Hi @Amarjeet Saini , I understand that you've set up VPN site-to-site between Azure and on-prem network. You can reach Azure VM from on-prem but you can't do it the other way around.
For Azure VM to be able to reach on-prem network, if your VM is not in the same Vnet (virtual network) as your VPN gateway, you need to create a route table to let your VM know where to go, which is to use virtual network gateway (your VPN gateway).
First step: Your peering connection needs to reflect the correct setup. Let's say your setup is similar to this:
Vnet Hub (where your VPN gateway is) -----peering----- Vnet B (where your Azure VM is)
Peering of Vnet Hub to Vnet B - use local gateway, allow gateway transit.
Peering of Vnet B to Vnet Hub - use remote gateway.
Second step: Create a new Route Table then add an entry to the route table:
Address prefix: your on-prem (eg. 192.168.0.0/16); Next hop: Virtual Network Gateway
Then associate the route table to your VM's subnet.
Third step: make sure there is no firewall blocking the connection, whether on-premises firewall, Azure NSG, or on-prem Windows firewall.
Please accept an answer if correct. Original posters help the community find answers faster by identifying the correct answer. Here is how.