You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
You may experience VM or VPN connectivity issues and errors when using a third party Network Virtual Appliance (NVA) in Microsoft Azure. This article provides basic steps to help you validate basic Azure Platform requirements for NVA configurations.
17
+
You might experience VM or VPN connectivity issues and errors when using a partner Network Virtual Appliance (NVA) in Microsoft Azure. This article provides basic steps to help you validate basic Azure Platform requirements for NVA configurations.
18
18
19
-
Technical support for third-party NVAs and their integration with the Azure platform is provided by the NVA vendor.
19
+
Technical support for partner NVAs and their integration with the Azure platform is provided by the NVA vendor.
20
20
21
21
> [!NOTE]
22
22
> If you have a connectivity or routing problem that involves an NVA, you should [contact the vendor of the NVA](https://mskb.pkisolutions.com/kb/2984655) directly.
@@ -26,17 +26,25 @@ Technical support for third-party NVAs and their integration with the Azure plat
26
26
## Checklist for troubleshooting with NVA vendor
27
27
28
28
- Software updates for NVA VM software
29
+
29
30
- Service Account setup and functionality
31
+
30
32
- User-defined routes (UDRs) on virtual network subnets that direct traffic to NVA
33
+
31
34
- UDRs on virtual network subnets that direct traffic from NVA
35
+
32
36
- Routing tables and rules within the NVA (for example, from NIC1 to NIC2)
33
-
- Tracing on NVA NICs to verify receiving and sending network traffic
34
-
- When using a Standard SKU and Public IPs, there must be an NSG created and an explicit rule to allow the traffic to be routed to the NVA.
37
+
38
+
- Tracing on NVA network interfaces to verify receiving and sending network traffic
39
+
40
+
- Use of a Standard version Public IP. There must be an NSG created and an explicit rule to allow the traffic to be routed to the NVA.
35
41
36
42
## Basic troubleshooting steps
37
43
38
44
- Check the basic configuration
45
+
39
46
- Check NVA performance
47
+
40
48
- Advanced network troubleshooting
41
49
42
50
## Check the minimum configuration requirements for NVAs on Azure
@@ -45,74 +53,91 @@ Each NVA has basic configuration requirements to function correctly on Azure. Th
45
53
46
54
**Check whether IP forwarding is enabled on NVA**
47
55
48
-
Use Azure portal
56
+
### [Portal](#tab/portal)
49
57
50
58
1. Locate the NVA resource in the [Azure portal](https://portal.azure.com), select Networking, and then select the Network interface.
51
-
2. On the Network interface page, select IP configuration.
52
-
3. Make sure that IP forwarding is enabled.
53
59
54
-
Use PowerShell
60
+
1. On the Network interface page, select IP configuration.
61
+
62
+
1. Ensure that the IP forwarding checkbox is selected.
55
63
56
-
1. Open PowerShell and then sign in to your Azure account.
57
-
2. Run the following command (replace the bracketed values with your information):
64
+
### [PowerShell](#tab/powershell)
65
+
66
+
1. Open PowerShell and sign-in to your Azure account.
67
+
68
+
1. Execute the following command. Replace the bracketed values with your information:
The output should look similar to the following example:
86
+
87
+
```output
71
88
EnableIPForwarding : True
72
89
NetworkSecurityGroup : null
73
90
```
74
91
75
-
**Check for NSG when using Standard SKU Public IP**
76
-
When using a Standard SKU and Public IPs, there must be an NSG created and an explicit rule to allow the traffic to the NVA.
92
+
---
93
+
94
+
**Check for NSG when using Standard SKU public IP**
95
+
96
+
Use of a standard version of public IPs. There must be an NSG created and an explicit rule to allow the traffic to the NVA.
77
97
78
98
**Check whether the traffic can be routed to the NVA**
79
99
80
100
1. On [Azure portal](https://portal.azure.com), open **Network Watcher**, select **Next Hop**.
81
-
2. Specify a VM that is configured to redirect the traffic to the NVA, and a destination IP address at which to view the next hop.
82
-
3. If the NVA is not listed as the **next hop**, check and update the Azure route tables.
101
+
102
+
1. Specify a VM that is configured to redirect the traffic to the NVA, and a destination IP address at which to view the next hop.
103
+
104
+
1. If the NVA isn't listed as the **next hop**, check and update the Azure route tables.
83
105
84
106
**Check whether the traffic can reach the NVA**
85
107
86
108
1. In [Azure portal](https://portal.azure.com), open **Network Watcher**, and then select **IP Flow Verify**.
87
-
2. Specify the VM and the IP address of the NVA, and then check whether the traffic is blocked by any Network security groups (NSG).
88
-
3. If there is an NSG rule that blocks the traffic, locate the NSG in **effective security** rules and then update it to allow traffic to pass. Then run **IP Flow Verify** again and use **Connection troubleshoot** to test TCP communications from VM to your internal or external IP address.
109
+
110
+
1. Specify the VM and the IP address of the NVA. Check for traffic blockage by any Network security groups (NSG).
111
+
112
+
1. If there's an NSG rule that blocks the traffic, locate the NSG in **effective security** rules and then update it to allow traffic to pass. Then run **IP Flow Verify** again and use **Connection troubleshoot** to test TCP communications from VM to your internal or external IP address.
89
113
90
114
**Check whether NVA and VMs are listening for expected traffic**
91
115
92
-
1.Connect to the NVA by using RDP or SSH, and then run following command:
116
+
Connect to the NVA by using RDP or SSH, and then run following command:
93
117
94
-
For Windows:
118
+
For Windows:
95
119
96
-
```console
97
-
netstat -an
98
-
```
120
+
```console
121
+
netstat -an
122
+
```
99
123
100
-
For Linux:
124
+
For Linux:
101
125
102
-
```console
103
-
netstat -an | grep -i listen
104
-
```
105
-
2. If you don't see the TCP port that's used by the NVA software that's listed in the results you must configure the application on the NVA and VM to listen and respond to traffic that reaches those ports. [Contact the NVA vendor for assistance as needed](https://mskb.pkisolutions.com/kb/2984655).
126
+
```console
127
+
netstat -an | grep -i listen
128
+
```
106
129
107
-
## Check NVA Performance
130
+
If the TCP port used by the NVA software isn't listed in the results, configure the application on the NVA and VM to listen on those ports. For further assistance, [contact the NVA vendor](https://mskb.pkisolutions.com/kb/2984655).
131
+
132
+
## Check NVA performance
108
133
109
134
### Validate VM CPU
110
135
111
-
If CPU usage gets close to 100 percent, you may experience issues that affect network packet drops. Your VM reports average CPU for a specific time span in the Azure portal. During a CPU spike, investigate which process on the guest VM is causing the high CPU, and mitigate it, if possible. You may also have to resize the VM to a larger SKU size or, for virtual machine scale set, increase the instance count or set to auto-scale on CPU usage. For either of these issues, [contact the NVA vendor for assistance](https://mskb.pkisolutions.com/kb/2984655), as needed.
136
+
If CPU usage gets close to 100 percent, you might experience issues that affect network packet drops. Your VM reports average CPU for a specific time span in the Azure portal. During a CPU spike, investigate which process on the guest VM is causing the high CPU, and mitigate it, if possible. You might also have to resize the VM to a larger SKU size or, for virtual machine scale set, increase the instance count or set to autoscale on CPU usage. For either of these issues, [contact the NVA vendor for assistance](https://mskb.pkisolutions.com/kb/2984655), as needed.
112
137
113
-
### Validate VM Network statistics
138
+
### Validate VM network statistics
114
139
115
-
If the VM network use spikes or shows periods of high usage, you may also have to increase the SKU size of the VM to obtain higher throughput capabilities. You can also redeploy the VM by having Accelerated Networking enabled. To verify whether the NVA supports Accelerated Networking feature, [contact the NVA vendor for assistance](https://mskb.pkisolutions.com/kb/2984655), as needed.
140
+
If the VM network use spikes or shows periods of high usage, you might also have to increase the SKU size of the VM to obtain higher throughput capabilities. You can also redeploy the VM by having Accelerated Networking enabled. To verify whether the NVA supports Accelerated Networking feature, [contact the NVA vendor for assistance](https://mskb.pkisolutions.com/kb/2984655), as needed.
116
141
117
142
## Advanced network administrator troubleshooting
118
143
@@ -122,18 +147,23 @@ Capture a simultaneous network trace on the source VM, the NVA, and the destinat
122
147
1. To capture a simultaneous network trace, run the following command:
1. Use **PsPing** or **Nmap** from the source VM to the destination VM (for example: `PsPing 10.0.0.4:80` or `Nmap -p 80 10.0.0.4`).
131
162
132
-
2. Use **PsPing** or **Nmap** from the source VM to the destination VM (for example: `PsPing 10.0.0.4:80` or `Nmap -p 80 10.0.0.4`).
133
-
3. Open the network trace from the destination VM by using [Network Monitor](https://download.cnet.com/s/network-monitor) or tcpdump. Apply a display filter for the IP of the Source VM you ran **PsPing** or **Nmap** from, such as `IPv4.address==10.0.0.4 (Windows netmon)` or `tcpdump -nn -r vmtrace.cap src or dst host 10.0.0.4` (Linux).
163
+
1. Open the network trace from the destination VM by using [Network Monitor](https://download.cnet.com/s/network-monitor) or tcpdump. Apply a display filter for the IP of the Source VM you ran **PsPing** or **Nmap** from, such as `IPv4.address==10.0.0.4 (Windows netmon)` or `tcpdump -nn -r vmtrace.cap src or dst host 10.0.0.4` (Linux).
134
164
135
165
### Analyze traces
136
166
137
-
If you do not see the packets incoming to the backend VM trace, there is likely an NSG or UDR interfering or the NVA routing tables are incorrect.
167
+
If you don't see the packets incoming to the backend VM trace, there's likely an NSG or UDR interfering or the NVA routing tables are incorrect.
138
168
139
-
If you do see the packets coming in but no response, then you may need to address a VM application or a firewall issue. For either of these issues, [contact the NVA vendor for assistance as needed](https://mskb.pkisolutions.com/kb/2984655).
169
+
If you do see the packets coming in but no response, then you might need to address a VM application or a firewall issue. For either of these issues, [contact the NVA vendor for assistance as needed](https://mskb.pkisolutions.com/kb/2984655).
0 commit comments