Skip to content

Files

60 lines (43 loc) · 4.74 KB

network-watcher-packet-capture-overview.md

File metadata and controls

60 lines (43 loc) · 4.74 KB
title description services documentationcenter author ms.service ms.topic ms.tgt_pltfrm ms.workload ms.date ms.author
Introduction to Packet capture in Azure Network Watcher | Microsoft Docs
This page provides an overview of the Network Watcher packet capture's capability
network-watcher
na
damendo
network-watcher
article
na
infrastructure-services
02/22/2017
damendo

Introduction to variable packet capture in Azure Network Watcher

Important

[!NEW] Packet capture ia now also available for Virtual Machine Scale Sets. To checkout please visit Manage packet capture in the Azure portal for VMSS

Network Watcher variable packet capture allows you to create packet capture sessions to track traffic to and from a virtual machine. Packet capture helps to diagnose network anomalies both reactively and proactively. Other uses include gathering network statistics, gaining information on network intrusions, to debug client-server communications and much more.

Packet capture is an extension that is remotely started through Network Watcher. This capability eases the burden of running a packet capture manually on the desired virtual machine or virtual machine scale set instance/(S), which saves valuable time. Packet capture can be triggered through the portal, PowerShell, CLI, or REST API. One example of how packet capture can be triggered is with Virtual Machine alerts. Filters are provided for the capture session to ensure you capture traffic you want to monitor. Filters are based on 5-tuple (protocol, local IP address, remote IP address, local port, and remote port) information. The captured data is stored in the local disk or a storage blob.

Important

Packet capture requires a virtual machine extension AzureNetworkWatcherExtension. For installing the extension on a Windows VM visit Azure Network Watcher Agent virtual machine extension for Windows and for Linux VM visit Azure Network Watcher Agent virtual machine extension for Linux.

To reduce the information in order to capture only required information, following options are available for a packet capture session:

Capture configuration

Property Description
Maximum bytes per packet (bytes) The number of bytes from each packet that are captured, all bytes are captured if left blank. The number of bytes from each packet that are captured, all bytes are captured if left blank. If you need only the IPv4 header – indicate 34 here
Maximum bytes per session (bytes) Total number of bytes in that are captured, once the value is reached the session ends.
Time limit (seconds) Sets a time constraint on the packet capture session. The default value is 18000 seconds or 5 hours.

Filtering (optional)

Property Description
Protocol The protocol to filter for the packet capture. The available values are TCP, UDP, and All.
Local IP address This value filters the packet capture to packets where the local IP address matches this filter value.
Local port This value filters the packet capture to packets where the local port matches this filter value.
Remote IP address This value filters the packet capture to packets where the remote IP matches this filter value.
Remote port This value filters the packet capture to packets where the remote port matches this filter value.

Considerations

There's a limit of 10,000 parallel packet capture sessions per region per subscription. This limit applies only to the sessions and doesn't apply to the saved packet capture files either locally on the VM or in a storage account. See the Network Watcher service limits page for a full list of limits.

Next steps

Learn how you can manage packet captures through the portal by visiting Manage packet capture in the Azure portal for VMand Manage packet capture in the Azure portal for virtual machine scale set or with PowerShell by visiting Manage Packet Capture with PowerShell for VMand Manage Packet Capture with PowerShell for virtual machine scale set

Learn how to create proactive packet captures based on virtual machine alerts by visiting Create an alert triggered packet capture