You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/network-watcher/diagnose-communication-problem-between-networks.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -88,10 +88,10 @@ Repeat the previous steps to create the second virtual network using the followi
88
88
89
89
| Setting | Value |
90
90
| --- | --- |
91
-
| Name |**myVNet2**.|
92
-
| IPv4 address space |**10.2.0.0/16**.|
93
-
| Subnet name |**mySubnet**.|
94
-
| Subnet address range |**10.2.0.0/24**.|
91
+
| Name |**myVNet2**|
92
+
| IPv4 address space |**10.2.0.0/16**|
93
+
| Subnet name |**mySubnet**|
94
+
| Subnet address range |**10.2.0.0/24**|
95
95
96
96
## Create a storage account and a container
97
97
@@ -183,8 +183,8 @@ To create the second VPN gateway, repeat the previous steps you used to create t
183
183
184
184
After creating **VNet1GW** and **VNet2GW** virtual network gateways, you can create connections between them to allow communication over secure IPsec/IKE tunnel between **VNet1** and **VNet2** virtual networks. To create the IPsec/IKE tunnel, you create two connections:
185
185
186
-
- From **VNet1** to **VNet2**.
187
-
- From **VNet2** to **VNet1**.
186
+
- From **VNet1** to **VNet2**
187
+
- From **VNet2** to **VNet1**
188
188
189
189
### Create first connection
190
190
@@ -215,7 +215,7 @@ After creating **VNet1GW** and **VNet2GW** virtual network gateways, you can cre
215
215
| --- | --- |
216
216
| Name |**to-VNet1**|
217
217
| Second virtual network gateway |**VNet1GW**|
218
-
| Shared key (PSK) |Enter *000*.|
218
+
| Shared key (PSK) |**000**|
219
219
220
220
> [!NOTE]
221
221
> To successfully create an IPsec/IKE tunnel between two Azure VPN gateways, the connections between the gateways must use identical shared keys. In the previous steps, two different keys were used to create a problem with the gateway connections.
0 commit comments