Reputation: 1
Scenario.
We have a site 2 site VPN from ON PREM to Azure VNET (with a vnet gateway) in a specific rg. lets call the VNET with the VPN connection for: vnet-vpn
Then we have a VNET in another Resourcegroup in Azure (Same subscription as vnet-vpn) lets call it vnet-a
I need services in vnet-a to be able to call on prem systems by proxying thru the vnet-vpn and that way gaining access to the on-prem network.
I can:
I CANNOT:
I cannot find any documentation that explicitly describes this scenario and and to set it up. Can someone please help :-)
Upvotes: 0
Views: 784
Reputation: 641
Possible is too late, however if anyone came across this post with the same issue, this is a solution:
Scenario:
OnPrem<----S2S----->Az Vnet-A
You want direct access from OnPrem Site to another Azure VNET, let's call it Vnet-B using the existing setup between OnPrem an Vnet-A.
Solution:
And that's all by creating a peering with Gateway Transit enabled on the Vnet that is connected the the Azure Gateway VPN, and creating the Routes with the settings I mentioned earlier you will have direct access from OnPrem to Vnet-B also.
Regards
Upvotes: 0
Reputation: 1089
More info on current config could be used to answer this, but here are a couple of ideas:
vnet-vpn
and vnet-a
vnet-a
IP range is included in your Azure VPN and also OnPrem VPN configuration
vnet-a
addresses into some range which is acceptable for your OnPrem VPN. Please be aware that NAT rules
feature is only Preview on Azure Virtual Network Gateway. You either have to take the risk of using a preview feature (fine for non-production workloads), or implement your own NAT appliance.Upvotes: 0
Reputation: 541
You can refer to this tutorial here which resembles the scenario you are trying out. You need to enable gateway transit on your peered VNET in order to establish connectivity with your on-prem systems.
Upvotes: 0