Skip to content

Commit fa67d4b

Browse files
committed
updated screenshots and verbiage for portal changes
1 parent aa568a3 commit fa67d4b

File tree

3 files changed

+33
-33
lines changed

3 files changed

+33
-33
lines changed

articles/virtual-network/diagnose-network-traffic-filter-problem.md

Lines changed: 33 additions & 33 deletions
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ The steps that follow assume you have an existing VM to view the effective secur
3232

3333
:::image type="content" source="./media/diagnose-network-traffic-filter-problem/view-security-rules.png" alt-text="Screenshot of security rules for NSG nsg-subnet." lightbox="./media/diagnose-network-traffic-filter-problem/view-security-rules.png":::
3434

35-
:::image type="content" source="./media/diagnose-network-traffic-filter-problem/view-security-rules2.png" alt-text="Screenshot of security rules for NSG nsg-nic." lightbox="./media/diagnose-network-traffic-filter-problem/view-security-rules.png":::
35+
:::image type="content" source="./media/diagnose-network-traffic-filter-problem/view-security-rules2.png" alt-text="Screenshot of security rules for NSG nsg-nic." lightbox="./media/diagnose-network-traffic-filter-problem/view-security-rule2.png":::
3636

3737

3838
The rules you see listed in the previous figures are for a network interface named **vm-1445**. You see that there are **Inbound port rules** for the network interface from two different network security groups:
@@ -42,33 +42,27 @@ The steps that follow assume you have an existing VM to view the effective secur
4242

4343
The rule named **DenyAllInBound** is what's preventing inbound communication to the VM over port 80, from the internet, as described in the [scenario](#scenario). The rule lists *0.0.0.0/0* for **SOURCE**, which includes the internet. No other rule with a higher priority (lower number) allows port 80 inbound. To allow port 80 inbound to the VM from the internet, see [Resolve a problem](#resolve-a-problem). To learn more about security rules and how Azure applies them, see [Network security groups](./network-security-groups-overview.md).
4444

45-
At the bottom of the picture, you also see **Outbound port rules**. The outbound port rules for the network interface are listed. Though the picture only shows four inbound rules for each NSG, your NSGs may have many more than four rules. In the picture, you see **VirtualNetwork** under **Source** and **Destination** and **AzureLoadBalancer** under **SOURCE**. **VirtualNetwork** and **AzureLoadBalancer** are [service tags](./network-security-groups-overview.md#service-tags). Service tags represent a group of IP address prefixes to help minimize complexity for security rule creation.
45+
At the bottom of the picture, you also see **Outbound port rules**. The outbound port rules for the network interface are listed.
4646

47-
1. To view the effective security rules, select the interface in the network settings of the virtual machine.
47+
Though the picture only shows four inbound rules for each NSG, your NSGs may have many more than four rules. In the picture, you see **VirtualNetwork** under **Source** and **Destination** and **AzureLoadBalancer** under **SOURCE**. **VirtualNetwork** and **AzureLoadBalancer** are [service tags](./network-security-groups-overview.md#service-tags). Service tags represent a group of IP address prefixes to help minimize complexity for security rule creation.
4848

49-
49+
1. To view the effective security rules, select the interface in the network settings of the virtual machine. Ensure the VM is in a running state before proceeding.
5050

51+
1. In the settings for the network interface, expand **Help**, then select **Effective security rules**.
5152

53+
The following example shows the example network interface **vm-1445** with the **Effective security rules** selected.
5254

53-
4. Ensure that the VM is in the running state, and then select **Effective security rules**, as shown in the previous picture, to see the effective security rules, shown in the following picture:
54-
55-
![Screenshot shows the Effective security rules pane with Download selected and AllowAzureLoadBalancerInbound Inbound rule selected.](./media/diagnose-network-traffic-filter-problem/view-effective-security-rules.png)
56-
55+
:::image type="content" source="./media/diagnose-network-traffic-filter-problem/view-effective-security-rules.png" alt-text="Screenshot of effective security rules for network interface vm-1445." lightbox="./media/diagnose-network-traffic-filter-problem/view-effective-security-rules.png":::
56+
5757
The rules listed are the same as you saw in step 3, though there are different tabs for the NSG associated to the network interface and the subnet. As you can see in the picture, only the first 50 rules are shown. To download a .csv file that contains all of the rules, select **Download**.
5858

59-
To see which prefixes each service tag represents, select a rule, such as the rule named **AllowAzureLoadBalancerInbound**. The following picture shows the prefixes for the **AzureLoadBalancer** service tag:
60-
61-
![Screenshot shows Address prefixes for AllowAzureLoadBalancerInbound entered.](./media/diagnose-network-traffic-filter-problem/address-prefixes.png)
62-
63-
Though the **AzureLoadBalancer** service tag only represents one prefix, other service tags represent several prefixes.
64-
65-
5. The previous steps showed the security rules for a network interface named **myVMVMNic**, but you've also seen a network interface named **myVMVMNic2** in some of the previous pictures. The VM in this example has two network interfaces attached to it. The effective security rules can be different for each network interface.
59+
1. The previous steps showed the security rules for a network interface named **vm-1445**. What if a VM has two network interfaces? The VM in this example has two network interfaces attached to it. The effective security rules can be different for each network interface.
6660

67-
To see the rules for the **myVMVMNic2** network interface, select it. As shown in the picture that follows, the network interface has the same rules associated to its subnet as the **myVMVMNic** network interface, because both network interfaces are in the same subnet. When you associate an NSG to a subnet, its rules are applied to all network interfaces in the subnet.
61+
To see the rules for the **vm-nic-2** network interface, select it. As shown in the example that follows, the network interface has the same rules associated to its subnet as the **vm-1445** network interface, because both network interfaces are in the same subnet. When you associate an NSG to a subnet, its rules are applied to all network interfaces in the subnet.
6862

69-
![Screenshot shows the Azure portal with Networking settings for my V M V M Nic 2.](./media/diagnose-network-traffic-filter-problem/view-security-rules2.png)
63+
:::image type="content" source="./media/diagnose-network-traffic-filter-problem/view-security-rules3.png" alt-text="Screenshot of security rules for nic vm-nic-2." lightbox="./media/diagnose-network-traffic-filter-problem/view-security-rule3.png":::
7064

71-
Unlike the **myVMVMNic** network interface, the **myVMVMNic2** network interface does not have a network security group associated to it. Each network interface and subnet can have zero, or one, NSG associated to it. The NSG associated to each network interface or subnet can be the same, or different. You can associate the same network security group to as many network interfaces and subnets as you choose.
65+
Unlike the **vm-1445** network interface, the **vm-nic-2** network interface does not have a network security group associated to it. Each network interface and subnet can have zero, or one, NSG associated to it. The NSG associated to each network interface or subnet can be the same, or different. You can associate the same network security group to as many network interfaces and subnets as you choose.
7266

7367
Though effective security rules were viewed through the VM, you can also view effective security rules through an individual:
7468
- **Network interface**: Learn how to [view a network interface](virtual-network-network-interface.md#view-network-interface-settings).
@@ -80,12 +74,14 @@ Though effective security rules were viewed through the VM, you can also view ef
8074

8175
You can run the commands that follow in the [Azure Cloud Shell](https://shell.azure.com/powershell), or by running PowerShell from your computer. The Azure Cloud Shell is a free interactive shell. It has common Azure tools preinstalled and configured to use with your account. If you run PowerShell from your computer, you need the Azure PowerShell module, version 1.0.0 or later. Run `Get-Module -ListAvailable Az` on your computer, to find the installed version. If you need to upgrade, see [Install Azure PowerShell module](/powershell/azure/install-azure-powershell). If you are running PowerShell locally, you also need to run `Connect-AzAccount` to log into Azure with an account that has the [necessary permissions](virtual-network-network-interface.md#permissions)].
8276

83-
Get the effective security rules for a network interface with [Get-AzEffectiveNetworkSecurityGroup](/powershell/module/az.network/get-azeffectivenetworksecuritygroup). The following example gets the effective security rules for a network interface named *myVMVMNic*, that is in a resource group named *myResourceGroup*:
77+
Get the effective security rules for a network interface with [Get-AzEffectiveNetworkSecurityGroup](/powershell/module/az.network/get-azeffectivenetworksecuritygroup). The following example gets the effective security rules for a network interface named *vm-nic*, that is in a resource group named *test-rg*:
8478

8579
```azurepowershell-interactive
86-
Get-AzEffectiveNetworkSecurityGroup `
87-
-NetworkInterfaceName myVMVMNic `
88-
-ResourceGroupName myResourceGroup
80+
$Params = @{
81+
NetworkInterfaceName = "vm-nic"
82+
ResourceGroupName = "test-rg"
83+
}
84+
Get-AzEffectiveNetworkSecurityGroup @Params
8985
```
9086

9187
Output is returned in json format. To understand the output, see [interpret command output](#interpret-command-output).
@@ -96,7 +92,11 @@ If you're still having a connectivity problem, see [additional diagnosis](#addit
9692
If you don't know the name of a network interface, but do know the name of the VM the network interface is attached to, the following commands return the IDs of all network interfaces attached to a VM:
9793

9894
```azurepowershell-interactive
99-
$VM = Get-AzVM -Name myVM -ResourceGroupName myResourceGroup
95+
$Params = @{
96+
Name = "vm-1"
97+
ResourceGroupName = "test-rg"
98+
}
99+
$VM = Get-AzVM @Params
100100
$VM.NetworkProfile
101101
```
102102

@@ -105,21 +105,21 @@ You receive output similar to the following example:
105105
```output
106106
NetworkInterfaces
107107
-----------------
108-
{/subscriptions/<ID>/resourceGroups/myResourceGroup/providers/Microsoft.Network/networkInterfaces/myVMVMNic
108+
{/subscriptions/<ID>/resourceGroups/myResourceGroup/providers/Microsoft.Network/networkInterfaces/vm-nic
109109
```
110110

111-
In the previous output, the network interface name is *myVMVMNic*.
111+
In the previous output, the network interface name is *vm-nic*.
112112

113113
## Diagnose using Azure CLI
114114

115115
If using Azure CLI commands to complete tasks in this article, either run the commands in the [Azure Cloud Shell](https://shell.azure.com/bash), or by running the Azure CLI from your computer. This article requires the Azure CLI version 2.0.32 or later. Run `az --version` to find the installed version. If you need to install or upgrade, see [Install Azure CLI](/cli/azure/install-azure-cli). If you're running the Azure CLI locally, you also need to run `az login` and log into Azure with an account that has the [necessary permissions](virtual-network-network-interface.md#permissions).
116116

117-
Get the effective security rules for a network interface with [az network nic list-effective-nsg](/cli/azure/network/nic#az-network-nic-list-effective-nsg). The following example gets the effective security rules for a network interface named *myVMVMNic* that is in a resource group named *myResourceGroup*:
117+
Get the effective security rules for a network interface with [az network nic list-effective-nsg](/cli/azure/network/nic#az-network-nic-list-effective-nsg). The following example gets the effective security rules for a network interface named *vm-nic* that is in a resource group named *test-rg*:
118118

119119
```azurecli-interactive
120120
az network nic list-effective-nsg \
121-
--name myVMVMNic \
122-
--resource-group myResourceGroup
121+
--name vm-nic \
122+
--resource-group test-rg
123123
```
124124

125125
Output is returned in json format. To understand the output, see [interpret command output](#interpret-command-output).
@@ -131,8 +131,8 @@ If you don't know the name of a network interface, but do know the name of the V
131131

132132
```azurecli-interactive
133133
az vm show \
134-
--name myVM \
135-
--resource-group myResourceGroup
134+
--name vm-1 \
135+
--resource-group test-rg
136136
```
137137

138138
Within the returned output, you see information similar to the following example:
@@ -143,13 +143,13 @@ Within the returned output, you see information similar to the following example
143143
"networkInterfaces": [
144144
{
145145
"additionalProperties": {},
146-
"id": "/subscriptions/<ID>/resourceGroups/myResourceGroup/providers/Microsoft.Network/networkInterfaces/myVMVMNic",
146+
"id": "/subscriptions/<ID>/resourceGroups/test-rg/providers/Microsoft.Network/networkInterfaces/vm-nic",
147147
"primary": true,
148-
"resourceGroup": "myResourceGroup"
148+
"resourceGroup": "test-rg"
149149
},
150150
```
151151

152-
In the previous output, the network interface name is *myVMVMNic interface*.
152+
In the previous output, the network interface name is **vm-nic**
153153

154154
## Interpret command output
155155

348 KB
Loading
612 KB
Loading

0 commit comments

Comments
 (0)