Globally unique resources that provide access to data management services and serve as the parent namespace for the services.
- Verifying on-premises traffic with VPN Gateway diagnostics
Use VPN Gateway diagnostic logs and Network Watcher VPN troubleshoot to validate whether on-premises traffic is reaching the gateway and if the tunnel is healthy.
From the provided context:
- VPN Gateway diagnostics produce:
- GatewayDiagnosticLog
- TunnelDiagnosticLog
- RouteDiagnosticLog
- IKEDiagnosticLog
- P2SDiagnosticLog (for P2S)
- Network Watcher VPN troubleshoot writes detailed logs (IKElogs, IKEErrors, ConnectionStats, CPUStats, etc.) into a storage account and also returns a Healthy/UnHealthy status for the gateway and connection.
Recommended approach:
- Run Network Watcher VPN troubleshoot on the affected VPN connection:
- In Azure portal → Network Watcher → VPN troubleshoot.
- Select the VPN gateway and the specific connection.
- Select a storage account/container and start troubleshooting.
- When complete, check:
- The status (Healthy/UnHealthy) in the portal.
- The generated logs in the storage account (especially IKElogs/IKEErrors and ConnectionStats).
- Common issues highlighted in logs include:
- Shared key mismatch:
-
Error: Authentication failed. Check shared key.
-
- IPsec parameter mismatch:
-
Error: On-premises device rejected Quick Mode settings. Check values. based on log : Peer sent NO_PROPOSAL_CHOSEN notify
-
- Shared key mismatch:
- Use the VPN troubleshoot log files:
- ConnectionStats.txt: shows connection state, ingress/egress bytes, and connection time. This confirms whether the tunnel is up and passing traffic.
- IKElogs.txt / IKEErrors.txt: show IKE activity and failures.
- Scrubbed-wfpdiag.txt: contains packet drop and IKE/AuthIP failures.
These logs confirm whether the tunnel is established and whether packets are being dropped at the gateway. The context does not provide specific KQL examples for extracting source IPs or subnets from these logs, so only the above log-level guidance is supported.
If more detailed analysis is needed, configure VPN Gateway diagnostics to Log Analytics (already done) and use the documented log types (GatewayDiagnosticLog, TunnelDiagnosticLog, RouteDiagnosticLog, IKEDiagnosticLog) as described in the VPN Gateway diagnostics article referenced in the context.
- Traceroute to Storage Account FQDN / ICMP limitations
The context confirms that for network datapath troubleshooting in Azure environments, relying on ICMP (ping/traceroute) is discouraged and often blocked:
- Ping/ICMP is frequently blocked by OS and network firewalls.
- Load-balanced or virtual IP endpoints typically block ping by default.
- Instead of ping/traceroute, the recommended tools are:
-
Test-NetConnectionon Windows -
telneton Linux
-
Recommended method to validate routing/reachability to the Storage Account private endpoint:
- From on-premises:
- Use
Test-NetConnection(or equivalent) to the private endpoint IP or FQDN on port 443. - Run it in a loop for 15–30 seconds to generate sufficient traffic:
while ($true) { Test-NetConnection -ComputerName <storage-private-endpoint-FQDN-or-IP> -Port 443 }
- Use
- Collect network traces at both ends (on-premises and Azure VM in the same VNet as the private endpoint) and correlate with VPN Gateway logs.
Given Azure’s behavior, traceroute failure to a Storage Account private endpoint is expected and not a reliable diagnostic method.
- NSG + ICMP behavior for private endpoint subnet
The context does not include explicit NSG behavior documentation for ICMP vs. TCP ports 443/22. Therefore, no additional statements beyond what is in the context can be provided.
- IP overlap between different tunnels
The context does not cover IP overlap scenarios between different VPN tunnels or their interaction with peered VNets, so no supported answer can be provided from the given material.
Summary of supported actions from context
- Use Network Watcher VPN troubleshoot to:
- Diagnose VPN gateway and connection health.
- Generate logs (IKElogs, IKEErrors, ConnectionStats, Scrubbed-wfpdiag, etc.) in a storage account.
- Get a Healthy/UnHealthy result and guidance.
- Use VPN Gateway diagnostic logs (GatewayDiagnosticLog, TunnelDiagnosticLog, RouteDiagnosticLog, IKEDiagnosticLog, P2SDiagnosticLog) for deeper troubleshooting.
- Avoid relying on ping/traceroute; instead use
Test-NetConnection/telnetand collect traces from both ends.
References: