Azure VPN can connect to backend when using AD authentication but not with IKEv2

Simon Skelton 96 Reputation points
2021-03-24T08:17:34.707+00:00

Good day, I have setup Azure VPN P2S using Active directory authentication and this works, I can connect to the VM's in the backend using the private IP. But now I found out that some of the users have Apple devices and the mac OS doesnt support this. so I changed the Authentication to use IKEv2 and installed the Root Cert and Client Certs. I can connect to the Azure VPN fine, I get the correct routes showing the correct routes to the peered Vnet but yet I cannot connect or ping any of the VM's at all, at first I thought this could be a peering issue between the Vnets, however I created a VM in the default Subnet of the Vnet hosting the VPN gateway and still I could not connect, if I connect 2 clients to the VPN I can ping each client from one of the clients. I'm certain this is a routing issue, but it makes no sense as the routes are showing up.

Azure VPN Gateway
Azure VPN Gateway
An Azure service that enables the connection of on-premises networks to Azure through site-to-site virtual private networks.
{count} votes

Answer accepted by question author
  1. Simon Skelton 96 Reputation points
    2021-03-24T14:37:12.133+00:00

    So I pulled an absolute noob move and had an overlapping IP range between the Vnet and the VPN client IP Range

    cause 10.0.50.0/24 fits into my Vnet range of 10.0.0.0/16

    changed the range and solved the problem

    0 comments No comments

0 additional answers

Sort by: Most helpful

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.