end point at azure can not reach from outside

Jasa Atum 20 Reputation points

Hi All,

I deployed FortigateVM at Azure Portal with BYOD, and installed Windows 10 VM too for testing to outsite.

I configure IPSec VPN between FortigateVM at azure <> to Fortigate OnPremise at my Office.

VPN tunnels are established.

Win10 VM reachable to Window Apliance on my office,

but if i try ping from Windows appliance to Win10 VM, that not reachable / RTO.

-Win10 VM reachable to internet.

-NIC at Win10 VM Azure already allowed all for NSG

-routing table already configured

Much appreciated for your help.



Azure Virtual Network
Azure Virtual Network
An Azure networking service that is used to provision private networks and optionally to connect to on-premises datacenters.
2,227 questions
{count} votes

Accepted answer
  1. KapilAnanth-MSFT 38,056 Reputation points Microsoft Employee

    @Jasa Atum ,

    Welcome to the Microsoft Q&A Platform. Thank you for reaching out & I hope you are doing well.

    I see you are using a 3rd party NVA in Azure to set up a Site to Site VPN and not Azure VPN Gateway.

    I believe you are following the configuration from Connecting a local FortiGate to an Azure FortiGate via site-to-site VPN.

    Please note that community members in Q&A Forum would have expertise over Azure Products.

    However, the same cannot be said for 3rd party services (as VMs are IaaS Offerings).

    With that said,

    • AzureVM to OnPrem servers working indicates that the routing is properly configured.
    • OnPrem servers to AzureVM not working indicates either
      • OnPrem servers are not properly routed to the "Fortigate OnPremise"
      • or your NVA (FortigateVM) is not forwarding the traffic to Azure VMs.

    As next steps,

    I would suggest you to check with the 3rd party's support or community forum to get more details on the configuration or logs which you could gather within the NVA.



0 additional answers

Sort by: Most helpful