Skip to content

Commit 862195b

Browse files
authored
Merge pull request #288358 from halkazwini/nw-qs-sfi
Updates: Quickstart: Diagnose a virtual machine network traffic filter problem using the Azure portal
2 parents ffc2793 + 370e603 commit 862195b

File tree

2 files changed

+1
-3
lines changed

2 files changed

+1
-3
lines changed

articles/network-watcher/diagnose-vm-network-traffic-filtering-problem.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: halkazwini
66
ms.author: halkazwini
77
ms.service: azure-network-watcher
88
ms.topic: quickstart
9-
ms.date: 09/30/2024
9+
ms.date: 10/14/2024
1010

1111
#Customer intent: I want to diagnose a virtual machine (VM) network traffic filter using IP flow verify to know which security rule is denying the traffic and causing the communication problem to the VM.
1212
---
@@ -151,8 +151,6 @@ To determine why the rules in the previous section allow or deny communication,
151151

152152
1. Under **Outbound rules**, select **AllowInternetOutBound** to see the allowed destination IP address prefixes under this security rule.
153153

154-
:::image type="content" source="./media/diagnose-vm-network-traffic-filtering-problem/internet-prefixes.png" alt-text="Screenshot of the prefixes of AllowInternetOutBound rule." lightbox="./media/diagnose-vm-network-traffic-filtering-problem/internet-prefixes.png" :::
155-
156154
You can see that address prefix **13.104.0.0/13** is among the address prefixes of **AllowInternetOutBound** rule. This prefix encompasses IP address **13.107.21.200** which you tested in step 4 of previous section.
157155

158156
Similarly, you can check the other rules to see the source and destination IP address prefixes under each rule.

0 commit comments

Comments
 (0)