Share via

Azure Peering Fails with HTTP error 400

IT 110 0 Reputation points
2025-10-15T01:28:54.79+00:00

I'm running Microsoft Entra Domain Services using aadds-vnet of 10.0.0.0/24. It's a default installation in Azure. I created a separate server (ServerA) using ServerA-vnet of 10.1.0.0/24. It's in a separate vnet because I'm using RDP, and Entra DS doesn't allow inbound security rules to be added to aadds-vnet to allow RDP. I'm trying to have ServerA join the EntraDS domain, but it can't find domain services. I tried to set up peering between the vnets, but it errors out with "Batch response item http error 400". Any ideas? Thanks!

Azure Virtual Network
Azure Virtual Network

An Azure networking service that is used to provision private networks and optionally to connect to on-premises datacenters.


Answer recommended by moderator

  1. Anonymous
    2025-10-16T05:32:28.38+00:00

    Hi IT 110,

    Good day, i hope you are doing great!

    Thank you for sharing those details and additional troubleshooting steps!

    The behavior and errors you’re seeing align with two key considerations:

    1. Free Trial Subscription Limitations:

    The “HTTP error 400” you’re hitting during VNet peering can occur in Azure Free Trial subscriptions, which have restricted resource permissions and may not fully support operations like cross-subscription peering, hub-spoke peering, or certain service-managed VNets (like Microsoft Entra Domain Services).​ If your aadds-vnet is in a service-managed resource group (created automatically by Entra Domain Services), Azure may block direct edits or peerings initiated via the portal, causing the “Batch response item http error 400” on both attempts.

    Recommended action: Try initiating the peering only from the ServerA-vnet side (not from the managed aadds-vnet). If it still fails, you’ll need to upgrade your subscription from Free Trial to Pay-As-You-Go. After upgrading, the peering setup typically succeeds because full network access is restored.

    Reference:

    2. Connectivity to Gateway, DNS, and DHCP IPs:

    The default gateway (10.1.0.1), Azure’s internal DHCP (168.63.129.16), and DNS IPs won’t respond to ICMP (ping) — this is normal in Azure environments. These internal services are part of Azure’s host infrastructure and not reachable by ping, though DNS and DHCP functionality still operate correctly behind the scenes.​

    To validate network connectivity instead of ICMP, use PsPing or TcpPing on ports like 3389 (RDP) or 53 (DNS).

    Reference:

    i hope this clarify your concern, please do let me know if you need anything on this.

    If the provided information answers your query, do click "Upvote" and "Accept Answer", it will help others who might be facing similar challenges.

    Thanks,

    Harish.

    Was this answer helpful?

    0 comments No comments

0 additional answers

Sort by: Most helpful

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.