WiFi P2P Group with custom DNS in android - dns

I want to create a group using the createGroup() method. The P2P group has the gateway and DNS set to 192.168.49.1. I want to set the DNS to a custom IP rather than what is assigned by the method. How is this possible??
My ultimate aim is to give internet connectivity to the P2P group.

Related

How should I segregate a network into relevant zones with different access requirements?

Currently, we have a "HQ" network and a "Branch" network that are completely independent and physically separated in different locations.
This is the current network diagram.
We've been tasked to look at improving security on a fictional network for practice, whilst also adding some DMZs for:
A static website that is accessible by the public.
A web server that is accessible by clients with a VPN.
The Branch and HQ networks should also be linked by a VPN to allow the users in the LAN of the Branch to access resources in the HQ LAN.
My initial ideas are:
Change both HQ and Branch Routers to be Cisco ASA devices and have them as VPN endpoints, removing the now-unnecessary ASA between the HQ Router and Internal Network.
Add the two required DMZs directly from interfaces from the ASA, setting trust zones as required.
My questions are:
Is it a bad idea to replace the Routers with Firewalls? If so, how could I still setup a VPN tunnel between the Branch and HQ easily?
Do I need any other Firewalls (e.g. between the Internal Network and the external Firewall)? If so, why?
How could I configure the network so that one of the DMZs is accessibly only by those on the External Network with a VPN?
Depends on how tight you need to secure your network.
If there is no demand to “hide” router behind firewall the usual way is to place one interface of ASA outside at the same ISP network where router is placed and order IP for it. Other ASA interfaces you could connect to router internal interface (to firewall company traffic) and to DMZ segments.
At this case you could gather requests to your Web server and transfer it to DMZ. And at the same time you could firewall internal company traffic as well.
If you don’t have enough physical interfaces on ASA you could just use switch and do the same with use of switch vlans and ASA sub interfaces (don’t forget to configure switch interfaces in secure way).

Allow Web Apps through Network Security Group

We have a few Web Apps that need to access database on VM that behind Network Security Group. How do we allow Web App through Network Security Group?
Web App will use a set of outbound Public IP addresses to reach Internet. You can get those IP address by navigating to the Properties of the Web App.
In your NSG, you can use the Source IP as the list of IP that you got from Properties blade to allow traffic to your database. Also make sure to only open the port used by the database, and nothing else.

Two VMs connected through VNet-to-VNet not pinging each other

Again, I tried to create a VNet-to-VNet connection.
Briefly, I created
Gateway Subnet at East US Region
Gateway Subnet at West US Region
Virtual Network Gateway for East US Region and
Virtual Network Gateway for West US Region
Using Connection type VNet-to-VNet, I connected both Virtual Network Gateway from both sides.
I created connection between both Virtual Network Gateway.
The status of both connections says, Connected.
Windows Server Domain Controller is set up at East US and Windows 10 is installed at West US.
Windows 10 is unable to ping and join the Windows Server Domain Controller.
While joining the Domain Controller, the error message is
The issue is
I am able to connect both VMs which is at two different VNets using RDP with Public IP.
Both VMs’ virtual network gateways are also connected to each other through Connections.
I am able to connect one VM from another using RDP with Private IP.
But I am not able to join Windows 10 VM to Windows Server 2016 Domain Controller.
I request please go through the link https://1drv.ms/u/s!Ail_S1qZOKPmlgBU5fLviInoisrx?e=ImrqpL and help me to fix the issue related to VNet-to-Vnet Connection so that Windows 10 VM from one VNet can join the Windows Server 2016 Domain Controller VM which is at another VNet.
I hope you'll consider it positively.
Regards
TekQ
You might have to create routes, you are not using recommended private address space so routes are not created for you.
Azure automatically creates default routes
for the following address prefixes: 10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16: Reserved for private use in RFC 1918.
100.64.0.0/10: Reserved in RFC 6598.
Check the effective routes to seen next hop for traffic in the peering address space.
https://learn.microsoft.com/en-us/azure/virtual-network/diagnose-network-routing-problem
Additional Information on VNet Routing
https://learn.microsoft.com/en-us/azure/virtual-network/virtual-networks-udr-overview
Instead of rely on Vnet Gateway and VPN S2S, you could as well using Vnet Peering between region.
https://learn.microsoft.com/en-us/azure/virtual-network/virtual-network-peering-overview
I agree with the other answers. Global VNet Peering would remove the necessity of using a VPN GW, which greatly simplifies the environment and removes the monthly cost of hosting a pair of GWs. Assuming you need those GWs for other connections to VPN devices on-premises, then you can still use this design.
As Hannel pointed out, you're using public ranges for your private networks. That is also okay, but routing would be affected for VMs in those subnets if they attempted to go to actual public IPs in those ranges. Note that Hewlett Packard owns large parts of those ranges, so if your VM needed to get info from an HP website, you would have to create manual UDRs to route that traffic to Next Hop Internet.
So, please do check your Effective Routes on your NICs. You can check this from the NIC and also from Network Watcher. This should help you identify if another route is taking precedence or even if you have a route sending traffic to a virtual appliance.
Do make sure that you chose VNet-to-VNet when you set up your connection. If you chose IPSec, then you would need to have correctly configured your local network gateways.

Q: Azure S2S VNet VPN with failover

I'm trying to setup a VPN connection from a VLAN in Azure to on-premise. We have two different ISP's on-premise and I want to setup Azure with a VPN connecting to both so that if the primary ISP is down Azure will try to connect using the secondary.
The problem is that I can't add two gateways to a single VLAN, and the one gateway will not let me add two VPN connection with the same IP address range. I can understand that if I wanted both to be active, but I want one to be standby and only used if the first disconnects.
Is this even possible? Any pointers would be great?
I have been looking at https://learn.microsoft.com/en-us/azure/vpn-gateway/vpn-gateway-highlyavailable#a-name--activeactiveonpremamultiple-on-premises-vpn-devices but that only covers active-active setup which is not what I want.
I want both VNET resouces and on-premise resources to reach each other via the same IP addresses no matter if it's the primary or secondary VPN that's connected.
I know that Azure has fail over on it's side via a standby gateway, but I want fail over when on-premise is down, not Azure.
Update
I know that Azure has fail over on it's side via a standby gateway,
but I want fail over when on-premise is down, not Azure.
Unfortunately, there is not an auto solution for on-premise failover, you could manually perform, which is the same as If the on-premises gateway IP change need to update the same entry. You need to update the local network gateway (Including the On-premises gateway IP and private range ) on the Azure side and the ISP settings where VPN is connected on the on-premise side. Please expect some downtime, because IPSEC session of ISAKMP, PH1 and PH2 Will again take place.
Besides, If you have more than one ISP and need a redundant connection to the Azure. Azure now supports redundant Site to Site VPNs.
Support multiple tunnels between a VNet and an on-premises site with automatic failover based on BGP
You can establish multiple connections between your Azure VNet and
your on-premises VPN devices in the same location. This capability
provides multiple tunnels (paths) between the two networks in an
active-active configuration. If one of the tunnels is disconnected,
the corresponding routes will be withdrawn via BGP and the traffic
automatically shifts to the remaining tunnels.
The following diagram shows a simple example of this highly available setup:
NOTE
BGP is supported on Azure VpnGw1, VpnGw2, VpnGw3, Standard and HighPerformance VPN gateways. Basic SKU is NOT supported.
BGP is supported on Route-Based VPN gateways only.

Website not appear in the other network

It is possible to register a domain name with the IP address of the wifi network to use it later in iis.
I've tried the website is only Displayed for computers That Same are connected to the WiFi network does not Appear in the other network.
It's POSSIBLE to do this, but why would you want to? Most WiFi "network" devices are Wireless Access Points and/or hubs that already have an embedded port80/443 web service. You would be pointing a domain to a pre-existing (and non-modifiable) host.
Can you be more specific about what you want to do?

Resources