Hello,
i have created a site-to-site vpn in my azure virtual network. Now im trying to add a point-to-site vpn in the same virtual Network, but it does not work, because it's disabled.
thx in advance.
Hello,
i have created a site-to-site vpn in my azure virtual network. Now im trying to add a point-to-site vpn in the same virtual Network, but it does not work, because it's disabled.
thx in advance.
I have followed some tutorials, as a result I have on the Server Manager Dashboard AD DS, DNS, File and Storage Services, IIS, Local Server.
To try IIS I made a simple HTML file using notepad , it is located at c: inetpub\wwwroot (path that was made automatically)
I pointed the virtual machine internet explorer to localhost and it rendered my file.
But this file is not visble for my local pc internet explorer when I point to <my>.cloudapp.net or when I point to the IP address of the virtual machine
I need to know the basic steps to see what is wrong or lacking
I found this warning when testing the website
The server is configured to use pass-through authentication with a built-in account to access the specified physical path. However, IIS Manager cannot verify whether the built-in account has access. Make sure that the application pool identity has Read access to the physical path. If this server is joined to a domain, and the application pool identity is NetworkService or LocalSystem, verify that <domain>\<computer_name>$ has Read access to the physical path. Then test these settings again.
I want to know if there is a performance advantage to creating a virtual network within an Azure Data Centre.
I have a number of web roles which currently make HTTP requests to a box set up as a Virtual Machine with a public IP using basic authentication (in the same Azure Data Centre).
Would there be lower latency if I put the Web Roles and the Virtual Machines on a Virtual Network and used the VPN address for these HTTP requests instead of the public IP?
Hi,
I created 2 Virtual Machines under the same cloud service. I need to make these Virtual machines communicate as 1 of them will be the SQL Database of the other server.
When created they were created on a different subnet. Is there something I can do on the network configuration?
How can I make these 2 VMs communicate together?
Thanks & Regards,
A
Hello,
I am trying to establish a Point to Site VPN connection between my PC running Windows 8.1 64bit and Windows Azure network per the instructions below
http://msdn.microsoft.com/en-us/library/windowsazure/dn133792.asp
I have completed all the steps and got to the point where I should be installing the VPN client package. I have downloaded .exe file from the Management Potal, and upon launching the application is asking me for my admin credentials. In a bit I can see some files being extracted to a temp folder, however this is where the installation stops and nothing actually happens afterwards.
Has someone ever faced a similar problem and do you have any recommendations on how to resolve it?
Thanks in advance.
I have an existing Virtual Machine that I set up with default networking. I have now set up a new Virtual Network as per below , for the Point to Site VPN Scenario
http://msdn.microsoft.com/en-us/library/windowsazure/dn133792.aspx
I can't see how to move my VM to this new Virtual Network ?
cheers,
Andy
Does Traffic Manager have static ip address?
We want to use Traffic Manager, but we can't use CNAME to redirect to ourservice.trafficmanager.net.
Thanks,
Lukas
udione
Hello
I am trying to setup a S2S Azure VPN to our office. When I select static gateway, it works fine with Cisco 881.
I created another azure network with DYNAMIC Gateway and not able to setup S2S.
1. Do I need a separate IP address for both end of tunnels ( tunnel IP address?)?
2. I downloaded the vpnscript from portal for Dynamic routers. What is the auto ip in the last section under 'INT TUNNEL 1' IP Address 169.254.0.1.....?
3. How do I define route based ( Azure Dynamic Gateway) vpn in Cisco and connect to Azure?
Please advise. Thank you very much.
Hi,
We currently run Office 365 and have a federated domain for single sign-on. Like others have posted here we are investigating the possibility of moving our federation server farm and proxies to Azure, but I have a further question that was not answered in previous posts.
The Microsoft Online Deployment Guide for Office 365 lays out the recommended configuration for the federation service here:http://technet.microsoft.com/en-us/library/ff652539.aspx
As per Microsoft's recommendations the federation proxies should be placed in a perimeter network (as they are exposed to the Internet) and firewalled off from the actual federation servers (and the rest of the internal network), with only port 443 left open for communication from the proxies to the federation server farm.
From my reading on the Azure IaaS services, I could not find any way to configure a perimeter network that would suitably isolate the federation service proxies. My question then is, is there a way to configure a suitable perimeter network in Azure to place the federation proxies? or do you not recommend Office 365 federation services be placed in Azure at this time?
Thanks in advance for your assistance,
Mike.
Hi, I have a cloud service added to a Virtual Network, it's added properly. I can see it on the list of resources for the Virtual Network. However, when I try to configure the RDP it doesn't work. I've tried it many times now with no success.
Any ideas?
Thanks
Eamonn
Hi
I have a VM which is the domain controller for all servers.Yesterday i was trying to login into our Domain Controller but its saying login failed.I am using the same password that i was using before but still not working.
What should i do? My production site is also dependent on the active directory.I cannot log into active directory to unlock accounts.I am stuck.We are a small company
I want to create or delete virtual network on azure using REST API . I am doing that with Set Network Configuration option in azure REST API but using this if i have created one network and want to create another network then first i have to download network configuration file and will append new network configurations in that file and will upload that file back to azure . same way if I have to delete one network then again I have to download network config file and will remove network which I want to delete and will upload that file again .
But I have a scenario where multiple request may go to azure for network creation and deletion on same time . then those request can not be handled in this way because they can override each other .
so I want a solution where I can send request for particular network for creation/deletion.
Please suggest solution for this .
I have a few virtual machines which are already joined to a virtual network. This network was created without a local network and gateway. Now we have to add a VPN connection to our local network. What's the best way to do this?
- Is there any way to change the Virtual Network of a VM?
- Can we add a local network and gateway to an existing virtual network?
Thanks for any kind of help.
Hi all,
We have a project in play where we need to host some private customer data in Azure IAAS for testing, POCs and such.
In essence, we have setup a lab with a bunch of VMs, a virtual network, and have also setup a point-to-site VPN so that only folks with the issued cert can connect to the VMs.
However, to get the security team's blessing to host the private data in Azure, they would like to be able to audit all access attempts to the VMs.
1. Are there any capabilities from the Azure side of the point-to-site VPN to show who all has accessed the VPN?
2. Are there any capabilities for enhanced security for the VPN tunnel? IE: The ability to require a password as well as a cert?
The current hurdle is that anyone who is able to get their hands on the root cert can connect to the VPN and potentially, now has connectivity to the VMs that host the data.
There is standard windows security on the VMs (ie they are in domains and non-standard admin name and strong password is being used), but the security team does not want to have to install intrusion detection out in Azure and have yet another environment to monitor.
They will be reassured if we can show them that the VPN tunnel is uber secure and is auditable.
Do we have these capabilities?
Hello,
I would like to realise the following in Azure:
1 Virtual network containg several VM's.
These VM's need to be accessable from 2 seperate locations (Offices).
Between NL and Azure I have managed to succesfully setup a VPN-tunnel.
A second VPN-tunnel needs to be setup between Azure and an office in a different country.
The Azure VPN script doesn't provide the 2nd local network, as I can connect it to only one 'gateway/firewall'.
Basically I would like to connect 2 VPN-tunnels from seperate locations to the same Azure gateway.
As I can connect several VPN's to my office gateway (firewall), I assume this is somehow posible in Azure as well. But how?
Schematic:
The dotted-line is what I would like to setup.
I don't want the other office to connect to Azure via the VPN-tunnel between the 2 offices.
I would like to the other office to connect to Azure directly.
When I want to setup a 2nd Virtual Network in Azure, I am able to configure a VPN tunnel to the other office, but that Virtual Private Network gets a seprate subnet within Azure. I don't want that. I want them to connect to the already exisiting subnet that
contains a few VM's.
Does anyone know the best approach for this?
What am I missing?
I this techincally possible?
Some aid into the right direction would be very welcome. :)
Is it possible to change the configured DNS Server settings for a Virtual Network after it has been created and is being used by machines.
Through the preview portal I understand this is not possible, but was wondering if this is something which could be done with PowerShell?
The use case for this is after deploying an AD server to azure, so that machines in Azure no longer need to rely on the VPN link to be active in order for them to make DNS queries i.e. to our on site DNS servers.
I posted this question on Stack overflow and got a response that I have to delete the vm's delete the Gateway and import the configuration with the changed address cidr. I do not want to delete the vm's and I would like to make sure that the gateway IP and sharekey donot change. How can I accomplish this? Deleting and recreating vm's and gateway's is too disruptive and not sustainable?
The current config shows these lines:
<VirtualNetworkSites>
<VirtualNetworkSite name="FTR-FTW-VPN" AffinityGroup="Frontier-VPN">
<AddressSpace>
<AddressPrefix>10.250.112.0/24</AddressPrefix>
</AddressSpace>
I would like it read like so - note just the cidr changes
<VirtualNetworkSites>
<VirtualNetworkSite name="FTR-FTW-VPN" AffinityGroup="Frontier-VPN">
<AddressSpace>
<AddressPrefix>10.250.112.0/22</AddressPrefix>
</AddressSpace>
Hi All,
In On premises I am having 2 Domain controllers (Primary Dc & Additional Dc ).
For both Domain controllers need DR site On windows Azure. In this scenario, in case of failure in on-premises ,
1) All users should automatically connect the DR site from On-premises
2)From Off-premises by using VPN connection.
Please guide me how to achieve above scenario. Also Need prerequisite details for achieving above scenario.
Waiting for your response.
Thanks All.
Regards,
VA
HI,
I have created my Azure virtual network as well as my affinity group per direction before creating my 2 x Azure VMs. I cannot figure out how to get them in my virtual network . When I change the IP on the VM to an address in my range, I can no longer reach it. I can remote to the other VM from each but cannot ping. they are in separate Azure DHCP subnets. The objective is to promote one to a DC and then join the other VM to my new domain. Any help out there?
Stuart