Connect to Azure Resource under VPN P2S - azure

I'm trying to setup a Point-to-Site (P2S) VPN from my Windows 10 machine to my Azure Server and, even successfull connect to the VPN, I cannot connect to the server.
My Azure server has 2 network interfaces:
1st has private IP 10.0.0.5/24 (and an associated Public IP, that allow me to connect with Remote Desktop normally, but off the VPN).
2nd has private IP 10.0.0.4/24, without Public IP. (the other public IP is used with the virtual network gateway to use the VPN).
I've added the net/subnet "172.16.10.0/24" as addresses pool in my virtual network gateway.
* When I connect, an IP /32 address is assignet to my local machine, like 172.16.10.3 / 255.255.255.255, and I can ping 172.16.10.0
(no code to be displayed)
The certificate setting is ok, the connection to the VPN is OK. I only cannot connect to my Azure Server on my second interface 10.0.0.4.
Any idea that I've forgot to do?
Thank you.

The solution: My Private IP range on Azure local network Gateway has been wrong on setup. I've fixed specifying my correct local IP range, but, not only this, a new route table was created, associating this with the GatewaySubnet (in the Virtual Network).
Thanks to Nancy Xiong and msrini-MSIT for help.

Related

Azure Private Endpoint - Listening restrictions

I'm experiencing some deeply frustrating issues when trying to connect to a SQL server Private Endpoint. Setting aside for a moment a complete specification of the problem, I'd like answers to the following questions
Is it the case that a SQL Server Private Endpoint will only listen to connections from an Azure Virtual Machine? I have seen it suggested by 3rd parties that this is the case but cannot find this explicitly documented by MS. (To clarify, if only VMs can connect, then this would mean, for example, that an Azure Load Balancer could not use Private Endpoint as a backend resource; and, for example, that an on-premise VM could not connect to a Private Endpoint through a VPN - is that correct?)
Presuming the answer to the above question is Yes, then does the restriction apply such as to prevent Private Endpoint from listening to connections forwarded from an Azure VM interface?
(For example, say a firewall in a VM in Azure. Inside the firewall VM, the IP 192.168.0.10 is configured. In Azure, the VM interface is associated with only a single IP address which is IP 192.168.0.6. In this scenario, the firewall VM will respond to ARP requests with ARP responses saying "I have 192.168.0.10", but 192.168.0.10 is not associated by Azure configuration with any Azure virtual network interface. In said case, will a connection to the Private Endpoint using source address 192.168.0.10 work? Or is it the case that the PE will listen for connections only with a source address 192.168.0.6?)
To answer your questions:
It's possible that use a private endpoint as backends in the Azure Load balancer because Azure LB supports NIC or IP address as the backend target. Also, the on-premise VM surely can connect to a private endpoint through VPN tunneling, read this document for more details.
A VM by default sends all outbound traffic to the IP address that's assigned to the primary IP configuration of the primary network interface. So it will use source address 192.168.0.6 when connecting to the private endpoint. Read the network interface constraints.

How to access internet from azure point to site vpn (Not working)?

I set up the Point to site vpn in azure vnet with virtual network gateway which is working fine using openvpn . Now i can able to connect to azure vm via private ip but i could not able to access internet from my Host Machine (Local machine where i connected my vpn ).
**Before VPN Set up i can able to connect to Internet Please click below for ping results **
Before VPN connected ping results
**After VPN Set up i cannot able to connect to Internet Please click below for ping results **
After VPN connected ping results
For the Host Machine to be blocked something must have changed on the Host machine or on the subnet on which it is located.
When setting up a VPN, you should set up a gateway subnet that is used only for that.
Have you used the subnet on which the VM is located as the gateway subnet?

Azure S2S Outbound NAT Translation

I have a S2S VPN connection with an external party which works fine. However, they have advised that when requests are sent over the VPN tunnel to them, they want to see the request as coming from a public IP address, rather than from our private address range.
Is there a way to configure this in Azure?
For info, we are using the standard Azure VPN gateway as opposed to a third part device from the marketplace.
Thanks
David
If I am correctly understanding, they want to requests are sent over VPN via a public IP address, rather than from our private address range. I don't think it's possible since a VPN extends the virtual private network across the public network. and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.
You could create a VPN tunnel between the local virtual network and Azure virtual network via S2S VPN gateway. The tunneling protocol is used to encapsulate and encrypt the data going to and from your device and the internet. You only can communicate with the Azure virtual network via the private address range if using VPN.

Azure VPN Gateway with RADIUS - public IP unchanged

I configured Azure VPN with RADIUS authentication. All seam to work fine, at least when I connect with the client the connection is successful and the PPP adapter IP Address is changed correctly. However why the Ethernet/public IP Address is not changed?
I can ping the VM in the Azure VM, but the public IP remains the same.
A VPN uses the PPP adapter and does not affect the Ethernet/Wireless adapter. This is the expected behavior.

VPN Information for Azure VM

I have set up a new virtual machine and added it to a virtual network.
Now my difficulty is what will be the VPN Peer IP Address I'll share with clients? Is it the public IP of my virtual machine?
Also the VPN host IP address? Is that the public IP as well? All these have me confused as I have to provide them to our clients.
Where can I find these info on Azure?
You have to create two Gateways for a Site-to-Site VPN connections:
1) a Virtual Gateway which will serve es public endpoint for the other site (network)
2) a Local Gateway which "mocks" the public endpoint of the other site (network)
It is explained quite good here: https://azure.microsoft.com/en-us/documentation/articles/vpn-gateway-howto-site-to-site-resource-manager-portal/ - You need to check the compatibilities between Azure and the VPN device (check https://azure.microsoft.com/en-us/documentation/articles/vpn-gateway-about-vpn-devices/)

Resources