0

Using Azure gateway VPN I created a site to site connection with another vpn device (checkpoint) over which I have no control (customer endpoint).

I created the connection, using their public ip, declared the secret key and for local address space I discussed with the client what 'local' IP is desired from both sides. We agreed to an IP in the 172.0.0.0 range.

The gateway connection says succeeded/connected, and I see very little traffic in the data-out field (kb's not mb's).

However, when I try to ping the local address space (172.xxx.xxx.xxx) from my windows server 2016 VM I only get Request timed out-errors.

Do I need to create additional routes in windows? I tried adding route

  route -p ADD 172.xxx.xxx.xxx MASK 255.255.255.255 0.0.0.0

but the host is still unreachable.

Any Ideas? Thanks

EDIT: added some progress below

Thanks, I allowed the ping and I can now ping my VPN Gateway from my Azure VM (which is 10.XXX.XXX.4). I then added the route "route -p ADD 172.xxx.xxx.xxx MASK 255.255.255.255 10.XXX.XXX.4"

and via tracert I can see the 172 address is routed to/via de vpn gateway, but then it times out. Does this mean the issue now is on the on-premise side?

Edit 2

By now, when running the vpn diag. log I do see some traffic, but I still cannot reach the other side.

Connectivity State : Connected
Remote Tunnel Endpoint : XXX.XXX.XXX.XXX
Ingress Bytes (since last connected) : 360 B
Egress Bytes (since last connected) : 5272 B
Ingress Packets (since last connected) : 3 Packets
Egress Packets (since last connected) : 130 Packets
Ingress Packets Dropped due to Traffic Selector Mismatch (since last connected) : 0 Packets
Egress Packets Dropped due to Traffic Selector Mismatch (since last connected) : 0 Packets
Bandwidth : 0 b/s
Peak Bandwidth : 0 b/s
Connected Since : 9/18/2017 5:33:18 AM
user2713516
  • 155
  • 1
  • 1
  • 11
  • Could you try to RDP your local PC, ICMP package may block by Firewall. – Shui shengbao Sep 14 '17 at 06:44
  • Or you could try to RDP Azure VM from your local PC? – Shui shengbao Sep 14 '17 at 06:47
  • Hi, could you do this successful? – Shui shengbao Sep 14 '17 at 07:09
  • I can RDP via my P2S VPN I have configured in parallel, the site-to-site connection is from my azure virtual network to a customer's network I have no control over. I can ping the vpn gateway now from within my azure VM. running 'tracert 172.xxxxx' from my Azure VM results in 1 line of 2ms, 6ms, 1ms, 10.XXX.XXX.4 (the gateway), and all other lines are timed out. – user2713516 Sep 14 '17 at 08:14
  • According to your description, it seems your custom network disable ICMP(There may be an edge network firewall implementation). I suggest you could test other service(such as RDP or http). – Shui shengbao Sep 14 '17 at 08:17
  • You could RDP, it means VPN tunnel is created successful. – Shui shengbao Sep 14 '17 at 08:22
  • I RDP via the Point to site-option within the gateway, and its from the remote-site that the site-to-site is trying to reach. The point 2 site connection and the site2site to my customeres network are not related (I'm not located within my customers network when I RDP) – user2713516 Sep 14 '17 at 08:32
  • `and I see very little traffic in the data-out field ` it seems the connection is create successful. If it fails, you will see 0KB. I suggest you could use tcping(based on tcp) to determine network connectivity. Do you know some your customer Windows PC ip? `tcping ip 3389` – Shui shengbao Sep 14 '17 at 08:35
  • yes, the only server I need to connect to on the other site is the same IP I declared in my local address space for the local network gateway (172.XXX.XXX.XXX/32). I tried pinging with tcping on 3389 and 1521 (which I should be allowed to connect to), both give me the same result. Probing 172.XXX.XXX.XXX:3389/tcp - No response - time=2011.080ms , for 4 lines – user2713516 Sep 14 '17 at 08:44
  • Hi, do you test it on Azure VM? Could you access Azure VM? – Shui shengbao Sep 14 '17 at 08:46
  • I tested this from my Azure VM yes – user2713516 Sep 14 '17 at 08:47
  • I think you need check VPN gateway log for debug this issue, please refer to this [link](https://docs.microsoft.com/en-us/azure/network-watcher/network-watcher-troubleshoot-manage-portal). – Shui shengbao Sep 14 '17 at 08:51
  • Let us [continue this discussion in chat](http://chat.stackexchange.com/rooms/65581/discussion-between-walter-msft-and-user2713516). – Shui shengbao Sep 14 '17 at 08:51
  • I added the results of the vpn troubleshooter in the chat – user2713516 Sep 14 '17 at 12:10

3 Answers3

0

First of all, check if Windows Firewall is not blocking ICMP.

Search for Windows Firewall, and click to open it.

  1. Click Advanced Settings on the left.
  2. From the left pane of the resulting window, click Inbound Rules.
  3. In the right pane, find the rules titled File and Printer Sharing (Echo Request - ICMPv4-In).
  4. Right-click each rule and choose Enable Rule.

Second, make sure you have the proper routing in place. The servers in your on-premises environment need to know how to reach the Azure environment. If your gateway can ping the Azure servers and the other way around is also true, then it's all good except that the only device that know this route is your GW. Make sure the servers in your network know how to reach the Azure network as well by adding a route to the Azure network through the GW. Example:

Next hop is also on-prem VPN:

VMs -> Default Windows Gw/Vpn Device -> Azure VPN Gw
route -p add <azure_network> mask <azure_net_mask> gw <azure_vpn_gw_ip>

As your VMs next hop is usually the Default Windows Gw, this will make sure that the next hop to reach azure_network is the azure_vpn_gw_ip. Make sure the route tables (local gateway configuration in Azure) has your on-premises network segment as well.

Bruno Faria
  • 3,804
  • 1
  • 11
  • 18
  • Thanks, I allowed the ping and I can now ping my VPN Gateway from my Azure VM (which is 10.XXX.XXX.4). I then added the route "route -p ADD 172.xxx.xxx.xxx MASK 255.255.255.255 10.XXX.XXX.4" and via tracert I can see the 172 address is routed to/via de vpn gateway, but then it times out. Does this mean the issue now is on the on-premise side? – user2713516 Sep 14 '17 at 06:16
0

According to your description, it seems your custom network disable ICMP. There may be an edge network firewall implementation or Windows Firewall.

I suggest you could use test with other service (such as RDP or http). Also, you could use tcping to determine network connectivity.

For debug your issue, I suggest you could check your VPN gateway log, please refer to this link.

Update:

According to OP's VPN gateway log.

Connectivity State : Connected 
Remote Tunnel Endpoint : 
Ingress Bytes (since last connected) : 0 B 
Egress Bytes (Since last connected) : 107604 B 
Connected Since : 9/14/2017 6:35:28 AM

VPN tunnel did not configure correctly. You need check your VPN configure again.

Shui shengbao
  • 3,503
  • 1
  • 10
  • 20
0

What kind of VPN did you provision? If you're not using Basic, BGP will automatically set up the needed routes for you.

If it's basic, then you will need to set up a route table in Azure yourself to direct traffic to the correct network.

Set up the route table like this:

enter image description here

You should have the GatewaySubnet and your local subnet in the table with the next hop being the Virtual network gateway.

If that doesn't work, use the IP flow verify option to ensure traffic can get through your security groups. By default RDP should be reachable even if ping is not, so try different ports.

Nathan C
  • 14,901
  • 4
  • 42
  • 62
  • It's the basic tier, never knew something like that was needed...I'll have a look at it tomorrow, thanks – user2713516 Sep 17 '17 at 05:45
  • I created the routing table, and added the route, but then noticed via the Effective routes-page that the route already existed...so apparently that was already configured properly. – user2713516 Sep 18 '17 at 05:16