Azure VPN - have no connection to VNET - azure-virtual-network

I created a virtual network gateway on the only vnet i have. My idea is to be able to connect from the internet to the virtual machines on the network. The VPN works well authenticates by AD correctly.
It gives me the IP of the pool address that I configured in the "point-to-site" correctly.
Once connected I do not have access to any machine on the network. No ping no telnet
Am I skipping a step or do I have to do something else? The VM firewall is disabled. And the network security group of the VMs has the VNet-Vnet allowed. Also between the vms there is no communication problem
What is even weirder is that if I connect to an azure virtual machine and ping my notebook that connects to the VPN, ping responds. On the other hand, from the notebook to the virtual one, it does not respond

Here are the few step the needs addressed for Azure Point-to-Site VPN with Azure AD Authentication
Step1: Create a Virtual Network
Step 2: Create a Virtual Network Gateway and select Vnet the above you have created.
Step 3: Give the admin consent to the Azure VPN application using this link
https://login.microsoftonline.com/common/oauth2/authorize?client_id=41b23e61-6c1e-4545-b367-cd054e0ed4b4&response_type=code&redirect_uri=https%3A%2F%2Fportal.azure.com&nonce=1234&prompt=admin_consent
Step 4: Take the tenant id of azure ad. (Azure AD- >Properties)
Step5: Select Azure Gateway and go the point-to-site configuration.
Step 6: Configure the point to site. You can keep the same address pool which I have kept below.
Where Tenant: https://login.microsoftonline.com/Tenant_ID/
Where Audience: 41b23e61-6c1e-4545-b367-cd054e0ed4b4(default)
Issuer: https://sts.windows.net/Tenant_ID/
Step 7: Once fill the details save it, download the VPN client, and extract the file.
Step 8: download the Azure VPN client using this link: https://www.microsoft.com/en-us/p/azure-vpn-client-preview/9np355qt2sqb?rtc=2&activetab=pivot:overviewtab. And open it
Step 9: Once open select import and add azurevpnconfig.xml file from the above extracted file.
Step 10: Save it and connected with your Azure account.
Now you connected with your Azure Vnet using point to site VPN.
Step 11: Create your VM in the same VNET.
Step 12: ping your VM from your notebook. (I have used my private Ip to ping here)
The below picture is for ping from VM to my notebook.
Reference : https://learn.microsoft.com/en-us/azure/vpn-gateway/openvpn-azure-ad-tenant

Related

How to connect VM in Openstack to external-network? (Kolla-ansible)

I tried deploying OpenStack (Xena version) using Kolla-ansible tool, All-in-one mode. My cloud server (Ubuntu-2004-server) has 2 NICs (I attached 2 public IPs to these NICs). After successful deployment, I create network: provider network and vxlan network. Then I create a VM, but my VM can't connect to the Internet. What can I do in my problem, about my server or configure anything in the network (OpenStack).
Many thanks!
Everything is fine but the VM created in OpenStack cannot connect to the Internet.

Azure VM Disconnects after changing DNS

I have an public Azure VM instance running Windows 10 . I changed the DNS to Google DNS and I loose RDP connection. Why?
While changing the DNS servers, please follow below steps:
Changing the DNS servers to Google DNS servers can be done via Azure portal or PowerShell.
From Azure Portal, Navigate to your VNET, click on DNS servers and enter the DNS server IPs.
After doing changes to DNS, Virtual Machine need a reboot. Make sure to reboot the VM.
This change can be done on the NIC of Virtual Machine not on the OS level.
Resize the Virtual Machine, if reboot doesn't restore connectivity. This should return the RDP and the DNS entry you defined.
Try redeploying the Virtual machine.
Otherwise, Try resetting the Remote Desktop configuration.
Try Checking the Network Security Group rules.
Try Resetting the NIC for the VM.
To know more in detail, please refer below links:
Lost connectivity to Azure VM after changing DNS to automatically obtain DNS - Microsoft Q&A.
Cannot connect with RDP to a Windows VM in Azure - Virtual Machines | Microsoft Docs
VM getting disconnected after changing preferred DNS IP (microsoft.com).
Change VM DNS Servers - Microsoft Q&A.

No access to Azure Storage Account which has virtual network only access, despite a succesful Point2site connection to that virtual network

I want to restrict access to my Azure storage account to selected networks only (please see image).
Current network restriction setting
My current set up is as follows:
I have an Azure Storage account, with blob containers and tables.
Only selected networks can access this storage account (please see the first image above). I've selected the gateway subnet (I've tried to add other subnets within the same virtual network, to no avail).
I have selected a virtual network call. All service endpoints for this network are set up correctly ('storage-service endpoint' is 'succesful'). The subnet involved is gateway subnet.
I also have a virtual gateway which is placed inside this virtual network. With (of course) the gateway subnet assigned to it.
Subnet endpoint permission
I have a point2site VPN connection (using Azure VPN client) to connect to this virtual network from my local machine (see image below).
This connection has been set up as well, using Active Directory as authentication method. All seems correctly working.
The virtual gateway to which the VPN connects, can see the active connection (see image below)
Obviously, I'm doing something wrong, so any help is very much welcome!
Regards,R.
VPN connection details
I have a point2site connection to the virtual network that is granted access to this storage account (see images below).
The point2site connection looks good (see image below), but I still can't access the storage account.
Current connection in azure VPN client
Current view of active connection to Virtual Gateway that connects to this Vnet.
Any help is much appreciated!
I tried to reproduce your scenario that can be possible with setting the private end point in storage account and azure VPN client.
you need to create and configure a Private End Point under the subnet you have the storage account exists.
Go to 'Private Endpoint Connection' under settings of storage account in azure portal as below:
Connected with Vnet using Azure VPN client .
Now you can map network drive on this pc using this format
\\Private IP Address or FDQN \Filesharename
For me there is one blockage.it error: Unable to reach the Azure storage account via port 445. I can’t add port 445 in my system if you have port number 445 you can be able to access the file share if not add port 445 so the SMB traffic over this port.
Note: Disable the firewall/ anti-virus temporarily installed on your computer.
Reference: https://learn.microsoft.com/en-us/azure/storage/files/storage-troubleshoot-windows-file-connection-problems

How do I make VPN connection working from Azure VM?

I have created Virtual Network Connection.
I have created Connection for Site to Site(IPSec) which connects to VMWare-snx
Connection status is "Connecting". (Also connection from VMWare SNX side)
I have VM in subnet. VNet is same as with Gateway Subnet.
I try to ping or RDP to VM in VMWare side, but do not have connection.
Did I understand correctly that I should have automatically connection from all subnet in VNet.
No routing is needed between Gateway Subnet and others?
Is there any way to troubleshoot if ping passed Azure VPN?
https://vzerotohero.com/2017/03/step-by-step-deploy-vmware-nsx-with-microsoft-azure-ipsec-vpn-site-to-site/
If the VPN connection is set up well, the Connection status should be "connected". Please follow the step by step in the article, especially the note things:
NSX VPN as of now only supports Policy-Based VPN type.
PFS: Disable Perfect Forward Secrecy since its not supported with Azure Static-Policy based VPN.

Azure Regional VNet Integration and Service Endpoint

I try to integrate a web app to a VNET. this is a brand new subscription.
According to : Integrate your app with an Azure virtual network
In the first step I wanted to check if the web app could reach out to VNET. The second step I want to connect the web app to SQL database through a Service Endpoint
I created a VNET with 2 subnets:
Jumpbox-subnet
integration-subnet
integration-subnet setting
There is service endpoint pointing to the integration-subnet. Also I integrated the app to the VNet, It's delegated the integration subnet.
I tried to connect to VM from App using tcpping 172.16.1.0 (jumpbox VM private address) from app console, but it failed.
I also app cannot connect to the sql database.
What are the missing pieces here, is a DNS server required to make this work?
Update (Resolved):
The question above was the key, It needs away to resolve the name with some sort DNS server.
tcpping default port is 80 and nothing was listening to that port in that box.
You could use the tool tcpping to test for TCP connectivity to a host and port combination.
The syntax is: tcpping.exe hostname [optional: port]
For example, run tcpping 172.19.1.10:3389
See troubleshooting app service networking for more details.
For more references, Here is an ARM example to deploy an app service with VNet integration and enable service endpoint Microsoft.Storage.