Skip to content

Commit 8357b21

Browse files
Merge pull request #298438 from mbender-ms/vnet-freshness-updates
virtual Network | Freshness | April 2025
2 parents 5d5457f + 71af3f0 commit 8357b21

5 files changed

+68
-67
lines changed

articles/virtual-network/troubleshoot-vm-connectivity.md

Lines changed: 14 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -4,11 +4,10 @@ description: Learn how to diagnose and resolve connectivity problems that affect
44
author: asudbring
55
ms.author: allensu
66
manager: dcscontentpm
7-
audience: ITPro
87
ms.topic: troubleshooting
98
ms.service: azure-virtual-network
109
ms.localizationpriority: medium
11-
ms.date: 08/29/2019
10+
ms.date: 04/17/2025
1211
---
1312

1413
# Troubleshoot Azure VM connectivity problems
@@ -17,9 +16,9 @@ This article helps administrators diagnose and resolve connectivity problems tha
1716

1817
## Problems
1918

20-
- [An Azure VM that’s deployed by using Resource Manager can't connect to another Azure VM in same virtual network](#azure-vm-cannot-connect-to-another-azure-vm-in-same-virtual-network).
21-
- [An Azure VM can't connect to the second network adapter of an Azure VM in same virtual network](#azure-vm-cannot-connect-to-the-second-network-adapter-of-an-azure-vm-in-same-virtual-network).
22-
- [An Azure VM can't connect to the internet](#azure-vm-cannot-connect-to-the-internet).
19+
- [An Azure VM that’s deployed by using Resource Manager can't connect to another Azure VM in same virtual network](#azure-vm-cant-connect-to-another-azure-vm-in-same-virtual-network).
20+
- [An Azure VM can't connect to the second network adapter of an Azure VM in same virtual network](#azure-vm-cant-connect-to-the-second-network-adapter-of-an-azure-vm-in-same-virtual-network).
21+
- [An Azure VM can't connect to the internet](#azure-vm-cant-connect-to-the-internet).
2322

2423
To resolve these problems, follow the steps in the following section.
2524

@@ -31,7 +30,7 @@ To resolve these problems, follow the steps in the following section.
3130
>
3231
## Resolution
3332

34-
### Azure VM cannot connect to another Azure VM in same virtual network
33+
### Azure VM can't connect to another Azure VM in same virtual network
3534

3635
#### Step 1: Verify that VMs can communicate with each other.
3736

@@ -51,10 +50,10 @@ To resolve these problems, follow the steps in the following section.
5150
5251
#### Step 2: Check the Network security group settings.
5352
54-
For each VM, check for default Inbound port rules ("Allow VNet Inbound" and "Allow Load Balancer Inbound"). Make sure to also check that there are no matching blocking rules that are listed below a lower-priority rule.
53+
For each VM, check for default Inbound port rules of *Allow VNet Inbound* and *Allow Load Balancer Inbound*. Make sure to also check that there are no matching blocking rules that are listed below a lower-priority rule.
5554
5655
> [!NOTE]
57-
> Rules that have a lower number will be matched first. For example, if you have a rule that has priority 1000 and 6500, the rule that has priority 1000 will be matched first.
56+
> Rules that have a lower number are matched first. For example, if you have a rule that has priority 1000 and 6500, the rule that has priority 1000 is matched first.
5857
5958
After that, try to ping the destination from the source VM again:
6059
@@ -136,20 +135,20 @@ Hops : [
136135
|Issue type |Value |Resolution action |
137136
|---------|---------|---------|
138137
|NetworkSecurityRule|Name of the blocking NSG|You can [delete the NSG rule](./manage-network-security-group.md#delete-a-security-rule) or modify the rule as described [here](./manage-network-security-group.md#change-a-security-rule).|
139-
|UserDefinedRoute | Name of the blocking UDR | If you do not require this route, delete the UDR. If you can’t delete the route, update the route by using the appropriate address prefix and next hop. You can also adjust the Network Virtual Appliance to forward traffic appropriately. For more information, see: [Virtual network traffic routing](./virtual-networks-udr-overview.md) and [Route network traffic with a route table using PowerShell](./tutorial-create-route-table-powershell.md).|
138+
|UserDefinedRoute | Name of the blocking UDR | If you don't require this route, delete the UDR. If you can’t delete the route, update the route by using the appropriate address prefix and next hop. You can also adjust the Network Virtual Appliance to forward traffic appropriately. For more information, see: [Virtual network traffic routing](./virtual-networks-udr-overview.md) and [Route network traffic with a route table using PowerShell](./tutorial-create-route-table-powershell.md).|
140139
|CPU | Usage | Follow these recommendations that describe in [Generic performance troubleshooting for Azure Virtual Machine running Linux or Windows](https://support.microsoft.com/en-in/help/3150851/generic-performance-troubleshooting-for-azure-virtual-machine-running).|
141140
|Memory | Usage | Follow the recommendations that are described in [Generic performance troubleshooting for Azure Virtual Machine running Linux or Windows](https://support.microsoft.com/en-in/help/3150851/generic-performance-troubleshooting-for-azure-virtual-machine-running).|
142-
|Guest Firewall | Name of the firewall blocking | Follow these steps: [Turn Windows Defender Firewall on or off](https://support.microsoft.com/help/4028544/windows-turn-windows-firewall-on-or-off).|
141+
|Guest Firewall | Name of the firewall blocking | Follow these steps: [Turn Windows Firewall on or off](https://support.microsoft.com/help/4028544/windows-turn-windows-firewall-on-or-off).|
143142
|DNS Resolution | Name of the DNS | Follow these steps: [Azure DNS troubleshooting guide](../dns/dns-troubleshoot.md) and [Name resolution for resources in Azure virtual networks](./virtual-networks-name-resolution-for-vms-and-role-instances.md). |
144143
|Socket Error | Not applicable | The specified port is already in use by another application. Try to use a different port. |
145144

146145
3. Run the connectivity check again to determine whether the problem is resolved.
147146

148-
### Azure VM cannot connect to the second network adapter of an Azure VM in same virtual network
147+
### Azure VM can't connect to the second network adapter of an Azure VM in same virtual network
149148

150149
#### Step 1: Make sure that the second network adapter is enabled to talk outside the subnet.
151150

152-
By default, secondary network adapters (also known as network interface cards, or network adapters) are not configured to have a default gateway. Therefore, the traffic flow on the secondary adapter will be limited to the same subnet.
151+
By default, secondary network adapters (also known as network interface cards, or network adapters) aren't configured to have a default gateway. Therefore, the traffic flow on the secondary adapter will be limited to the same subnet.
153152

154153
![IP configures](media/troubleshoot-vm-connectivity/ipconfig.png)
155154

@@ -168,15 +167,15 @@ If users want to enable secondary network adapters to talk outside their own sub
168167
Route add 0.0.0.0 mask 0.0.0.0 -p 192.168.0.1
169168
```
170169
171-
3. Run route print. If the entry is added successfully, you will see an entry that resembles the following:
170+
3. Run route print. If the entry is added successfully, you'll see an entry that resembles the following:
172171
173172
![IP route](media/troubleshoot-vm-connectivity/iproute.png)
174173
175174
Now, try to connect to secondary network adapter. If the connection is still unsuccessful, go to next step.
176175
177176
#### Step 2: Check NSG settings for the network adapters.
178177
179-
For both the primary and secondary network adapters, check the default Inbound port rules (Allow VNet Inbound, Allow Load Balancer) to inbound on both network adapters. You should also make sure that there are no matching blocking rules that have a lower-priority rule above them.
178+
For both the primary and secondary network adapters, check the default Inbound port rules of **Allow VNet Inbound** and **Allow Load Balancer** allow inbound on both network adapters. You should also make sure that there are no matching blocking rules that have a lower-priority rule above them.
180179
181180
![Screenshot shows the Networking settings for a virtual machine where you can see Allow V net Inbound and Allow V net OutBound.](media/troubleshoot-vm-connectivity/nsg.png)
182181
@@ -229,7 +228,7 @@ Hops : [
229228
230229
#### Step 4: Refer the table under [Step 5](#step-5-fix-the-issue-in-the-connectivity-check-result), and follow these steps to resolve the issues.
231230
232-
### Azure VM cannot connect to the internet
231+
### Azure VM can't connect to the internet
233232
234233
#### Step 1: Check whether the network adapter is in a failed state.
235234

articles/virtual-network/tutorial-tap-virtual-network-cli.md

Lines changed: 13 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,26 +1,26 @@
11
---
2-
title: Create, change, or delete a VNet TAP - Azure CLI
2+
title: Create, change, or delete a virtual network TAP - Azure CLI
33
description: Learn how to create, change, or delete a virtual network TAP using the Azure CLI.
44
services: virtual-network
55
author: asudbring
66
manager: ganesr
77
ms.service: azure-virtual-network
88
ms.topic: how-to
9-
ms.date: 03/18/2018
9+
ms.date: 04/17/2025
1010
ms.author: allensu
1111
ms.custom: devx-track-azurecli
1212
---
1313

1414
# Work with a virtual network TAP using the Azure CLI
1515

1616
> [!IMPORTANT]
17-
> Virtual network TAP Preview is currently in Preview in select Azure regions. You can sign up for our Previews using the sign form (https://forms.office.com/r/EWqbgLGNcV) and we will notify you when you are selected. In the interim, you can use agent based or NVA solutions that provide TAP/Network Visibility functionality through our [Packet Broker partner solutions](virtual-network-tap-overview.md#virtual-network-tap-partner-solutions) available in [Azure Marketplace Offerings](https://azuremarketplace.microsoft.com/marketplace/apps/category/networking?page=1&subcategories=appliances%3Ball&search=Network%20Traffic&filters=partners).
17+
> Virtual network TAP Preview is currently in Preview in select Azure regions. You can sign up for our Previews using the sign form (https://forms.office.com/r/EWqbgLGNcV) and we'll notify you when you're selected. In the interim, you can use agent based or NVA solutions that provide TAP/Network Visibility functionality through our [Packet Broker partner solutions](virtual-network-tap-overview.md#virtual-network-tap-partner-solutions) available in [Azure Marketplace Offerings](https://azuremarketplace.microsoft.com/marketplace/apps/category/networking?page=1&subcategories=appliances%3Ball&search=Network%20Traffic&filters=partners).
1818
1919
Azure virtual network TAP (Terminal Access Point) allows you to continuously stream your virtual machine network traffic to a network packet collector or analytics tool. The collector or analytics tool is provided by a [network virtual appliance](https://azure.microsoft.com/solutions/network-appliances/) partner. For a list of partner solutions that are validated to work with virtual network TAP, see [partner solutions](virtual-network-tap-overview.md#virtual-network-tap-partner-solutions).
2020

2121
## Create a virtual network TAP resource
2222

23-
Read [prerequisites](virtual-network-tap-overview.md#prerequisites) before you create a virtual network TAP resource. You can run the commands that follow in the [Azure Cloud Shell](https://shell.azure.com/bash), or by running the Azure CLI from your computer. The Azure Cloud Shell is a free interactive shell that doesn't require installing the Azure CLI on your computer. You must sign in to Azure with an account that has the appropriate [permissions](virtual-network-tap-overview.md#permissions). This article requires the Azure CLI version 2.0.46 or later. Run `az --version` to find the installed version. If you need to install or upgrade, see [Install Azure CLI 2.0](/cli/azure/install-azure-cli). Virtual network TAP is currently available as an extension. To install the extension you need to run `az extension add -n virtual-network-tap`. If you are running the Azure CLI locally, you also need to run `az login` to create a connection with Azure.
23+
Read [prerequisites](virtual-network-tap-overview.md#prerequisites) before you create a virtual network TAP resource. You can run the commands that follow in the [Azure Cloud Shell](https://shell.azure.com/bash), or by running the Azure CLI from your computer. The Azure Cloud Shell is a free interactive shell that doesn't require installing the Azure CLI on your computer. You must sign in to Azure with an account that has the appropriate [permissions](virtual-network-tap-overview.md#permissions). This article requires the Azure CLI version 2.0.46 or later. Run `az --version` to find the installed version. If you need to install or upgrade, see [Install Azure CLI 2.0](/cli/azure/install-azure-cli). Virtual network TAP is currently available as an extension. To install the extension you need to run `az extension add -n virtual-network-tap`. If you're running the Azure CLI locally, you also need to run `az login` to create a connection with Azure.
2424

2525
1. Retrieve the ID of your subscription into a variable that is used in a later step:
2626

@@ -30,21 +30,21 @@ Read [prerequisites](virtual-network-tap-overview.md#prerequisites) before you c
3030
--out tsv)
3131
```
3232

33-
2. Set the subscription id that you will use to create a virtual network TAP resource.
33+
2. Set the subscription ID that you'll use to create a virtual network TAP resource.
3434

3535
```azurecli-interactive
3636
az account set --subscription $subscriptionId
3737
```
3838

39-
3. Re-register the subscription ID that you'll use to create a virtual network TAP resource. If you get a registration error when you create a TAP resource, run the following command:
39+
3. Re-register the subscription ID that you use to create a virtual network TAP resource. If you get a registration error when you create a TAP resource, run the following command:
4040

4141
```azurecli-interactive
4242
az provider register --namespace Microsoft.Network --subscription $subscriptionId
4343
```
4444

45-
4. If the destination for the virtual network TAP is the network interface on the network virtual appliance for collector or analytics tool -
45+
4. If the destination for the virtual network TAP is the network interface on the network virtual appliance for collector or analytics tool:
4646

47-
- Retrieve the IP configuration of the network virtual appliance's network interface into a variable that is used in a later step. The ID is the end point that will aggregate the TAP traffic. The following example retrieves the ID of the *ipconfig1* IP configuration for a network interface named *myNetworkInterface*, in a resource group named *myResourceGroup*:
47+
- Retrieve the IP configuration of the network virtual appliance's network interface into a variable that is used in a later step. The ID is the end point that aggregates the TAP traffic. The following example retrieves the ID of the *ipconfig1* IP configuration for a network interface named *myNetworkInterface*, in a resource group named *myResourceGroup*:
4848

4949
```azurecli-interactive
5050
IpConfigId=$(az network nic ip-config show \
@@ -67,7 +67,7 @@ Read [prerequisites](virtual-network-tap-overview.md#prerequisites) before you c
6767
6868
5. If the destination for the virtual network TAP is an Azure internal load balancer:
6969
70-
- Retrieve the front end IP configuration of the Azure internal load balancer into a variable that is used in a later step. The ID is the end point that will aggregate the TAP traffic. The following example retrieves the ID of the *frontendipconfig1* front end IP configuration for a load balancer named *myInternalLoadBalancer*, in a resource group named *myResourceGroup*:
70+
- Retrieve the front end IP configuration of the Azure internal load balancer into a variable that is used in a later step. The ID is the end point that aggregates the TAP traffic. The following example retrieves the ID of the *frontendipconfig1* front end IP configuration for a load balancer named *myInternalLoadBalancer*, in a resource group named *myResourceGroup*:
7171
7272
```azurecli-interactive
7373
FrontendIpConfigId=$(az network lb frontend-ip show \
@@ -78,7 +78,7 @@ Read [prerequisites](virtual-network-tap-overview.md#prerequisites) before you c
7878
--out tsv)
7979
```
8080
81-
- Create the virtual network TAP using the ID of the frontend IP configuration as the destination and an optional port property. The port specifies the destination port on front end IP configuration where the TAP traffic will be received :
81+
- Create the virtual network TAP using the ID of the frontend IP configuration as the destination and an optional port property. The port specifies the destination port on front end IP configuration where the TAP traffic will be received:
8282
8383
```azurecli-interactive
8484
az network vnet tap create \
@@ -153,3 +153,6 @@ Read [prerequisites](virtual-network-tap-overview.md#prerequisites) before you c
153153
--resource-group myResourceGroup \
154154
--name myTap
155155
```
156+
157+
## Next steps
158+
- [Virtual network TAP overview](virtual-network-tap-overview.md)

0 commit comments

Comments
 (0)