Hi @Aleksey Vitsko , from your screenshots of NIC routes and NSG:
- You have NSG inbound entry on MI-2: source 172.16.x.x -> is this your on-premises?
- There is no route for 172.16.x.x, so MI-2 does not know where to route the reply traffic.
What you can do, either:
- Enable BGP if your VPN Gateway SKU is not Basic (Basic does not support BGP), or
- Create an entry on the route table applied to MI-2 subnet: 172.16.x.x (your on-premises CIDR) next hop: Virtual Network Gateway.
If you go with #2, these are the pre-requisites:
- you can't have a Virtual Network Gateway (VPN Gateway) locally at MI-2 vNet
- do not peer MI-2 vNet with any other vNet that has a VPN Gateway, make sure that MI-2 vNet is only peered with one vNet that has a vNet gateway (VPN vNet)
- enable transit on the peerings:
- peering of VPN vNet to MI-2 vNet -> Allow both traffic settings (traffic to remote virtual network and traffic forwarded from remote virtual network), Use this virtual network's gateway
- peering of MI-2 vNet to VPN vNet -> Allow both traffic settings (traffic to remote virtual network and traffic forwarded from remote virtual network), Use remote virtual network's gateway
Please accept an answer if correct. Original posters help the community find answers faster by identifying the correct answer. Here is how.