In short I have a Point to Site VPN Gateway in VNET1. I need connections to be able to talk to a VM on VNET2. I have created Peering, NSG rules, and “Connections” to the VNET2 from VNET1/P2S VPN Gateway. I cannot for the life of me figure out why I still cannot ping. The tracert does not even leave my router when I tracert to the private ip of the VM.
The VPN Gateway is in a different region than the VNET the VM is on - though it is my understanding that they can still communicate using Peering despite being in different regions.
Just asking for like 30 minutes of someone’s time to help take a look via chat.
I’ve also not tried it but technically the VNGs do have IP addresses assigned to them. So you MAY be able to trick it with a UDR but I suspect that will not work due to how Azure does their shenanigans.
A quick checklist to troubleshoot your Point-to-Site VPN setup:
Check Peering Settings: Ensure that peering configurations allow traffic to and from both VNETs. You need to enable gateway transit on the VPN gateway VNET and allow forwarded traffic from the VPN gateway to the peered VNET.
Network Security Group (NSG) Rules: Double-check your NSG rules. Make sure you have rules in place that allow the desired traffic on all necessary ports and protocols.
Routing Issues: Verify if the route tables are properly configured to route traffic between the VNETs via the VPN gateway. Check the effective routes on your VM to ensure they include routes for the VPN traffic.
Firewall Settings: Since you’ve turned off the firewall on your VM, consider potential blocks at other points in your network.
If you’re still stuck after these checks, Azure Network Watcher can be a powerful tool to diagnose further. Here’s a guide on setting up and using Azure Network Watcher for troubleshooting: Using Azure Network Watcher.
Option 3 being “allow gateway or route server in “VNET1” to forward traffic to “VNET2””correct? That is checked for the VNET1 peer to VNET2. Along with the first 2
I’m VNET2’s peering you’re saying I should allow option 4 which is to “enable VNET2 to use “VNET1’s” remote gateway or route server”, correct? When I check that I get an error because there is already a gateway configured in VNET2 which is a separate site to site tunnel for on-prem use.
No azure firewalls in place. Can confirm that I can RDP into a VM on the same vnet as VNET1 (cannot ping however despite creating a specific NSG rule for ICMP). Oh well.
Can you explain on your last paragraph? The peering is between the VNET the VNG subnet is on and the VNET where the server is hosted.