Share via

Unable to access Azure Storage Account from on-premises (network error) + need guidance on VPN Gateway logs and traceroute limitations

Shubhangi Nannware 120 Reputation points
2026-05-14T06:04:29.29+00:00

Problem Statement

We have an Azure Storage Account (with private endpoint enabled) that is accessed from on-premises via VPN Gateway.

Previously, users from on-premises were able to access containers successfully, but now they are encountering network errors while opening containers.

  • No changes have been made on the Azure side (network rules, firewall, private endpoint, DNS, etc.)
  • Access is already allowed from both Azure and on-premises
  • Issue is occurring only for on-premises users

We are currently troubleshooting connectivity between on-premises network and Azure VNet.

Observations

  • Storage account is configured with private endpoint
  • Traffic flows via VPN Gateway (Site-to-Site)
  • Diagnostic logs for VPN Gateway are enabled and sent to:
    • Log Analytics Workspace
    • Storage Account
    • On-premises team wants to validate routing using traceroute to storage account FQDN, but it is failing

Questions

  1. How to verify on-premises traffic using VPN Gateway diagnostic logs?

We want to confirm:

  • Whether traffic from specific on-prem IP/subnet is reaching Azure Virtual Network Gateway
  • Whether traffic is being dropped or not

We attempted KQL queries but did not get results.

However, we are not sure how to:

  • Extract source IP / subnet (on-prem side)
  • Validate incoming traffic patterns

Could you please provide:

  • Sample KQL queries to identify:
    • Source IPs hitting the gateway
    • Tunnel traffic status
  • Best way to confirm if traffic from on-prem network is reaching Azure
  1. Traceroute to Azure Storage FQDN (ICMP blocked scenario)

On-premises team wants to run traceroute to storage account FQDN, but it fails.

We understand:

  • Azure does not support ICMP/traceroute for endpoints in many scenarios

Questions:

  • Is there any supported way to validate routing path to Storage Account Private Endpoint?
  • Since traceroute depends on ICMP TTL expiry responses, is this expected behavior in Azure?
  1. Using NSG to allow ICMP for traceroute (Private Endpoint subnet)

We are considering:

  • Applying NSG on subnet where private endpoint exists
  • Adding rule: Allow ICMP

Need clarification:

  • Will allowing ICMP via NSG help traceroute scenario?
  • Will adding ICMP rule impact existing traffic (HTTPS/SMB/etc.)?

From our understanding:

  • NSGs are stateful and filter traffic based on protocol, port, source, destination
  • Storage account communication primarily uses (port 443 and 22)

Please confirm:

  • Allowing ICMP will NOT block existing ports like 443 and 22
  • And ICMP rule will just add additional allowed protocol, not override others

Also, requesting official Microsoft documentation link confirming if available:

Allowing ICMP in NSG does not block ports like 443 and 22

What we are trying to achieve

  • Validate whether issue is:
    • Routing problem
    • VPN tunnel issue
    • DNS resolution issue
    • Storage firewall / private endpoint issue

4.Can network error in container cause due to IPs overlapping between different LNG tunnels but both tunnels are using seperate Gateway but their vnet is peered

Expected Help

We are looking for guidance on:

  1. Correct KQL queries for VPN Gateway logs
  2. Alternative to traceroute for Azure Storage connectivity validation
  3. Confirmation on NSG + ICMP behavior
  4. Documentation references for the above
Azure Storage
Azure Storage

Globally unique resources that provide access to data management services and serve as the parent namespace for the services.


3 answers

Sort by: Most helpful
  1. Deleted

    This answer has been deleted due to a violation of our Code of Conduct. The answer was manually reported or identified through automated detection before action was taken. Please refer to our Code of Conduct for more information.


    Comments have been turned off. Learn more

  2. Deleted

    This answer has been deleted due to a violation of our Code of Conduct. The answer was manually reported or identified through automated detection before action was taken. Please refer to our Code of Conduct for more information.


    Comments have been turned off. Learn more

  3. Q&A Assist
    2026-05-14T06:04:56.65+00:00
    AI generated content. This question contains an answer created with AI from Q&A Assist. Learn more
    1. Verifying on-premises traffic with VPN Gateway diagnostics

    Use VPN Gateway diagnostic logs and Network Watcher VPN troubleshoot to validate whether on-premises traffic is reaching the gateway and if the tunnel is healthy.

    From the provided context:

    • VPN Gateway diagnostics produce:
      • GatewayDiagnosticLog
      • TunnelDiagnosticLog
      • RouteDiagnosticLog
      • IKEDiagnosticLog
      • P2SDiagnosticLog (for P2S)
    • Network Watcher VPN troubleshoot writes detailed logs (IKElogs, IKEErrors, ConnectionStats, CPUStats, etc.) into a storage account and also returns a Healthy/UnHealthy status for the gateway and connection.

    Recommended approach:

    1. Run Network Watcher VPN troubleshoot on the affected VPN connection:
      • In Azure portal → Network Watcher → VPN troubleshoot.
      • Select the VPN gateway and the specific connection.
      • Select a storage account/container and start troubleshooting.
      • When complete, check:
        • The status (Healthy/UnHealthy) in the portal.
        • The generated logs in the storage account (especially IKElogs/IKEErrors and ConnectionStats).
      • Common issues highlighted in logs include:
        • Shared key mismatch:
          • Error: Authentication failed. Check shared key.
        • IPsec parameter mismatch:
          • Error: On-premises device rejected Quick Mode settings. Check values. based on log : Peer sent NO_PROPOSAL_CHOSEN notify
    2. Use the VPN troubleshoot log files:
      • ConnectionStats.txt: shows connection state, ingress/egress bytes, and connection time. This confirms whether the tunnel is up and passing traffic.
      • IKElogs.txt / IKEErrors.txt: show IKE activity and failures.
      • Scrubbed-wfpdiag.txt: contains packet drop and IKE/AuthIP failures.

    These logs confirm whether the tunnel is established and whether packets are being dropped at the gateway. The context does not provide specific KQL examples for extracting source IPs or subnets from these logs, so only the above log-level guidance is supported.

    If more detailed analysis is needed, configure VPN Gateway diagnostics to Log Analytics (already done) and use the documented log types (GatewayDiagnosticLog, TunnelDiagnosticLog, RouteDiagnosticLog, IKEDiagnosticLog) as described in the VPN Gateway diagnostics article referenced in the context.

    1. Traceroute to Storage Account FQDN / ICMP limitations

    The context confirms that for network datapath troubleshooting in Azure environments, relying on ICMP (ping/traceroute) is discouraged and often blocked:

    • Ping/ICMP is frequently blocked by OS and network firewalls.
    • Load-balanced or virtual IP endpoints typically block ping by default.
    • Instead of ping/traceroute, the recommended tools are:
      • Test-NetConnection on Windows
      • telnet on Linux

    Recommended method to validate routing/reachability to the Storage Account private endpoint:

    • From on-premises:
      • Use Test-NetConnection (or equivalent) to the private endpoint IP or FQDN on port 443.
      • Run it in a loop for 15–30 seconds to generate sufficient traffic:
            while ($true) {
                Test-NetConnection -ComputerName <storage-private-endpoint-FQDN-or-IP> -Port 443
            }
        
    • Collect network traces at both ends (on-premises and Azure VM in the same VNet as the private endpoint) and correlate with VPN Gateway logs.

    Given Azure’s behavior, traceroute failure to a Storage Account private endpoint is expected and not a reliable diagnostic method.

    1. NSG + ICMP behavior for private endpoint subnet

    The context does not include explicit NSG behavior documentation for ICMP vs. TCP ports 443/22. Therefore, no additional statements beyond what is in the context can be provided.

    1. IP overlap between different tunnels

    The context does not cover IP overlap scenarios between different VPN tunnels or their interaction with peered VNets, so no supported answer can be provided from the given material.

    Summary of supported actions from context

    • Use Network Watcher VPN troubleshoot to:
      • Diagnose VPN gateway and connection health.
      • Generate logs (IKElogs, IKEErrors, ConnectionStats, Scrubbed-wfpdiag, etc.) in a storage account.
      • Get a Healthy/UnHealthy result and guidance.
    • Use VPN Gateway diagnostic logs (GatewayDiagnosticLog, TunnelDiagnosticLog, RouteDiagnosticLog, IKEDiagnosticLog, P2SDiagnosticLog) for deeper troubleshooting.
    • Avoid relying on ping/traceroute; instead use Test-NetConnection/telnet and collect traces from both ends.

    References:

    Was this answer helpful?

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.