Networking

The Networking forum covers all aspects of Networking in Azure, including endpoints, load-balancing, network security, DNS, Traffic Manager, virtual networks, and external connectivity.

Virtual Network:

  • Service overview

  • Technical documentation

  • Pricing details
  • Traffic Manager:

  • Service overview

  • Technical documentation

  • Pricing details
  • Network Watcher:

  • Service overview

  • Technical documentation

  • Pricing details
  • If you have any feedback on any aspect of Azure relating to Networking, we’d love to hear it.

    • Hot ideas
    • Top ideas
    • New ideas
    • My feedback
    1. Local Network Watcher for End User for their Azure Instance

      Local Network Watcher possibly tied into Internet Connection API. No overhead and only fires when the connection drops or is having issues. Allows the user to input their own instances and is able to visually see where the issue might be and possible solutions. So a mini Network Monitor.

      3 votes
      Vote
      Sign in
      (thinking…)
      Sign in with: Microsoft
      Signed in as (Sign out)
      You have left! (?) (thinking…)
      0 comments  ·  Network Watcher  ·  Flag idea as inappropriate…  ·  Admin →
    2. Traffic Analytics in DoD regions

      Needed in USDoDEast

      3 votes
      Vote
      Sign in
      (thinking…)
      Sign in with: Microsoft
      Signed in as (Sign out)
      You have left! (?) (thinking…)
      0 comments  ·  Network Watcher  ·  Flag idea as inappropriate…  ·  Admin →
    3. Traffic Analytics in DoD regions

      Needed in USDoDEast

      3 votes
      Vote
      Sign in
      (thinking…)
      Sign in with: Microsoft
      Signed in as (Sign out)
      You have left! (?) (thinking…)
      0 comments  ·  Network Watcher  ·  Flag idea as inappropriate…  ·  Admin →
    4. GetBestNeigbhors for a given Source Azure Region

      GetBestNeighbors
      Input :
      AzureRegion SourceRegion : Source region , Frame of Reference
      AzureRegion[] Regions : List of regions which needs to be reached from Source Region

      Output : Ordered list of azure regions “best” reachable from SourceRegion

      Alternatively , Simpler version

      GetBestNeighbors
      Input :
      AzureRegion SourceRegion : Source region

      Output : Ordered list of all available azure regions “best” reachable from SourceRegion

      Alternatively ,Even more simpler version

      GetBestNeighbors
      Input :

      Output : Ordered list of all available azure regions “best” reachable from SourceRegion. This must be same as it would have been called from Source region as above.

      2 votes
      Vote
      Sign in
      (thinking…)
      Sign in with: Microsoft
      Signed in as (Sign out)
      You have left! (?) (thinking…)
      0 comments  ·  Network Watcher  ·  Flag idea as inappropriate…  ·  Admin →
    5. Synthetic Transactions for Office 365

      The network reachability tests are a fantastic addition, and taking it even further would be to allow user to specify send/receive account credentials and have the test send actual dummy email, test SPO and OD4B upload/download, Skype check presence, etc. Just a an even deeper test that O365 services are working from one of their nodes

      2 votes
      Vote
      Sign in
      (thinking…)
      Sign in with: Microsoft
      Signed in as (Sign out)
      You have left! (?) (thinking…)
      0 comments  ·  Network Watcher  ·  Flag idea as inappropriate…  ·  Admin →
    6. Add SQL Tests to Service Endpoint Monitor

      Enable testing of database availability - similar to SCOM OLEDB capability (https://technet.microsoft.com/en-us/library/hh457575(v=sc.12).aspx) that can make a test connection and even run a test query to validate functionality.

      1 vote
      Vote
      Sign in
      (thinking…)
      Sign in with: Microsoft
      Signed in as (Sign out)
      You have left! (?) (thinking…)
      0 comments  ·  Network Watcher  ·  Flag idea as inappropriate…  ·  Admin →
    7. Alerting for Next-Hop in Network Watcher

      Create an activity log or alert with the Next Hop feature. This would allow real time monitoring and notification if a VM was to get internet access by accident. Currently I do not see any alerting functionality for route table changes... For example, it would be great if we could create a monitor anytime a route table changed or when the VM routing changed from Next-Hop VPN to Internet and vice versa. There needs to be more visibility and alerting to VM's that have internet access, likely a huge security concern for many organizations.

      1 vote
      Vote
      Sign in
      (thinking…)
      Sign in with: Microsoft
      Signed in as (Sign out)
      You have left! (?) (thinking…)
      0 comments  ·  Network Watcher  ·  Flag idea as inappropriate…  ·  Admin →
    8. Azure Portal Report Settings

      In the Azure Portal, is there a way to change the Portal report settings to display kbps instead of mbps? When we work with the Support Engineers from Microsoft – Azure Rapid Response (ARR), their reports have more granularity than our reports. This sometimes leads to debates as to the data we are seeing and reporting to Microsoft ARR. We have not been able to find a way to make these changes is the settings.

      1 vote
      Vote
      Sign in
      (thinking…)
      Sign in with: Microsoft
      Signed in as (Sign out)
      You have left! (?) (thinking…)
      0 comments  ·  Network Watcher  ·  Flag idea as inappropriate…  ·  Admin →
    9. Create credit system for NW

      Create a credit system that allows an option for "yes continue to bill me" or "no, turn off services when credits expire" . I want to be ale to use use Network Watcher in its capacity as a "free" service without crossing the threshold that then requires payment - especially for the more complex services. An alternative idea is a "Basic" SKU which enables only limited instances of the network watcher extension. Essentially, customers today are inhibited from using b/c of the fear of having to pay for services. We should enable a warning or auto-disable that would prevent them…

      1 vote
      Vote
      Sign in
      (thinking…)
      Sign in with: Microsoft
      Signed in as (Sign out)
      You have left! (?) (thinking…)
      0 comments  ·  Network Watcher  ·  Flag idea as inappropriate…  ·  Admin →
    10. NetworkSecurityGroupEvent Show source address being blocked

      Would be nice if NetworkSecurityGroupEvent (Network Security Group analytics) showed the source address (not just the destination address) being blocked similar to a standard ACL.

      1 vote
      Vote
      Sign in
      (thinking…)
      Sign in with: Microsoft
      Signed in as (Sign out)
      You have left! (?) (thinking…)
      0 comments  ·  Network Watcher  ·  Flag idea as inappropriate…  ·  Admin →
    11. Simplify

      Do any of you developers at Microsoft actually talk to end users before you implement this stuff? The first thing you should do after getting the flow logging working is to provide an EASY and SIMPLE way for end users to view the flow logs through the portal without having to have a Computer Science Masters degree to write friggin Powershell scripts or other programs to view this data that you are collecting

      1 vote
      Vote
      Sign in
      (thinking…)
      Sign in with: Microsoft
      Signed in as (Sign out)
      You have left! (?) (thinking…)
      triaged  ·  0 comments  ·  Network Watcher  ·  Flag idea as inappropriate…  ·  Admin →
    12. Monitor container network traffic within a node

      I would like to see a solution for monitoring traffic between containers on the same node. I'm not sure if the Network Watcher product already does this or not - it wasn't specified.

      1 vote
      Vote
      Sign in
      (thinking…)
      Sign in with: Microsoft
      Signed in as (Sign out)
      You have left! (?) (thinking…)
      2 comments  ·  Network Watcher  ·  Flag idea as inappropriate…  ·  Admin →
    13. Let security group view show the order in which rules are processed

      The current security group view allows multiple ways to sort the security rules that show up. It would be most useful if there would be a way to sort the security rules in the effective way they would be processed, meaning:
      1. customer defined rules on the subnet
      2. default rules on the subnet
      3. customer defined rules on the NIC
      4. default rules on the NIC.

      1 vote
      Vote
      Sign in
      (thinking…)
      Sign in with: Microsoft
      Signed in as (Sign out)
      You have left! (?) (thinking…)
      0 comments  ·  Network Watcher  ·  Flag idea as inappropriate…  ·  Admin →

      Thank you for the suggestion, we’ll consider adding this sort option. The current UI in Portal provides you with tabs to see the security rules applied on the Subnet and the NIC, as well as the default rules.

      Note, the rule processing order you provided only applies for inbound traffic. From https://docs.microsoft.com/en-us/azure/virtual-network/virtual-networks-nsg :

      Inbound traffic

      1. NSG applied to subnet: If a subnet NSG has a matching rule to deny traffic, the packet will be dropped.

      2. NSG applied to NIC (Resource Manager) or VM (classic): If VM\NIC NSG has a matching rule to deny traffic, packet will be dropped at VM\NIC, although subnet NSG has a matching rule to allow traffic.

      Outbound traffic

      1. NSG applied to NIC (Resource Manager) or VM (classic): If VM\NIC NSG has a matching rule to deny traffic, the packet will be dropped.

      2. NSG applied to subnet: If…

    2 Next →
    • Don't see your idea?

    Feedback and Knowledge Base