Skip to content

Commit 7944d06

Browse files
author
Jill Grant
authored
Merge pull request #244512 from halkazwini/nw-qs-portal3
Network Watcher: Updates: Quickstart: Diagnose a virtual machine network traffic filter problem using the Azure portal
2 parents 967e3f7 + 726676c commit 7944d06

File tree

3 files changed

+12
-9
lines changed

3 files changed

+12
-9
lines changed

articles/network-watcher/diagnose-vm-network-traffic-filtering-problem.md

Lines changed: 12 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: halkazwini
66
ms.author: halkazwini
77
ms.service: network-watcher
88
ms.topic: quickstart
9-
ms.date: 06/23/2023
9+
ms.date: 07/10/2023
1010
ms.custom: template-quickstart, engagement-fy23
1111
#Customer intent: I need to diagnose and troubleshoot a virtual machine (VM) network traffic filter problem that prevents communication to and from a VM.
1212
---
@@ -17,6 +17,9 @@ Azure allows and denies network traffic to and from a virtual machine based on i
1717

1818
In this quickstart, you deploy a virtual machine and use Network Watcher [IP flow verify](network-watcher-ip-flow-verify-overview.md) to test the connectivity to and from different IP addresses. Using the IP flow verify results, you determine the cause of a communication failure and learn how you can resolve it.
1919

20+
:::image type="content" source="./media/diagnose-vm-network-traffic-filtering-problem/-ip-flow-verify-quickstart-diagram.png" alt-text="Diagram shows the resources created in Network Watcher quickstart.":::
21+
22+
2023
## Prerequisites
2124

2225
- An Azure account with an active subscription. If you don't have an Azure subscription, create a [free account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F) before you begin.
@@ -77,7 +80,7 @@ Sign in to the [Azure portal](https://portal.azure.com) with your Azure account.
7780
| Public inbound ports | Select **None**. |
7881

7982
> [!NOTE]
80-
> Azure will create a default network security group for **myVm** virtual machine (because you selected **Basic** NIC network security group). You will use this default network security group to test network communication to and from the virtual machine in the next section.
83+
> Azure will create a default network security group for **myVM** virtual machine (because you selected **Basic** NIC network security group). You will use this default network security group to test network communication to and from the virtual machine in the next section.
8184
8285
1. Select **Review + create**.
8386

@@ -96,8 +99,8 @@ In this section, you use the IP flow verify capability of Network Watcher to tes
9699
| Setting | Value |
97100
|---------|-------|
98101
| **Target resource** | |
99-
| Virtual machine | Select **myVm** virtual machine. |
100-
| Network interface | Select the network interface of **myVm**. When you use the Azure portal to create a virtual machine, the portal names the network interface using the virtual machine's name and a random number (for example myvm36). |
102+
| Virtual machine | Select **myVM** virtual machine. |
103+
| Network interface | Select the network interface of **myVM**. When you use the Azure portal to create a virtual machine, the portal names the network interface using the virtual machine's name and a random number (for example myvm36). |
101104
| **Packet details** | |
102105
| Protocol | Select **TCP**. |
103106
| Direction | Select **Outbound**. |
@@ -116,9 +119,9 @@ In this section, you use the IP flow verify capability of Network Watcher to tes
116119

117120
:::image type="content" source="./media/diagnose-vm-network-traffic-filtering-problem/ip-flow-verify-first-test-results.png" alt-text="Screenshot shows the result of IP flow verify to IP address 13.107.21.200." lightbox="./media/diagnose-vm-network-traffic-filtering-problem/ip-flow-verify-first-test-results.png":::
118121

119-
1. Change **Remote IP address** to **10.0.0.10** and repeat the test by selecting **Verify IP flow** button again. The result of the second test indicates that access is allowed to **10.0.0.10** because of the default security rule **AllowVnetOutBound**.
122+
1. Change **Remote IP address** to **10.0.1.10**, which is a private IP address in **myVNet** address space. Then, repeat the test by selecting **Verify IP flow** button again. The result of the second test indicates that access is allowed to **10.0.1.10** because of the default security rule **AllowVnetOutBound**.
120123

121-
:::image type="content" source="./media/diagnose-vm-network-traffic-filtering-problem/ip-flow-verify-second-test-results.png" alt-text="Screenshot shows the result of IP flow verify to IP address 10.0.0.10." lightbox="./media/diagnose-vm-network-traffic-filtering-problem/ip-flow-verify-second-test-results.png":::
124+
:::image type="content" source="./media/diagnose-vm-network-traffic-filtering-problem/ip-flow-verify-second-test-results.png" alt-text="Screenshot shows the result of IP flow verify to IP address 10.0.1.10." lightbox="./media/diagnose-vm-network-traffic-filtering-problem/ip-flow-verify-second-test-results.png":::
122125

123126
1. Change **Remote IP address** to **10.10.10.10** and repeat the test. The result of the third test indicates that access is denied to **10.10.10.10** because of the default security rule **DenyAllOutBound**.
124127

@@ -130,7 +133,7 @@ In this section, you use the IP flow verify capability of Network Watcher to tes
130133

131134
## View details of a security rule
132135

133-
To determine why the rules in the previous section allow or deny communication, review the effective security rules for the network interface in **myVm** virtual machine.
136+
To determine why the rules in the previous section allow or deny communication, review the effective security rules for the network interface in **myVM** virtual machine.
134137

135138
1. Under **Network diagnostic tools** in **Network Watcher**, select **Effective security rules**.
136139

@@ -143,7 +146,7 @@ To determine why the rules in the previous section allow or deny communication,
143146
| Virtual machine | Select **myVM**. |
144147

145148
> [!NOTE]
146-
> **myVm** virtual machine has one network interface which will be selected once you select **myVm**. If your virtual machine has more than one network interface, choose the one that you want to see its effective security rules.
149+
> **myVM** virtual machine has one network interface that will be selected once you select **myVM**. If your virtual machine has more than one network interface, choose the one that you want to see its effective security rules.
147150
148151
:::image type="content" source="./media/diagnose-vm-network-traffic-filtering-problem/effective-security-rules.png" alt-text="Screenshot of Effective security rules in Network Watcher." lightbox="./media/diagnose-vm-network-traffic-filtering-problem/effective-security-rules.png" :::
149152

@@ -171,4 +174,4 @@ When no longer needed, delete the resource group and all of the resources it con
171174

172175
In this quickstart, you created a virtual machine and diagnosed inbound and outbound network traffic filters. You learned that network security group rules allow or deny traffic to and from a virtual machine. Learn more about [network security groups](../virtual-network/network-security-groups-overview.md?toc=%2fazure%2fnetwork-watcher%2ftoc.json) and how to [create security rules](../virtual-network/manage-network-security-group.md?toc=%2fazure%2fnetwork-watcher%2ftoc.json#create-a-security-rule).
173176

174-
Even with the proper network traffic filters in place, communication to a virtual machine can still fail, due to routing configuration. To learn how to diagnose virtual machine routing problems, see [Diagnose a virtual machine network routing problem](diagnose-vm-network-routing-problem.md). To diagnose outbound routing, latency, and traffic filtering problems with one tool, see [Troubleshoot connections with Azure Network Watcher](network-watcher-connectivity-portal.md).
177+
Even with the proper network traffic filters in place, communication to a virtual machine can still fail due to routing configuration. To learn how to diagnose virtual machine routing problems, see [Diagnose a virtual machine network routing problem](diagnose-vm-network-routing-problem.md). To diagnose outbound routing, latency, and traffic filtering problems with one tool, see [Troubleshoot connections with Azure Network Watcher](network-watcher-connectivity-portal.md).
Loading
Loading

0 commit comments

Comments
 (0)