Skip to content

Commit

Permalink
Merge pull request #151 from MicrosoftDocs/main
Browse files Browse the repository at this point in the history
Publish to live, Monday 4 AM PST, 9/16
  • Loading branch information
ttorble authored Sep 16, 2024
2 parents 8357bd3 + 2f48230 commit a114d54
Show file tree
Hide file tree
Showing 8 changed files with 7 additions and 8 deletions.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file not shown.
Binary file not shown.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file not shown.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
15 changes: 7 additions & 8 deletions articles/virtual-machines/network-security-group-test.md
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,6 @@ ms.author: halkazwini
ms.service: azure-virtual-machines
ms.topic: how-to
ms.date: 07/17/2023
ms.custom: template-how-to, engagement-fy23
---

# Network security group test
Expand All @@ -19,7 +18,7 @@ In this article, you learn how to use **Network security group test** to check i

- An Azure account with an active subscription. If you don't have one, create a [free account](https://azure.microsoft.com/free/?WT.mc_id=A261C142F) before you begin.

- Sign in to the [Azure portal](https://portal.azure.com/?WT.mc_id=A261C142F) with your Azure account.
- Sign in to the [Azure portal](https://portal.azure.com) with your Azure account.

- An Azure virtual machine (VM). If you don't have one, create [a Linux VM](./linux/quick-create-portal.md) or [a Windows VM](./windows/quick-create-portal.md).

Expand Down Expand Up @@ -58,15 +57,15 @@ In this section, you test if RDP connections are allowed to your VM from a remot
| Port | Leave the default of **3389**. |
| Protocol | Leave the default of **TCP**. |

:::image type="content" source="./media/network-security-group-test/inbound-test.png" alt-text="Screenshot of inbound network security group test in the Azure portal." lightbox="./media/network-security-group-test/inbound-test.png":::
:::image type="content" source="./media/network-security-group-test/inbound.png" alt-text="Screenshot of inbound network security group test in the Azure portal." lightbox="./media/network-security-group-test/inbound.png":::

1. Select **Run test**.

After a few seconds, you see the details of the test:
- If RDP connections are allowed to the VM from the remote IP address, you see **Traffic status: Allowed**.
- If RDP connections are blocked, you see **Traffic status: Denied**. In the Summary section, you see the security rules that are blocking the traffic.

:::image type="content" source="./media/network-security-group-test/inbound-test-result.png" alt-text="Screenshot of inbound network security group test result." lightbox="./media/network-security-group-test/inbound-test-result.png":::
:::image type="content" source="./media/network-security-group-test/inbound-result.png" alt-text="Screenshot of inbound network security group test result." lightbox="./media/network-security-group-test/inbound-result.png":::

To allow the RDP connection to the VM from the remote IP address, add to the network security group a security rule that allows RDP connections from the remote IP address. This security rule must have a higher priority than the one that's blocking the traffic. For more information, see [Create, change, or delete a network security group](/azure/virtual-network/manage-network-security-group).

Expand Down Expand Up @@ -105,19 +104,19 @@ In this section, you test your VM can have connect to the internet.
| Protocol | Leave the default of **Any**. |
| Destination type | Select **Any IP address**. |

:::image type="content" source="./media/network-security-group-test/outbound-test.png" alt-text="Screenshot of outbound network security group test in the Azure portal." lightbox="./media/network-security-group-test/outbound-test.png":::
:::image type="content" source="./media/network-security-group-test/outbound.png" alt-text="Screenshot of outbound network security group test in the Azure portal." lightbox="./media/network-security-group-test/outbound.png":::

1. Select **Run test**.

After a few seconds, you see the details of the test:
- If connections to the internet are allowed from the VM, you see **Traffic status: Allowed**.
- If connections to the internet are blocked, you see **Traffic status: Denied**. In the Summary section, you see the security rules that are blocking the traffic.

:::image type="content" source="./media/network-security-group-test/outbound-test-result.png" alt-text="Screenshot of outbound network security group test result." lightbox="./media/network-security-group-test/outbound-test-result.png":::
:::image type="content" source="./media/network-security-group-test/outbound-result.png" alt-text="Screenshot of outbound network security group test result." lightbox="./media/network-security-group-test/outbound-result.png":::

To allow internet connections from the VM, add to the network security group a security rule that allows connections to the internet service tag. This security rule must have a higher priority than the one that's blocking the traffic. For more information, see [Create, change, or delete a network security group](/azure/virtual-network/manage-network-security-group).

## Next steps
## Related content

- To learn how to troubleshoot VM connections, see [Troubleshoot connections with Azure Network Watcher](/azure/network-watcher/network-watcher-connectivity-portal).
- To learn more about network security groups, see [Network security groups overview](/azure/virtual-network/network-security-groups-overview).
- To learn more about network security groups, see [Network security groups overview](/azure/virtual-network/network-security-groups-overview).

0 comments on commit a114d54

Please sign in to comment.