You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/network-watcher/diagnose-vm-network-traffic-filtering-problem.md
+12-9Lines changed: 12 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ author: halkazwini
6
6
ms.author: halkazwini
7
7
ms.service: network-watcher
8
8
ms.topic: quickstart
9
-
ms.date: 06/23/2023
9
+
ms.date: 07/10/2023
10
10
ms.custom: template-quickstart, engagement-fy23
11
11
#Customer intent: I need to diagnose and troubleshoot a virtual machine (VM) network traffic filter problem that prevents communication to and from a VM.
12
12
---
@@ -17,6 +17,9 @@ Azure allows and denies network traffic to and from a virtual machine based on i
17
17
18
18
In this quickstart, you deploy a virtual machine and use Network Watcher [IP flow verify](network-watcher-ip-flow-verify-overview.md) to test the connectivity to and from different IP addresses. Using the IP flow verify results, you determine the cause of a communication failure and learn how you can resolve it.
19
19
20
+
:::image type="content" source="./media/diagnose-vm-network-traffic-filtering-problem/-ip-flow-verify-quickstart-diagram.png" alt-text="Diagram shows the resources created in Network Watcher quickstart.":::
21
+
22
+
20
23
## Prerequisites
21
24
22
25
- An Azure account with an active subscription. If you don't have an Azure subscription, create a [free account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F) before you begin.
@@ -77,7 +80,7 @@ Sign in to the [Azure portal](https://portal.azure.com) with your Azure account.
77
80
| Public inbound ports | Select **None**. |
78
81
79
82
> [!NOTE]
80
-
> Azure will create a default network security group for **myVm** virtual machine (because you selected **Basic** NIC network security group). You will use this default network security group to test network communication to and from the virtual machine in the next section.
83
+
> Azure will create a default network security group for **myVM** virtual machine (because you selected **Basic** NIC network security group). You will use this default network security group to test network communication to and from the virtual machine in the next section.
81
84
82
85
1. Select **Review + create**.
83
86
@@ -96,8 +99,8 @@ In this section, you use the IP flow verify capability of Network Watcher to tes
| Network interface | Select the network interface of **myVm**. When you use the Azure portal to create a virtual machine, the portal names the network interface using the virtual machine's name and a random number (for example myvm36). |
| Network interface | Select the network interface of **myVM**. When you use the Azure portal to create a virtual machine, the portal names the network interface using the virtual machine's name and a random number (for example myvm36). |
101
104
|**Packet details**||
102
105
| Protocol | Select **TCP**. |
103
106
| Direction | Select **Outbound**. |
@@ -116,9 +119,9 @@ In this section, you use the IP flow verify capability of Network Watcher to tes
116
119
117
120
:::image type="content" source="./media/diagnose-vm-network-traffic-filtering-problem/ip-flow-verify-first-test-results.png" alt-text="Screenshot shows the result of IP flow verify to IP address 13.107.21.200." lightbox="./media/diagnose-vm-network-traffic-filtering-problem/ip-flow-verify-first-test-results.png":::
118
121
119
-
1. Change **Remote IP address** to **10.0.0.10** and repeat the test by selecting **Verify IP flow** button again. The result of the second test indicates that access is allowed to **10.0.0.10** because of the default security rule **AllowVnetOutBound**.
122
+
1. Change **Remote IP address** to **10.0.1.10**, which is a private IP address in **myVNet** address space. Then, repeat the test by selecting **Verify IP flow** button again. The result of the second test indicates that access is allowed to **10.0.1.10** because of the default security rule **AllowVnetOutBound**.
120
123
121
-
:::image type="content" source="./media/diagnose-vm-network-traffic-filtering-problem/ip-flow-verify-second-test-results.png" alt-text="Screenshot shows the result of IP flow verify to IP address 10.0.0.10." lightbox="./media/diagnose-vm-network-traffic-filtering-problem/ip-flow-verify-second-test-results.png":::
124
+
:::image type="content" source="./media/diagnose-vm-network-traffic-filtering-problem/ip-flow-verify-second-test-results.png" alt-text="Screenshot shows the result of IP flow verify to IP address 10.0.1.10." lightbox="./media/diagnose-vm-network-traffic-filtering-problem/ip-flow-verify-second-test-results.png":::
122
125
123
126
1. Change **Remote IP address** to **10.10.10.10** and repeat the test. The result of the third test indicates that access is denied to **10.10.10.10** because of the default security rule **DenyAllOutBound**.
124
127
@@ -130,7 +133,7 @@ In this section, you use the IP flow verify capability of Network Watcher to tes
130
133
131
134
## View details of a security rule
132
135
133
-
To determine why the rules in the previous section allow or deny communication, review the effective security rules for the network interface in **myVm** virtual machine.
136
+
To determine why the rules in the previous section allow or deny communication, review the effective security rules for the network interface in **myVM** virtual machine.
134
137
135
138
1. Under **Network diagnostic tools** in **Network Watcher**, select **Effective security rules**.
136
139
@@ -143,7 +146,7 @@ To determine why the rules in the previous section allow or deny communication,
143
146
| Virtual machine | Select **myVM**. |
144
147
145
148
> [!NOTE]
146
-
> **myVm** virtual machine has one network interface which will be selected once you select **myVm**. If your virtual machine has more than one network interface, choose the one that you want to see its effective security rules.
149
+
> **myVM** virtual machine has one network interface that will be selected once you select **myVM**. If your virtual machine has more than one network interface, choose the one that you want to see its effective security rules.
147
150
148
151
:::image type="content" source="./media/diagnose-vm-network-traffic-filtering-problem/effective-security-rules.png" alt-text="Screenshot of Effective security rules in Network Watcher." lightbox="./media/diagnose-vm-network-traffic-filtering-problem/effective-security-rules.png" :::
149
152
@@ -171,4 +174,4 @@ When no longer needed, delete the resource group and all of the resources it con
171
174
172
175
In this quickstart, you created a virtual machine and diagnosed inbound and outbound network traffic filters. You learned that network security group rules allow or deny traffic to and from a virtual machine. Learn more about [network security groups](../virtual-network/network-security-groups-overview.md?toc=%2fazure%2fnetwork-watcher%2ftoc.json) and how to [create security rules](../virtual-network/manage-network-security-group.md?toc=%2fazure%2fnetwork-watcher%2ftoc.json#create-a-security-rule).
173
176
174
-
Even with the proper network traffic filters in place, communication to a virtual machine can still fail, due to routing configuration. To learn how to diagnose virtual machine routing problems, see [Diagnose a virtual machine network routing problem](diagnose-vm-network-routing-problem.md). To diagnose outbound routing, latency, and traffic filtering problems with one tool, see [Troubleshoot connections with Azure Network Watcher](network-watcher-connectivity-portal.md).
177
+
Even with the proper network traffic filters in place, communication to a virtual machine can still fail due to routing configuration. To learn how to diagnose virtual machine routing problems, see [Diagnose a virtual machine network routing problem](diagnose-vm-network-routing-problem.md). To diagnose outbound routing, latency, and traffic filtering problems with one tool, see [Troubleshoot connections with Azure Network Watcher](network-watcher-connectivity-portal.md).
0 commit comments