Skip to content

Commit 04e9a45

Browse files
authored
Update virtual-network-troubleshoot-peering-issues.md
1 parent 9b14934 commit 04e9a45

File tree

1 file changed

+25
-25
lines changed

1 file changed

+25
-25
lines changed

articles/virtual-network/virtual-network-troubleshoot-peering-issues.md

Lines changed: 25 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -24,11 +24,11 @@ This troubleshooting guide provides steps to help you resolve most [virtual netw
2424

2525
![Diagram of virtual network peering](./media/virtual-network-troubleshoot-peering-issues/4489538_en_1.png)
2626

27-
## Scenario 1: Configure virtual network peering between two virtual networks
27+
## Configure virtual network peering between two virtual networks
2828

2929
Are the virtual networks in the same subscription or in different subscriptions?
3030

31-
### Connection type 1: The virtual networks are in the same subscription
31+
### The virtual networks are in the same subscription
3232

3333
To configure virtual network peering for the virtual networks that are in the same subscription, use the methods in the following articles:
3434

@@ -50,31 +50,31 @@ To configure virtual network peering for the virtual networks that are in the sa
5050
5151
For more information, see the [requirements and constraints](https://docs.microsoft.com/azure/virtual-network/virtual-network-peering-overview#requirements-and-constraints) of global peering.
5252

53-
### Connection type 2: The virtual networks are in different subscriptions or Active Directory tenants
53+
### The virtual networks are in different subscriptions or Active Directory tenants
5454

5555
To configure virtual network peering for virtual networks in different subscriptions or Active Directory tenants, see [Create peering in different subscriptions for Azure CLI](https://docs.microsoft.com/azure/virtual-network/create-peering-different-subscriptions#cli).
5656

5757
> [!Note]
5858
> To configure network peering, you must have **Network Contributor** permissions in both subscriptions. For more information, see [Peering permissions](virtual-network-manage-peering.md#permissions).
5959
60-
## Scenario 2: Configure virtual network peering with hub-spoke topology that uses on-premises resources
60+
## Configure virtual network peering with hub-spoke topology that uses on-premises resources
6161

6262
![Diagram of virtual network peering with on-premises spoke](./media/virtual-network-troubleshoot-peering-issues/4488712_en_1a.png)
6363

64-
### Connection type 1: For a site-to-site connection or an ExpressRoute connection
64+
### For a site-to-site connection or an ExpressRoute connection
6565

6666
Follow the steps in: [Configure VPN gateway transit for virtual network peering](https://docs.microsoft.com/azure/vpn-gateway/vpn-gateway-peering-gateway-transit?toc=/azure/virtual-network/toc.json).
6767

68-
### Connection type 2: For point-to-site connections
68+
### For point-to-site connections
6969

7070
1. Follow the steps in: [Configure VPN gateway transit for virtual network peering](https://docs.microsoft.com/azure/vpn-gateway/vpn-gateway-peering-gateway-transit?toc=/azure/virtual-network/toc.json).
7171
2. After virtual network peering is established or changed, download and reinstall the point-to-site package so that the point-to-site clients get the updated routes to the spoke virtual network.
7272

73-
## Scenario 3: Configure virtual network peering with hub-spoke topology virtual network
73+
## Configure virtual network peering with hub-spoke topology virtual network
7474

7575
![Diagram of virtual network peering with a virtual network spoke](./media/virtual-network-troubleshoot-peering-issues/4488712_en_1b.png)
7676

77-
### Connection type 1: The virtual networks are in the same region
77+
### The virtual networks are in the same region
7878

7979

8080
1. In the hub virtual network, configure a network virtual appliance (NVA).
@@ -87,7 +87,7 @@ For more information, see [Service chaining](https://docs.microsoft.com/azure/vi
8787
8888
For help with troubleshooting the NVA device setup and routing, see [Network virtual appliance issues in Azure](https://docs.microsoft.com/azure/virtual-network/virtual-network-troubleshoot-nva).
8989

90-
### Connection type 2: The virtual networks are in different regions
90+
### The virtual networks are in different regions
9191

9292
Transit over global virtual network peering is now supported. Connectivity does not work over global virtual network peering for the following resources:
9393

@@ -103,11 +103,11 @@ Transit over global virtual network peering is now supported. Connectivity does
103103

104104
To learn more about global peering requirements and restraints, see [Virtual network peering](https://docs.microsoft.com/azure/virtual-network/virtual-network-peering-overview#requirements-and-constraints).
105105

106-
## Scenario 4: Troubleshoot a connectivity issue between two peered virtual networks
106+
## Troubleshoot a connectivity issue between two peered virtual networks
107107

108108
Sign in to the [Azure portal](https://portal.azure.com/) with an account that has the necessary [roles and permissions](virtual-network-manage-peering.md#permissions). Select the virtual network, select **Peering**, and then check the **Status** field. What is the status?
109109

110-
### Connection type 1: The peering status is "Connected"
110+
### The peering status is "Connected"
111111

112112
To troubleshoot this issue:
113113

@@ -123,7 +123,7 @@ To troubleshoot this issue:
123123
1. Start a network trace on the destination VM. For Windows, you can use **Netsh**. For Linux, use **TCPDump**.
124124
2. Run **TcpPing** or **PsPing** from the source to the destination IP.
125125

126-
* This is an example of a **TcpPing** command: `tcping64.exe -t <destination VM address> 3389`
126+
This is an example of a **TcpPing** command: `tcping64.exe -t <destination VM address> 3389`
127127

128128
3. After the **TcpPing** is complete, stop the network trace on the destination.
129129
4. If packets arrive from the source, there is no networking issue. Examine both the VM firewall and the application listening on that port to locate the configuration issue.
@@ -143,22 +143,22 @@ To troubleshoot this issue:
143143
144144
For more information, see the [requirements and constraints](https://docs.microsoft.com/azure/virtual-network/virtual-network-peering-overview#requirements-and-constraints) of global peering.
145145

146-
### Connection type 2: The peering status is "Disconnected"
146+
### The peering status is "Disconnected"
147147

148148
To resolve this issue, delete the peering from both virtual networks, and then re-create them.
149149

150-
## Scenario 5: Troubleshoot a connectivity issue between a hub-spoke virtual network and an on-premises resource
150+
## Troubleshoot a connectivity issue between a hub-spoke virtual network and an on-premises resource
151151

152152
Does your network use a third-party NVA or VPN gateway?
153153

154-
### Connection type 1: My network uses a third-party NVA or VPN gateway
154+
### My network uses a third-party NVA or VPN gateway
155155

156156
To troubleshoot connectivity issues that affect a third-party NVA or VPN gateway, see the following articles:
157157

158158
* [NVA troubleshooter](https://docs.microsoft.com/azure/virtual-network/virtual-network-troubleshoot-nva)
159159
* [Service chaining](https://docs.microsoft.com/azure/virtual-network/virtual-network-peering-overview#service-chaining)
160160

161-
### Connection type 2: My network does not use a third-party NVA or VPN gateway
161+
### My network does not use a third-party NVA or VPN gateway
162162

163163
Do the hub virtual network and the spoke virtual network have a VPN gateway?
164164

@@ -182,13 +182,13 @@ For point-to-site connections:
182182
* On the virtual network that doesn't have a gateway, verify that the **Use remote gateway** check box is selected.
183183
* Download and reinstall the point-to-site client package. Virtual network routes that are newly peered don't automatically add routes to point-to-site clients.
184184

185-
## Scenario 6: Troubleshoot a hub-spoke network connectivity issue between spoke virtual networks in the same region
185+
## Troubleshoot a hub-spoke network connectivity issue between spoke virtual networks in the same region
186186

187187
A hub network must include an NVA. Configure UDRs in spokes that have an NVA set as the next hop, and enable **Allow forwarded traffic** in the hub virtual network.
188188

189189
For more information, see [Service chaining](https://docs.microsoft.com/azure/virtual-network/virtual-network-peering-overview#service-chaining), and discuss these requirements with the [NVA vendor](https://support.microsoft.com/help/2984655/support-for-azure-market-place-for-virtual-machines) of your choice.
190190

191-
## Scenario 7: Troubleshoot a hub-spoke network connectivity issue between spoke virtual networks in different regions
191+
## Troubleshoot a hub-spoke network connectivity issue between spoke virtual networks in different regions
192192

193193
Transit over global virtual network peering is now supported. Connectivity doesn't work over global virtual network peering for the following resources:
194194

@@ -204,7 +204,7 @@ Transit over global virtual network peering is now supported. Connectivity doesn
204204

205205
For more information, see the [requirements and constraints](https://docs.microsoft.com/azure/virtual-network/virtual-network-peering-overview#requirements-and-constraints) of global peering and [Different VPN Topologies](https://blogs.msdn.microsoft.com/igorpag/2016/02/11/hubspoke-daisy-chain-and-full-mesh-vnet-topologies-in-azure-arm-v2/).
206206

207-
## Scenario 8: Troubleshoot a hub-spoke network connectivity issue between a web app and the spoke virtual network
207+
## Troubleshoot a hub-spoke network connectivity issue between a web app and the spoke virtual network
208208

209209
To troubleshoot this issue:
210210

@@ -214,23 +214,23 @@ To troubleshoot this issue:
214214

215215
For more information, see the following articles:
216216

217-
* [Integrate your app with an Azure Virtual Network](https://docs.microsoft.com/azure/app-service/web-sites-integrate-with-vnet)
217+
* [Integrate your app with an Azure virtual network](https://docs.microsoft.com/azure/app-service/web-sites-integrate-with-vnet)
218218
* [About Point-to-Site VPN routing](https://docs.microsoft.com/azure/vpn-gateway/vpn-gateway-about-point-to-site-routing)
219219

220-
## Scenario 9: Troubleshoot a virtual network peering configuration error message
220+
## Troubleshoot a virtual network peering configuration error message
221221

222-
### Error 1: Current tenant `<TENANT ID>` isn't authorized to access linked subscription
222+
### Current tenant `<TENANT ID>` isn't authorized to access linked subscription
223223

224224
To resolve this issue, see [Create peering - Azure CLI](https://docs.microsoft.com/azure/virtual-network/create-peering-different-subscriptions#cli).
225225

226-
### Error 2: Not connected
226+
### Not connected
227227

228228
To resolve this issue, delete the peering from both virtual networks, and then recreate them.
229229

230-
### Error 3: Failed to peer a Databricks virtual network
230+
### Failed to peer a Databricks virtual network
231231

232232
To resolve this issue, configure the virtual network peering under **Azure Databricks**, and then specify the target virtual network by using **Resource ID**. For more information, see [Peer a Databricks virtual network to a remote virtual network](https://docs.azuredatabricks.net/administration-guide/cloud-configurations/azure/vnet-peering.html#id2).
233233

234234
## Next steps
235235

236-
* [Troubleshooting connectivity problems between Azure VMs](https://docs.microsoft.com/azure/virtual-network/virtual-network-troubleshoot-connectivity-problem-between-vms)
236+
* [Troubleshooting connectivity problems between Azure VMs](https://docs.microsoft.com/azure/virtual-network/virtual-network-troubleshoot-connectivity-problem-between-vms)

0 commit comments

Comments
 (0)