P2S VPN user connectivity issue in Azure virtual WAN

Raviraj Velankar 86 Reputation points
2023-02-20T12:01:07.33+00:00

Doing PoC for Virtual WAN but facing issues for p2s vpn connectivity. P2S remote user when connected to virtual hub is not able to access resources in same region spoke Vnet and in other region Spoke Vnet.

We have Azure Virtual WAN setup with two vWAN Hub- EastUS2 and Central US as per following

  • One Hub Vnet and one Spoke Vnet in each region. Hub Vnet in each region has Azure firewall (as NVA) which is manually created and not integrated with virtual hub.
  • Each Hub Vnet is peered with respective vWAN Hub. Branch and Vnet connections are associated and propagating to Default Route table.
  • Created Point to Site GW in EastUS2 vWAN Hub with Azure Certificate based authentication.
  • Created S2S VPN GW and Branch Site in Central US region.

As per routing scenarios given in Azure document "routing through NVA" done following steps

  • Added static route in respective Vnet connection for respective Spoke subnet to point towards respective NVA IP address. Added UDR in Spoke subnet with default route towards NVA IP address.
  • Added summarized static route in respective region vWAN Hub default route table which covers summary IP address range of Hub & Spoke Vnet with next hop as respective Vnet connection.

Checked default route table of EastUS2 vWAN Hub and it is showing address pool reserved for p2s users

Done setting of default route in p2s VPN GW so that it will advertise default route to remote users.

When executed route print command in remote user VM it is showing only two IP prefixes i.e. address pool reserved for p2s users and EastUS2 vWan Hub's Hub vnet but not any other IP address range.

Not sure what is the issue. Request for guidance.

Azure Virtual WAN
Azure Virtual WAN
An Azure virtual networking service that provides optimized and automated branch-to-branch connectivity.
197 questions
{count} votes