Skip to content

Commit 7aac10e

Browse files
committed
acrolinx
1 parent 2ac9c48 commit 7aac10e

File tree

1 file changed

+19
-15
lines changed

1 file changed

+19
-15
lines changed

articles/virtual-network/virtual-network-troubleshoot-nva.md

Lines changed: 19 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -14,9 +14,9 @@ ms.author: allensu
1414

1515
[!INCLUDE [updated-for-az](~/reusable-content/ce-skilling/azure/includes/updated-for-az.md)]
1616

17-
You may experience VM or VPN connectivity issues and errors when using a third party Network Virtual Appliance (NVA) in Microsoft Azure. This article provides basic steps to help you validate basic Azure Platform requirements for NVA configurations.
17+
You might experience VM or VPN connectivity issues and errors when using a partner Network Virtual Appliance (NVA) in Microsoft Azure. This article provides basic steps to help you validate basic Azure Platform requirements for NVA configurations.
1818

19-
Technical support for third-party NVAs and their integration with the Azure platform is provided by the NVA vendor.
19+
Technical support for partner NVAs and their integration with the Azure platform is provided by the NVA vendor.
2020

2121
> [!NOTE]
2222
> If you have a connectivity or routing problem that involves an NVA, you should [contact the vendor of the NVA](https://mskb.pkisolutions.com/kb/2984655) directly.
@@ -35,9 +35,9 @@ Technical support for third-party NVAs and their integration with the Azure plat
3535

3636
- Routing tables and rules within the NVA (for example, from NIC1 to NIC2)
3737

38-
- Tracing on NVA NICs to verify receiving and sending network traffic
38+
- Tracing on NVA network interfaces to verify receiving and sending network traffic
3939

40-
- When using a Standard SKU and Public IPs, there must be an NSG created and an explicit rule to allow the traffic to be routed to the NVA.
40+
- Use of a Standard version Public IP. There must be an NSG created and an explicit rule to allow the traffic to be routed to the NVA.
4141

4242
## Basic troubleshooting steps
4343

@@ -73,7 +73,7 @@ Each NVA has basic configuration requirements to function correctly on Azure. Th
7373

7474
1. Check the **EnableIPForwarding** property.
7575

76-
1. If IP forwarding is not enabled, execute the following commands to enable it:
76+
1. If IP forwarding isn't enabled, execute the following commands to enable it:
7777

7878
```powershell
7979
$nic2 = Get-AzNetworkInterface -ResourceGroupName <ResourceGroupName> -Name <NicName>
@@ -90,23 +90,23 @@ Each NVA has basic configuration requirements to function correctly on Azure. Th
9090

9191
**Check for NSG when using Standard SKU public IP**
9292

93-
When using a Standard SKU and public IPs, there must be an NSG created and an explicit rule to allow the traffic to the NVA.
93+
Use of a standard version of public IPs. There must be an NSG created and an explicit rule to allow the traffic to the NVA.
9494

9595
**Check whether the traffic can be routed to the NVA**
9696

9797
1. On [Azure portal](https://portal.azure.com), open **Network Watcher**, select **Next Hop**.
9898

9999
1. Specify a VM that is configured to redirect the traffic to the NVA, and a destination IP address at which to view the next hop.
100100

101-
1. If the NVA is not listed as the **next hop**, check and update the Azure route tables.
101+
1. If the NVA isn't listed as the **next hop**, check and update the Azure route tables.
102102

103103
**Check whether the traffic can reach the NVA**
104104

105105
1. In [Azure portal](https://portal.azure.com), open **Network Watcher**, and then select **IP Flow Verify**.
106106

107-
1. Specify the VM and the IP address of the NVA, and then check whether the traffic is blocked by any Network security groups (NSG).
107+
1. Specify the VM and the IP address of the NVA. Check for traffic blockage by any Network security groups (NSG).
108108

109-
1. If there is an NSG rule that blocks the traffic, locate the NSG in **effective security** rules and then update it to allow traffic to pass. Then run **IP Flow Verify** again and use **Connection troubleshoot** to test TCP communications from VM to your internal or external IP address.
109+
1. If there's an NSG rule that blocks the traffic, locate the NSG in **effective security** rules and then update it to allow traffic to pass. Then run **IP Flow Verify** again and use **Connection troubleshoot** to test TCP communications from VM to your internal or external IP address.
110110

111111
**Check whether NVA and VMs are listening for expected traffic**
112112

@@ -124,17 +124,17 @@ When using a Standard SKU and public IPs, there must be an NSG created and an ex
124124
netstat -an | grep -i listen
125125
```
126126

127-
1. If you don't see the TCP port that's used by the NVA software that's listed in the results you must configure the application on the NVA and VM to listen and respond to traffic that reaches those ports. [Contact the NVA vendor for assistance as needed](https://mskb.pkisolutions.com/kb/2984655).
127+
If the TCP port used by the NVA software isn't listed in the results, configure the application on the NVA and VM to listen on those ports. For further assistance, [contact the NVA vendor](https://mskb.pkisolutions.com/kb/2984655).
128128

129129
## Check NVA performance
130130

131131
### Validate VM CPU
132132

133-
If CPU usage gets close to 100 percent, you may experience issues that affect network packet drops. Your VM reports average CPU for a specific time span in the Azure portal. During a CPU spike, investigate which process on the guest VM is causing the high CPU, and mitigate it, if possible. You may also have to resize the VM to a larger SKU size or, for virtual machine scale set, increase the instance count or set to auto-scale on CPU usage. For either of these issues, [contact the NVA vendor for assistance](https://mskb.pkisolutions.com/kb/2984655), as needed.
133+
If CPU usage gets close to 100 percent, you might experience issues that affect network packet drops. Your VM reports average CPU for a specific time span in the Azure portal. During a CPU spike, investigate which process on the guest VM is causing the high CPU, and mitigate it, if possible. You might also have to resize the VM to a larger SKU size or, for virtual machine scale set, increase the instance count or set to autoscale on CPU usage. For either of these issues, [contact the NVA vendor for assistance](https://mskb.pkisolutions.com/kb/2984655), as needed.
134134

135135
### Validate VM network statistics
136136

137-
If the VM network use spikes or shows periods of high usage, you may also have to increase the SKU size of the VM to obtain higher throughput capabilities. You can also redeploy the VM by having Accelerated Networking enabled. To verify whether the NVA supports Accelerated Networking feature, [contact the NVA vendor for assistance](https://mskb.pkisolutions.com/kb/2984655), as needed.
137+
If the VM network use spikes or shows periods of high usage, you might also have to increase the SKU size of the VM to obtain higher throughput capabilities. You can also redeploy the VM by having Accelerated Networking enabled. To verify whether the NVA supports Accelerated Networking feature, [contact the NVA vendor for assistance](https://mskb.pkisolutions.com/kb/2984655), as needed.
138138

139139
## Advanced network administrator troubleshooting
140140

@@ -144,19 +144,23 @@ Capture a simultaneous network trace on the source VM, the NVA, and the destinat
144144
1. To capture a simultaneous network trace, run the following command:
145145

146146
**For Windows**
147-
147+
148+
```console
148149
netsh trace start capture=yes tracefile=c:\server_IP.etl scenario=netconnection
150+
```
149151

150152
**For Linux**
151153

154+
```console
152155
sudo tcpdump -s0 -i eth0 -X -w vmtrace.cap
156+
```
153157

154158
1. Use **PsPing** or **Nmap** from the source VM to the destination VM (for example: `PsPing 10.0.0.4:80` or `Nmap -p 80 10.0.0.4`).
155159

156160
1. Open the network trace from the destination VM by using [Network Monitor](https://download.cnet.com/s/network-monitor) or tcpdump. Apply a display filter for the IP of the Source VM you ran **PsPing** or **Nmap** from, such as `IPv4.address==10.0.0.4 (Windows netmon)` or `tcpdump -nn -r vmtrace.cap src or dst host 10.0.0.4` (Linux).
157161

158162
### Analyze traces
159163

160-
If you do not see the packets incoming to the backend VM trace, there is likely an NSG or UDR interfering or the NVA routing tables are incorrect.
164+
If you don't see the packets incoming to the backend VM trace, there's likely an NSG or UDR interfering or the NVA routing tables are incorrect.
161165

162-
If you do see the packets coming in but no response, then you may need to address a VM application or a firewall issue. For either of these issues, [contact the NVA vendor for assistance as needed](https://mskb.pkisolutions.com/kb/2984655).
166+
If you do see the packets coming in but no response, then you might need to address a VM application or a firewall issue. For either of these issues, [contact the NVA vendor for assistance as needed](https://mskb.pkisolutions.com/kb/2984655).

0 commit comments

Comments
 (0)