Skip to content

Commit 33b2d3c

Browse files
authored
Add troubleshooting link for Azure Firewall flows
Added a link to detailed instructions for troubleshooting Azure Firewall flows.
1 parent 2adb39d commit 33b2d3c

1 file changed

Lines changed: 2 additions & 0 deletions

File tree

articles/firewall/packet-capture.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -152,6 +152,8 @@ Each packet capture contains incoming and outgoing packet pairs. For every packe
152152
| Application rule flows | Source: Client<br>Destination: Server | Source: Firewall<br>Destination: Server<br><br>Layer 4 and above differ because the firewall proxies the connection, establishing a new session to the destination.<br><br>Use HTTP or TLS keys to match incoming and outgoing packets. Layer 7 remains the same. |
153153
| DNAT flows | Source: Client<br>Destination: Firewall public IP | Source: Firewall<br>Destination: DNATed private IP <br><br>Layer 3 destination IP differs from the incoming packet due to DNAT, while Layer 4 remains the same. |
154154

155+
For detailed instructions on these scenarios, see [Using packet capture for troubleshooting Azure Firewall flows](https://techcommunity.microsoft.com/blog/azurenetworksecurityblog/using-packet-capture-for-troubleshooting-azure-firewall-flows/4466692).
156+
155157
## Frequently asked questions
156158

157159
### Can I capture traffic on all ports by setting the destination port to 0?

0 commit comments

Comments
 (0)