Skip to content

Commit 74fe717

Browse files
committed
Review comments
1 parent 375ac86 commit 74fe717

File tree

1 file changed

+5
-9
lines changed

1 file changed

+5
-9
lines changed

articles/network-watcher/diagnose-vm-network-traffic-filtering-problem.md

Lines changed: 5 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -4,11 +4,9 @@ titleSuffix: Azure Network Watcher
44
description: In this quickstart, you learn how to diagnose a virtual machine network traffic filter problem using the IP flow verify capability of Azure Network Watcher.
55
services: network-watcher
66
documentationcenter: network-watcher
7-
author: damendo
8-
ms.author: ankitadutta
9-
editor:
10-
ms.date: 10/12/2022
11-
ms.assetid:
7+
author: shijaiswal
8+
ms.author: v-ksreedevan
9+
ms.date: 11/18/2022
1210
ms.topic: quickstart
1311
ms.service: network-watcher
1412
ms.workload: infrastructure
@@ -97,11 +95,9 @@ To determine why the rules in steps 3-5 of **Use IP flow verify** allow or deny
9795
:::image type="content" source="./media/diagnose-vm-network-traffic-filtering-problem/effective-security-rules.png" alt-text="Screenshot of Effective security rules." lightbox="./media/diagnose-vm-network-traffic-filtering-problem/effective-security-rules.png" :::
9896

9997
In step 3 of **Use IP flow verify**, you learned that the reason the communication was allowed is because of the **AllowInternetOutbound** rule. You can see in the previous picture that the **Destination** for the rule is **Internet**. It's not clear how 13.107.21.200, the address you tested in step 3 of **Use IP flow verify**, relates to **Internet** though.
100-
1. Select the **AllowInternetOutBound** rule, and then scroll down to **Destination**, as shown in the following picture:
101-
102-
:::image type="content" source="./media/diagnose-vm-network-traffic-filtering-problem/security-rule-prefixes.png" alt-text="Screenshot of Security rule prefixes.":::
98+
1. Select the **AllowInternetOutBound** rule, and then scroll down to **Destination**.
10399

104-
One of the prefixes in the list is **12.0.0.0/8**, which encompasses the 12.0.0.1-12.255.255.254 range of IP addresses. Since 13.107.21.200 is within that address range, the **AllowInternetOutBound** rule allows the outbound traffic. Additionally, there are no higher priority (lower number) rules shown in the picture in step 2 that override this rule. Close the **Address prefixes** box. To deny outbound communication to 13.107.21.200, you could add a security rule with a higher priority, that denies port 80 outbound to the IP address.
100+
One of the prefixes in the list is **13.0.0.0/8**, which encompasses the 13.0.0.1-13.255.255.254 range of IP addresses. Since 13.107.21.200 is within that address range, the **AllowInternetOutBound** rule allows the outbound traffic. Additionally, there are no higher priority (lower number) rules shown in the picture in step 2 that override this rule. Close the **Address prefixes** box. To deny outbound communication to 13.107.21.200, you could add a security rule with a higher priority, that denies port 80 outbound to the IP address.
105101

106102
1. When you ran the outbound check to 172.131.0.100 in step 4 of **Use IP flow verify**, you learned that the **DenyAllOutBound** rule denied communication. That rule equates to the **DenyAllOutBound** rule shown in the picture in step 2 that specifies **0.0.0.0/0** as the **Destination**. This rule denies the outbound communication to 172.131.0.100 because the address is not within the **Destination** of any of the other **Outbound rules** shown in the picture. To allow the outbound communication, you can add a security rule with a higher priority, that allows outbound traffic to port 80 for the 172.131.0.100 address.
107103
1. When you ran the inbound check from 172.131.0.100 in step 5 of **Use IP flow verify**, you learned that the **DenyAllInBound** rule denied communication. That rule equates to the **DenyAllInBound** rule shown in the picture in step 2. The **DenyAllInBound** rule is enforced because no other higher priority rule exists that allows port 80 inbound to the VM from 172.31.0.100. To allow the inbound communication, you could add a security rule with a higher priority, that allows port 80 inbound from 172.31.0.100.

0 commit comments

Comments
 (0)