Search icon
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
Learn Azure Administration - Second Edition

You're reading from  Learn Azure Administration - Second Edition

Product type Book
Published in Dec 2023
Publisher Packt
ISBN-13 9781837636112
Pages 346 pages
Edition 2nd Edition
Languages
Author (1):
Kamil Mrzygłód Kamil Mrzygłód
Profile icon Kamil Mrzygłód

Table of Contents (23) Chapters

Preface 1. Part 1:Introduction to Azure for Azure Administrators
2. Chapter 1: Azure Fundamentals 3. Chapter 2: Basics of Infrastructure as Code 4. Part 2: Networking for Azure Administrator
5. Chapter 3: Understanding Azure Virtual Networks 6. Chapter 4: Exploring Azure Load Balancer 7. Part 3: Administration of Azure Virtual Machines
8. Chapter 5: Provisioning Azure Virtual Machines 9. Chapter 6: Configuring Virtual Machine Extensions 10. Chapter 7: Configuring Backups 11. Chapter 8: Configuring and Managing Disks 12. Part 4: Azure Storage for Administrators
13. Chapter 9: Configuring Blob Storage 14. Chapter 10: Azure Files and Azure File Sync 15. Chapter 11: Azure Storage Security and Additional Tooling 16. Part 5: Governance and Monitoring
17. Chapter 12: Using Azure Policy 18. Chapter 13: Azure Monitor and Alerts 19. Chapter 14: Azure Log Analytics 20. Chapter 15: Exploring Network Watcher 21. Index 22. Other Books You May Enjoy

Verifying flows

Network Watcher can be used to verify traffic flows inside your network using a feature called IP flow verify. It’s meant to be used with Azure Virtual Machines, and its main purpose is to validate the network rules applicable to a given machine. Conceptually, it’s a simple feature – all you need is to configure the correct machine, IP, and ports you’d like to verify. In the Azure portal, it looks like this:

Figure 15.1 – IP flow verify screen in the Azure portal

Figure 15.1 – IP flow verify screen in the Azure portal

If the connection is allowed, you’ll be notified about it as follows:

Figure 15.2 – Result of running IP flow verify when a connection is accepted

Figure 15.2 – Result of running IP flow verify when a connection is accepted

However, if a connection cannot be established (for instance, because of existing rules in the network security group assigned to the network interface of a machine), you’ll get information on what is blocking it (see Figure 15.3):

Figure 15.3 – Failed verification due to NSG rule ...
lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime}