern commonly referred to as the three-way handshake. By examining the first two packets sent in this handshake, an initial request from the client and a response from the server, we can calculate the latency when this connection was established. This latency is referred to as the Round Trip Time (RTT). For more information on the TCP protocol and the three-way handshake, refer to the following resource. [https://support.microsoft.com/en-us/help/172983/explanation-of-the-three-way-handshake-via-tcp-ip](https://support.microsoft.com/en-us/help/172983/explanation-of-the-three-way-handshake-via-tcp-ip)
31+
When a TCP connection is established, the first three packets sent in the connection follow a pattern commonly referred to as the three-way handshake. By examining the first two packets sent in this handshake, an initial request from the client and a response from the server, we can calculate the latency when this connection was established. This latency is referred to as the Round Trip Time (RTT). For more information on the TCP protocol and the three-way handshake, see the following resource. [https://support.microsoft.com/en-us/help/172983/explanation-of-the-three-way-handshake-via-tcp-ip](https://support.microsoft.com/en-us/help/172983/explanation-of-the-three-way-handshake-via-tcp-ip)
3532

3633
### Step 1
3734

@@ -57,15 +54,15 @@ Since we're looking to filter on all [SYN] and [SYN, ACK] packets, under flags c
5754

5855
### Step 4
5956

60-
Now that you've filtered the window to only see packets with the [SYN] bit set, you can easily select conversations you are interested in to view the initial RTT. A simple way to view the RTT in WireShark is to simply select the dropdown marked “SEQ/ACK” analysis. You'll then see the RTT displayed. In this case, the RTT was 0.0022114 seconds, or 2.211 ms.
57+
Now that you've filtered the window to only see packets with the [SYN] bit set, you can easily select conversations you're interested in to view the initial RTT. A simple way to view the RTT in WireShark is to select the dropdown marked “SEQ/ACK” analysis. You'll then see the RTT displayed. In this case, the RTT was 0.0022114 seconds, or 2.211 ms.
6158

6259
![figure 8][8]
6360

64-
## Unwanted protocols
61+
## Find unwanted protocols
6562

6663
You can have many applications running on a virtual machine instance you've deployed in Azure. Many of these applications communicate over the network, perhaps without your explicit permission. Using packet capture to store network communication, we can investigate how applications are talking on the network and look for any issues.
6764

68-
In this example, we review a previous ran packet capture for unwanted protocols that may indicate unauthorized communication from an application running on your machine.
65+
In this example, we review a previous ran packet capture for unwanted protocols that might indicate unauthorized communication from an application running on your machine.
6966

7067
### Step 1
7168

@@ -77,7 +74,7 @@ The protocol hierarchy window appears. This view provides a list of all the prot
7774

7875
![protocol hierarchy opened][3]
7976

80-
As you can see in the following screen capture, there was traffic using the BitTorrent protocol, which is used for peer to peer file sharing. As an administrator you don't expect to see BitTorrent traffic on this particular virtual machine. Now you aware of this traffic, you can remove the peer to peer software that installed on this virtual machine, or block the traffic using Network Security Groups or a Firewall. Additionally, you may elect to run packet captures on a schedule, so you can review the protocol use on your virtual machines regularly. For an example on how to automate network tasks in Azure, visit [Monitor network resources with Azure automation](network-watcher-monitor-with-azure-automation.md).
77+
As you can see in the following screen capture, there was traffic using the BitTorrent protocol, which is used for peer to peer file sharing. As an administrator you don't expect to see BitTorrent traffic on this particular virtual machine. Now you aware of this traffic, you can remove the peer to peer software that installed on this virtual machine, or block the traffic using Network Security Groups or a Firewall. Additionally, you can elect to run packet captures on a schedule, so you can review the protocol use on your virtual machines regularly. For an example on how to automate network tasks in Azure, visit [Monitor network resources with Azure Automation](network-watcher-monitor-with-azure-automation.md).
8178

8279
## Finding top destinations and ports
8380

@@ -93,7 +90,7 @@ Using the same capture in the previous scenario, select **Statistics** > **IPv4
9390

9491
As we look through the results a line stands out, there were multiple connections on port 111. The most used port was 3389, which is remote desktop, and the remaining are RPC dynamic ports.
9592

96-
While this traffic may mean nothing, it's a port that was used for many connections and is unknown to the administrator.
93+
While this traffic might mean nothing, it's a port that was used for many connections and is unknown to the administrator.
9794

9895
![figure 5][5]
9996

@@ -113,7 +110,7 @@ We enter the filter text in the filter textbox and press enter.
113110

114111
From the results, we can see all the traffic is coming from a local virtual machine on the same subnet. If we still don’t understand why this traffic is occurring, we can further inspect the packets to determine why it's making these calls on port 111. With this information, we can take the appropriate action.
115112

116-
## Next steps
113+
## Next step
117114

118115
Learn about the other diagnostic features of Network Watcher by visiting [Azure network monitoring overview](network-watcher-monitoring-overview.md).
119116

0 commit comments

Comments
 (0)