Azure Point-to-Site : RDP - azure

I configured a P2S VPN and was able to access the Jump-box in the Hub Virtual Network via a private IP address.
Using the same P2S VPN, I cannot reach the VM in the Production subscription while I could RDP into the VM from the Jumb-box directly.
RDP is allowed at the NSG level
RDP is allowed at the firewall level
Hub-to-Spoke Peering is done
Spoke-to-hub Peering is done
10.0.0.68 is the firewall IP
Routing table is configured as shown below
and
I feel that this is more of a Firewall / Route Table issue

I tried to reproduce the same issue in my environment and got the below results
Remote desktop has the feature to connect the other computers to resolve the issue find the below steps
Change the firewall settings
Click on Windows button and search "allow-app through windows firewall" and changed the settings as mentioned in the screenshot
2). Allow the remote desktop connection
Click the windows button and search for "allow remote desktop connection"
3). Adding the RDGCLIENT transport key
Press windows + R and type regedit and enter
4). Changing the network properties
press windows + I and network and properties and change the network status is to Private
Note: If all the settings to be properly connected and if still not able to connect, for particular subscription we may have the restrictions to connect the RDP, Contact the admin department

Related

Loosing access to Windows VM through RDP/Bastion soon after connecting to a Client VPN using Cisco-VPN-Client

I'm trying to use a Windows VM deployed through AVD to connect to a client VPN. And client's VPN is restricted in a way that it only allows users to access few of their internal servers but nothing else. So, I'm loosing access to VM soon after connecting to the Client VPN using Cisco-Mobile-VPN client. And it looks like VPN is restricting external connectivity to the VM. As a new user to Azure, I'm trying know if there is a possible work around to access the VM even after connecting to client restricted VPN. Any help is much appreciated.
Please follow the below procedure to fix the issue:
Go to the “Network and Sharing Center”
Click on “Change Adapter Settings”
Click on your VPN entry and then “Change settings of this connection” in the ribbon.
Drill into IP v4 properties and to the IP Settings tab. (as the above picture shows)
Uncheck “Use default gateway on remote network”.
If you are still facing the issue or unable to uncheck “Use default gateway on remote network”, please check if he vpn provider can add you to a group that has a policy set for 'split tunneling' - this is done on the vpn host side.
Please refer below URL for more information :
https://serverfault.com/questions/193308/vpn-within-a-remote-desktop-session?rq=1

Connect with RDP download file Error: access Remote Desktop can't connect to the remote computer for one of these reasons

Going through exercises of Fundamentals of Azure, we(me and my team) are unable to connect via our Windows 10 desktops to RDP 3389.
Attached screen-shot.
Test connections outbound of RDP on the portal work as expected. Connection is successful.
But via clicking "Connect" from the dowloaded RDP file we get this error.
There is section to setup Linux VM via windows; currently exploring that but we see little hope.
There can be various reasons that RDP to Azure VM can fail.
Please check Troubleshoot Remote Desktop connections to an Azure virtual machine section if this helps.
If you just created a new VM in Azure it might be a firewall restriction that is causing the error. You can check if the RDP port 3389 be allowed from your client IP address in the network security group.

Disconnect an Azure VM from Internet

I have to test the behavior of a SharePoint migration tool installed on my Azure VM when Internet connection is lost.
I access to this VM by RDP.
How can I cut off Internet connection of my VM and restore it later ?
Thanks in advance.
I second the suggestions posted by 4c74356b41, you could also disable the Network Adapter and then reset the Network adapter to restore the connection. If you wish to take this approach checkout these steps:
For VMs deployed in Resource group model
Go to the Azure portal.
Select the affected Virtual Machine.
Select Network Interfaces.
Select the Network Interface associated with your machine
Select IP configurations.
Select the IP.
If the Private IP assignment is not Static, change it to Static.
Change the IP address to another IP address that is available in the Subnet.
The virtual machine will restart to initialize the new NIC to the system.
Try to RDP to your machine. If successful, you can change the Private IP address back to the original if you would like. Otherwise, you can keep it.
Delete the unavailable NICs
After you can remote desktop to the machine, you must delete the old NICs to avoid the potential problem:
Open Device Manager.
Select View > Show hidden devices.
Select Network Adapters.
Check for the adapters named as "Microsoft Hyper-V Network Adapter".
You might see an unavailable adapter that is grayed out. Right-click the adapter and then select Uninstall.
Ref: https://learn.microsoft.com/en-us/azure/virtual-machines/windows/reset-network-interface
Create a deny internet outgoing rule on the network security group and attach it to the VM network adapter.
https://blogs.msdn.microsoft.com/igorpag/2016/05/14/azure-network-security-groups-nsg-best-practices-and-lessons-learned/
You may have to create allow rules for Azure storage for outbound traffic for VM agent to work.

Azure VM Remote Desktop Can't Connect

Following a how-to book's guide on setting up a VM through the Azure Portal and getting the error when trying to connect
Remote Desktop can't connect to the remote computer for one of these reasons: 1) Remote access to the service is not enabled 2) The remote computer is turned off [Verified through the Azure Portal it is turned on because Start is faded, while Restart and Stop are not] 3) The remote computer is not available on the network.
The error occurs before I'm able to enter any credentials - it doesn't find the IP at all. The RDP file details (IP removed of course):
full address:s:[IPAddress]:3389
prompt for credentials:i:1
administrative session:i:1
What I've tried:
Even though the How-To book doesn't show where/how to specify a port, when I download the RDP file from the Connect option, it specifies the port 3389. The book seems to imply that simply downloading this file and connecting will work and there's no need to specify the port. I get the above error.
Flushed DNS on my computer, ipconfig /flushdns
In the Network Security Group option for the VM, I verified that port 3389 allowed any source and wasn't specific.
I did miss associating the subnet part of the Network Security Group to a virtual network, so I did associate my NSG with the default subnet set up for my Virtual Network.
From the Quick start option, I don't see how to connect to this either; I'm guessing, I need to specify a different port, but don't see where to do it here either => Update: this appears to be in the Network Security Group's Inbound security rules in the Azure portal.
Boot Diagnostics option shows the login screen. A ping to the IP address fails four times with "Request timed out."
Note: this is not a Virtual Machine (classic).
just wanted to share what worked for me.
After receiving an error prompt:
Connect is disabled for this virtual machine because of the following
issues: Network interface 'vmwindows1094': Network security group
'VMWindows10-nsg' does not have inbound security rule that allows port
3389. VMWindows10-nsg
I have added an inbound port rule. Under VM > Settings > Add inbound port rules.
Port: 3389 Protocol/Source/Destination: Any (this can be configured based on your security rules) Action: Allow
On the Azure portal, Select your VM -> Settings -> Boot diagnostics. Make sure that you can see the login screen. You might need to enable diagnostics (under Monitoring section) if not enabled already.
If you don't see the login screen, trying the 'Redeploy' option under 'Support and Troubleshooting' section of settings.
If you can see that the machines has booted correctly, the connectivity issue might be because of a firewall at your end or on the VM. See if you can ping the machine. If you are behind a corporate firewall, try connecting from elsewhere and check your PC's firewall.
Creating a new Virtual Machine on the new portal now creates a NSG (Network Security Group) along with the VM. You should be able to find it under all resources, same name as you VM. Make sure that there is an Inbound rule configured for Remote desktop (it is created by default but might be worth checking).
I had the same problem but adding an inbound security rule was not sufficient (although it is also needed).
I had to go to virtual machines > (myVm) > Reset password and then choose Reset configuration only
Try checking your VM has enough memory.
I had tried all of above suggestions and still didn't manage to access.
After trying many times I managed to get in a message appeared saying:
Your Computer is low on memory
Not 100% sure that was the reason though.
I faced the same issue. I had created an Azure VM but wasn't able to connect to it using RDP.
The culprit was a default "Inbound Port Rule" due to which all the inbound traffic was being blocked.
The solution is to create a new rule by clicking the "Add Inbound Port Rule" and allow traffic from port 3389. Make sure that the priority of this new rule is greater than the "DenyAllInBound" rule otherwise our new rule will not have any effect.
After adding the rule, try connecting to the VM using its public IP in RDP and you should be able to connect.
This worked for me, hope it helps you as well.

Azure Site-To-Site connectivity and SQL IaaS

If I create a VNet named mySiteToSitevNet and configure it for Site-To-Site connectivity. I create a Virtual Machine assign it to use mySiteToSiteVNet as its network. I Install SQL Server on it.
Do i get Public IP to connect to that SQL Server from my WebApp which does not have VNet associated to it?
If not, how do I make my WebApp connect to that SQL Server and use the database?
There are 2 options:
Since you already have a Sign to Site VPN then you can VPN in from your website's box to enable it to access the SQL and that's the most secure way.
If for some reason you don’t want to VPN in, first you need to figure out why you don’t want to do this. If there’s a really good reason to not VPN in, then continue with setting up direct Internet access to the SQL Server.
To open an endpoint browse to the VM in the Azure portal. Open the properties of the VM in the Azure Portal, then click the “All Settings” option. Then select “Endpoints”. It’ll look something like this.
If you see a “SQL Server” endpoint with 0 ACL Rules then the work is half done (shown above). If there are ACL rules then you should be finished unless you need to add more ACL Rules.
If there is no SQL Server endpoint click the “Add” button at the top of the Endpoints blade. Name the endpoint “SQL Server”, select the protocol TCP, then set the ports to 1433 (or whatever TCP ports you want to use, but 1433 is the default). Select to setup access rules for whoever needs access and block any subnets that don’t need access and then OK back to the VM’s properties.
At this point you can connect to the SQL Server instance through whichever method you’ve setup. If you are using either VPN option you can just connect to the Virtual Machine’s network name. If you are going through the public endpoint (again this is REALLY NOT recommended) you’ll need to connect to the machines full DNS name.
Any VM deployed in a Virtual network can also be exposed through public Internet, so the answer to your question is Yes, it can be given a instance lvel public IP address (https://azure.microsoft.com/en-us/documentation/articles/virtual-networks-instance-level-public-ip/) or port behind the public load balancer (https://azure.microsoft.com/en-us/documentation/services/load-balancer/)

Resources