Not able to select VNet gateway when creating local network gateway - azure

I'm having problem when creating connection on Local network gateway.
when I'm creating connection the Vnet gateway is selectable but when i select it the Azure did not populate or actually select the gateway not sure why. is there any subscript do i needed or my vnet gateway is created incorrectly?

I tried to reproduce the same scenario in my environment wherein I tried with the Local network gateway to make connection with the Virtual network gateway, and it is successfully done. Please find the below snapshots for your reference.
I have created a Virtual network, a Virtual network gateway, a local network gateway in the same location and assigned the local network gateway a different virtual network subnet other than the one created earlier and assigned the virtual network gateway, the original one.
Vnet:
Virtual network gateway:
Local Network gateway:
The process is you need to add your connection in Virtual network gateway by below process:
When I add connection in virtual network gateway it created and reflected in local network gateway.
Reference:
Tutorial - Connect an on-premises network and a virtual network: S2S VPN: Azure portal - Azure VPN Gateway | Microsoft Docs

Related

How to redirect traffic from one tunnel to another on the same Azure Network Gateway?

I am using Azure Network Gateway to connect to a customer (for VPN IPsec). I have a virtual network connection to the Gateway. In which I created a subnetwork and which IPsec is configured with the customer. Everything works perfectly. But now I need to create a separate tunnel to connect my secure environment. I created a separate subnet on the same virtual network and created a separate connection to the same Azure Network Gateway. But the traffic does not go between subnets, and I cannot get through from one tunnel to another. Could you please write me what to do? Maybe create a separate Azure Network Gateway and virtual network and make a peering?

Can't add existing Virtual Network to Virtual network gateway in Azure

While creating the Virtual network gateway and selecting the vnet, it says the VNet is "in use".
VNET address space is 10.0.0.0/16
Any idea why I'm getting this error?
I created a new subnet and it has no devices connected to it.
The connected devices are not on GatewaySubnet.
I reproduce your scenario and it is working fine for me.
Below Point Should be notice before creating VNET Gateway
Gateway subnet address range: This field only appears if your VNet doesn't have a gateway subnet. It's best to specify /27 or larger (/26,/25 etc.).
Please check the same for Gateway Subnet address range from this MS doc: Tutorial - Create and manage a VPN gateway: Azure portal - Azure VPN Gateway | Microsoft Docs

Azure VM can't reach remote network with connected VPN

I am setting up an Azure VPN Gateway in order for my Azure VM to connect to a remote RTSP feed, following this documentation: https://learn.microsoft.com/fr-fr/azure/vpn-gateway/tutorial-site-to-site-portal.
What I have done:
Create a virtual network + a subnet and a Virtual Machine
Create the VPN Gateway in the same virtual network
Create a local network gateway with the Public IP and IPs range of the remote network that contains the RTSP feeds
Create the site to site VPN connection with needed shared access key.
The status of the VPN connection is "connected", as you can see in below picture:
Moreover, the subnet on which my azure virtual machine is, is in the same virtual network as the subnet of the VPN Gateway:
From what I understand, as long as the VM is in the virtual network of the Gateway, I should be able to reach the remote network...
Expected behaviour: I should be able to reach the following IP addresses: 192.168.250.30/32 that are on the remote network, from my azure virtual machine.
Actual behavior: From my azure virtual machine, I'm still unable to reach the remote network.
Any ideas where the problem can come from?
If the issue is that the Azure VM's are not getting gateway routes, then a gateway reset should be tried first and the gateway reset needs to be done twice.
Reference :
VPN gateway Reset
References for S2S VPN issues troubleshooting:
S2S VPN cannot connect and stops working
S2S VPN disconnects intermittently
Note : If this doesn’t solve your issue then please reach out to Azure support for more troubleshooting as it may need assisted support by clicking (Support+Help) and creating a technical support request. Please validate your Onprem VPN device as well.
And as Andriy Bilous has mentioned in comments section:
You should see default gateway on your VM routing table. Default Gateway is responsible for routing traffic further. Can you see that
tunnel is UP on your VPN onpremise device.
If no VPN Gateway subnet (10.0.0.0/28) in your VM route table - You may add route to VM using route command. Example: route ADD 10.0.0.0
MASK 255.255.255.240 [Your Gateway IP address]

Private endpoint with virtual network gateway

I want to make a Postgres DB available on-premise using a VPN / Virtual Network Gateway. I've created the Virtual Network Gateway with GatewaySubnet, the Local Network Gateway and the VPN Connection.
Now I want to create a private endpoint in the GatewaySubnet but I am getting the following errors:
Portal: "The selected subnet GatewaySubnet is restricted and cannot be used with a private endpoint"
or
ARM: "Subnet with name 'GatewaySubnet' can be used only for the Gateway resource."
Am I missing something? I thought the GatewaySubnet is exactly the Subnet that will be made accessible over the VPN?
The GatewaySubnet is a special subnet that contains the IP addresses that the virtual network gateway services use. Never deploy anything else (for example, additional VMs) to the gateway subnet. You can only leave it empty without any other resources deployed to this subnet.
When you deploy a VPN gateway in one Azure virtual network. With site-to-site VPN connection, all subnets in that VPN VNet could access the on-premise network because by default resources in all subnets in the same virtual network could communicate with each other. So you can deploy another subnet in the same VPN VNet used for your private endpoint.
See the diagram for using cases of Private Link for Azure Database for PostgreSQL

Azure web app can't see VM through vnet-to-vnet connection

I have a VM running a WebAPI service that I want to hit from an Azure web app using a vnet-to-vnet conneciton. As such, I have the VPNs configured as follows:
Virtual Machine - VMVnet
Address Space: 10.1.0.0/16
Subnet: 10.1.0.0/24
Gateway Subnet: 10.1.1.0/27
Private IP: 10.1.0.4
I also opened the target port up in Windows Firewall.
Web App - AppVnet
Address Space: 10.2.0.0/16
Subnet: 10.2.0.0/24
Gateway Subnet: 10.2.1.0/27
I also have Virtual Network Gateways configured for both, each with a connection going to the other.
Now, after I connect the app to AppVnet and sync the routes from the app service plan's networking section, I should be able to hit the VM using its private IP from the app code. When I try, I get the following error:
An attempt was made to access a socket in a way forbidden by its access permissions
I also tried setting up Virtual Network Peering between the networks, but that didn't work either.
Is what I'm trying to do even possible with Azure web apps? I saw this question, which seemed like what I was looking for but the information in it is a bit lacking.
If not, I have tried this with a point-to-site configuration with the app connected to the VM's vnet, and it worked fine. Would it be preferable to set up a second nic on the VM using the AppVnet and connect all apps through that?
I'm just wondering why neither the vnet-to-vnet nor vnet peering works
with the web app
First of all, you need to know to Integrate your app with an Azure Virtual Network.
Here are some things to keep in mind before connecting your web app to
a virtual network:
If your target virtual network already exists, it must have point-to-site VPN enabled with a Dynamic routing gateway before it can
be connected to an app.
If your gateway already exists with point-to-site enabled, and it is not in the basic SKU, IKEV2 must be disabled in your point-to-site
configuration.
That is to say, you already have a P2S connection that you can connect to AppVnet from your App. If you want to connect to VMVnet through the AppVnet from your app, you can achieve it by gateway transit for virtual network peering in hub-and-spoke network architecture.
In the diagram, gateway transit allows the peered virtual networks to use the Azure VPN gateway in Hub-RM. In this case, your AppVnet is the Hub-RM. Your web app is the VPN client in a P2S VPN connection.
I am not sure that you real configuration in your side, but I guess your creating Vnet to Vnet connection is just like Hub-RM to Spoke-RM connection in the diagram, so it does not work. Setting up Vnet peering and gateway transit enabled, it should work. For more details about Configure VPN gateway transit for virtual network peering.

Resources