Skip to content

Commit ec5aa73

Browse files
Merge pull request #110448 from davidsmatlak/ds-asrdocfix06
Copyedits and doc freshness
2 parents 1639843 + 4550e40 commit ec5aa73

File tree

1 file changed

+92
-62
lines changed

1 file changed

+92
-62
lines changed
Lines changed: 92 additions & 62 deletions
Original file line numberDiff line numberDiff line change
@@ -1,114 +1,144 @@
11
---
2-
title: Troubleshoot connectivity for Azure to Azure disaster recovery with Azure Site Recovery
2+
title: Troubleshoot connectivity for Azure to Azure disaster recovery with Azure Site Recovery
33
description: Troubleshoot connectivity issues in Azure VM disaster recovery
44
author: sideeksh
55
manager: rochakm
66
ms.topic: how-to
7-
ms.date: 08/05/2019
7+
ms.date: 04/06/2020
88
---
99

1010
# Troubleshoot Azure-to-Azure VM network connectivity issues
1111

12-
This article describes the common issues related to network connectivity when you replicate and recover Azure virtual machines from one region to another region. For more information about networking requirements, see the [connectivity requirements for replicating Azure VMs](azure-to-azure-about-networking.md).
12+
This article describes the common issues related to network connectivity when you replicate and recover Azure virtual machines (VM) from one region to another region. For more information about networking requirements, see the [connectivity requirements for replicating Azure VMs](azure-to-azure-about-networking.md).
1313

1414
For Site Recovery replication to work, outbound connectivity to specific URLs or IP ranges is required from the VM. If your VM is behind a firewall or uses network security group (NSG) rules to control outbound connectivity, you might face one of these issues.
1515

16-
**URL** | **Details**
17-
--- | ---
18-
*.blob.core.windows.net | Required so that data can be written to the cache storage account in the source region from the VM. If you know all the cache storage accounts for your VMs, you can allow-list the specific storage account URLs (for example, cache1.blob.core.windows.net and cache2.blob.core.windows.net) instead of *.blob.core.windows.net
19-
login.microsoftonline.com | Required for authorization and authentication to the Site Recovery service URLs.
20-
*.hypervrecoverymanager.windowsazure.com | Required so that the Site Recovery service communication can occur from the VM. You can use the corresponding 'Site Recovery IP' if your firewall proxy supports IPs.
21-
*.servicebus.windows.net | Required so that the Site Recovery monitoring and diagnostics data can be written from the VM. You can use the corresponding 'Site Recovery Monitoring IP' if your firewall proxy supports IPs.
16+
| **URL** | **Details** |
17+
| --- | --- |
18+
| `*.blob.core.windows.net` | Required so that data can be written to the cache storage account in the source region from the VM. If you know all the cache storage accounts for your VMs, you can use an allow-list for the specific storage account URLs. For example, `cache1.blob.core.windows.net` and `cache2.blob.core.windows.net` instead of `*.blob.core.windows.net`. |
19+
| `login.microsoftonline.com` | Required for authorization and authentication to the Site Recovery service URLs. |
20+
| `*.hypervrecoverymanager.windowsazure.com` | Required so that the Site Recovery service communication can occur from the VM. You can use the corresponding _Site Recovery IP_ if your firewall proxy supports IPs. |
21+
| `*.servicebus.windows.net` | Required so that the Site Recovery monitoring and diagnostics data can be written from the VM. You can use the corresponding _Site Recovery Monitoring IP_ if your firewall proxy supports IPs. |
2222

2323
## Outbound connectivity for Site Recovery URLs or IP ranges (error code 151037 or 151072)
2424

25-
## <a name="issue-1-failed-to-register-azure-virtual-machine-with-site-recovery-151195-br"></a>Issue 1: Failed to register Azure virtual machine with Site Recovery (151195) </br>
26-
- **Possible cause** </br>
27-
- Connection cannot be established to Site Recovery endpoints due to DNS resolution failure.
28-
- This is more frequently seen during re-protection when you have failed over the virtual machine but the DNS server is not reachable from the DR region.
25+
### Issue 1: Failed to register Azure virtual machine with Site Recovery (151195)
2926

30-
- **Resolution**
31-
- If you're using custom DNS, make sure that the DNS server is accessible from the Disaster Recovery region. To check if you have a custom DNS go to the VM> Disaster Recovery network> DNS servers. Try accessing the DNS server from the virtual machine. If it is not accessible, make it accessible by either failing over the DNS server or creating the line of site between DR network and DNS.
27+
#### Possible cause
3228

33-
![com-error](./media/azure-to-azure-troubleshoot-errors/custom_dns.png)
29+
A connection can't be established to Site Recovery endpoints because of a Domain Name System (DNS) resolution failure. This problem is more common during reprotection when you've failed over the VM but the DNS server isn't reachable from the disaster recovery (DR) region.
3430

31+
#### Resolution
3532

36-
## Issue 2: Site Recovery configuration failed (151196)
33+
If you're using custom DNS, make sure that the DNS server is accessible from the disaster recovery region.
34+
35+
To check if the VM uses a custom DNS setting:
36+
37+
1. Open **Virtual machines** and select the VM.
38+
1. Navigate to the VMs **Settings** and select **Networking**.
39+
1. In **Virtual network/subnet**, select the link to open the virtual network's resource page.
40+
1. Go to **Settings** and select **DNS servers**.
41+
42+
Try to access the DNS server from the virtual machine. If the DNS server isn't accessible, make it accessible by either failing over the DNS server or creating the line of site between DR network and DNS.
43+
44+
:::image type="content" source="./media/azure-to-azure-troubleshoot-errors/custom_dns.png" alt-text="com-error":::
45+
46+
### Issue 2: Site Recovery configuration failed (151196)
3747

3848
> [!NOTE]
39-
> If the virtual machines are behind **Standard** internal load balancer, it would not have access to O365 IPs (that is, login.microsoftonline.com) by default. Either change it to **Basic** internal load balancer type or create outbound access as mentioned in the [article](https://aka.ms/lboutboundrulescli).
49+
> If the VMs are behind a **Standard** internal load balancer, by default, it wouldn't have access to the Office 365 IPs such as `login.microsoftonline.com`. Either change it to **Basic** internal load balancer type or create outbound access as mentioned in the article [Configure load balancing and outbound rules in Standard Load Balancer using Azure CLI](/azure/load-balancer/configure-load-balancer-outbound-cli).
50+
51+
#### Possible cause
4052

41-
- **Possible cause** </br>
42-
- Connection cannot be established to Office 365 authentication and identity IP4 endpoints.
53+
A connection can't be established to Office 365 authentication and identity IP4 endpoints.
4354

44-
- **Resolution**
45-
- Azure Site Recovery required access to Office 365 IPs ranges for authentication.
46-
If you are using Azure Network security group (NSG) rules/firewall proxy to control outbound network connectivity on the VM, ensure you allow communication to O365 IPranges. Create an [Azure Active Directory (Azure AD) service tag](../virtual-network/security-overview.md#service-tags) based NSG rule for allowing access to all IP addresses corresponding to Azure AD
47-
- If new addresses are added to Azure AD in the future, you need to create new NSG rules.
55+
#### Resolution
56+
57+
- Azure Site Recovery requires access to the Office 365 IP ranges for authentication.
58+
- If you're using Azure Network security group (NSG) rules/firewall proxy to control outbound network connectivity on the VM, ensure you allow communication to the Office 365 IP ranges. Create an [Azure Active Directory (Azure AD) service tag](/azure/virtual-network/security-overview#service-tags) based NSG rule that allows access to all IP addresses corresponding to Azure AD.
59+
- If new addresses are added to Azure AD in the future, you need to create new NSG rules.
4860

4961
### Example NSG configuration
5062

5163
This example shows how to configure NSG rules for a VM to replicate.
5264

53-
- If you're using NSG rules to control outbound connectivity, use "Allow HTTPS outbound" rules to port:443 for all the required IP address ranges.
54-
- The example presumes that the VM source location is "East US" and the target location is "Central US".
65+
- If you're using NSG rules to control outbound connectivity, use **Allow HTTPS outbound** rules to port 443 for all the required IP address ranges.
66+
- The example presumes that the VM source location is **East US** and the target location is **Central US**.
67+
68+
#### NSG rules - East US
69+
70+
1. Create an HTTPS outbound security rule for the NSG as shown in the following screenshot. This example uses the **Destination service tag**: _Storage.EastUS_ and **Destination port ranges**: _443_.
71+
72+
:::image type="content" source="./media/azure-to-azure-about-networking/storage-tag.png" alt-text="storage-tag":::
73+
74+
1. Create an HTTPS outbound security rule for the NSG as shown in the following screenshot. This example uses the **Destination service tag**: _AzureActiveDirectory_ and **Destination port ranges**: _443_.
5575

56-
### NSG rules - East US
76+
:::image type="content" source="./media/azure-to-azure-about-networking/aad-tag.png" alt-text="aad-tag":::
5777

58-
1. Create an outbound HTTPS (443) security rule for "Storage.EastUS" on the NSG as shown in the screenshot below.
78+
1. Create HTTPS port 443 outbound rules for the Site Recovery IPs that correspond to the target location:
5979

60-
![storage-tag](./media/azure-to-azure-about-networking/storage-tag.png)
80+
| **Location** | **Site Recovery IP address** | **Site Recovery monitoring IP address** |
81+
| --- | --- | --- |
82+
| Central US | 40.69.144.231 | 52.165.34.144 |
6183

62-
2. Create an outbound HTTPS (443) security rule for "AzureActiveDirectory" on the NSG as shown in the screenshot below.
84+
#### NSG rules - Central US
6385

64-
![aad-tag](./media/azure-to-azure-about-networking/aad-tag.png)
86+
For this example, these NSG rules are required so that replication can be enabled from the target region to the source region post-failover:
6587

66-
3. Create outbound HTTPS (443) rules for the Site Recovery IPs that correspond to the target location:
88+
1. Create an HTTPS outbound security rule for _Storage.CentralUS_:
6789

68-
**Location** | **Site Recovery IP address** | **Site Recovery monitoring IP address**
69-
--- | --- | ---
70-
Central US | 40.69.144.231 | 52.165.34.144
90+
- **Destination service tag**: _Storage.CentralUS_
91+
- **Destination port ranges**: _443_
7192

72-
### NSG rules - Central US
93+
1. Create an HTTPS outbound security rule for _AzureActiveDirectory_.
7394

74-
These rules are required so that replication can be enabled from the target region to the source region post-failover:
95+
- **Destination service tag**: _AzureActiveDirectory_
96+
- **Destination port ranges**: _443_
7597

76-
1. Create an outbound HTTPS (443) security rule for "Storage.CentralUS" on the NSG.
98+
1. Create HTTPS port 443 outbound rules for the Site Recovery IPs that correspond to the source location:
7799

78-
2. Create an outbound HTTPS (443) security rule for "AzureActiveDirectory" on the NSG.
100+
|**Location** | **Site Recovery IP address** | **Site Recovery monitoring IP address** |
101+
| --- | --- | --- |
102+
| East US | 13.82.88.226 | 104.45.147.24 |
79103

80-
3. Create outbound HTTPS (443) rules for the Site Recovery IPs that correspond to the source location:
104+
### Issue 3: Site Recovery configuration failed (151197)
81105

82-
**Location** | **Site Recovery IP address** | **Site Recovery monitoring IP address**
83-
--- | --- | ---
84-
Central US | 13.82.88.226 | 104.45.147.24
85-
## Issue 3: Site Recovery configuration failed (151197)
86-
- **Possible cause** </br>
87-
- Connection cannot be established to Azure Site Recovery service endpoints.
106+
#### Possible cause
88107

89-
- **Resolution**
90-
- Azure Site Recovery required access to [Site Recovery IP ranges](https://docs.microsoft.com/azure/site-recovery/azure-to-azure-about-networking#outbound-connectivity-using-service-tags) depending on the region. Make sure that required ip ranges are accessible from the virtual machine.
108+
A connection can't be established to Azure Site Recovery service endpoints.
91109

110+
#### Resolution
92111

93-
## Issue 4: A2A replication failed when the network traffic goes through on-premises proxy server (151072)
94-
- **Possible cause** </br>
95-
- The custom proxy settings are invalid, and Azure Site Recovery Mobility Service agent did not auto-detect the proxy settings from IE
112+
Azure Site Recovery required access to [Site Recovery IP ranges](azure-to-azure-about-networking.md#outbound-connectivity-using-service-tags) depending on the region. Make sure that required IP ranges are accessible from the VM.
96113

114+
### Issue 4: Azure-to-Azure replication failed when the network traffic goes through on-premises proxy server (151072)
97115

98-
- **Resolution**
99-
1. Mobility Service agent detects the proxy settings from IE on Windows and /etc/environment on Linux.
100-
2. If you prefer to set proxy only for Azure Site Recovery Mobility Service, you can provide the proxy details in ProxyInfo.conf located at:</br>
101-
- ``/usr/local/InMage/config/`` on ***Linux***
102-
- ``C:\ProgramData\Microsoft Azure Site Recovery\Config`` on ***Windows***
103-
3. The ProxyInfo.conf should have the proxy settings in the following INI format.</br>
104-
*[proxy]*</br>
105-
*Address=http://1.2.3.4*</br>
106-
*Port=567*</br>
107-
4. Azure Site Recovery Mobility Service agent supports only ***un-authenticated proxies***.
116+
#### Possible cause
117+
118+
The custom proxy settings are invalid and the Azure Site Recovery Mobility service agent didn't autodetect the proxy settings from Internet Explorer (IE).
119+
120+
#### Resolution
121+
122+
1. The Mobility service agent detects the proxy settings from IE on Windows and `/etc/environment` on Linux.
123+
1. If you prefer to set proxy only for Azure Site Recovery Mobility service, you can provide the proxy details in _ProxyInfo.conf_ located at:
124+
125+
- **Linux**: `/usr/local/InMage/config/`
126+
- **Windows**: `C:\ProgramData\Microsoft Azure Site Recovery\Config`
127+
128+
1. The _ProxyInfo.conf_ should have the proxy settings in the following _INI_ format:
129+
130+
```plaintext
131+
[proxy]
132+
Address=http://1.2.3.4
133+
Port=567
134+
```
135+
136+
1. Azure Site Recovery Mobility service agent supports only **unauthenticated proxies**.
108137

109138
### Fix the problem
110-
To allow [the required URLs](azure-to-azure-about-networking.md#outbound-connectivity-for-urls) or the [required IP ranges](azure-to-azure-about-networking.md#outbound-connectivity-using-service-tags), follow the steps in the [networking guidance document](site-recovery-azure-to-azure-networking-guidance.md).
111139

140+
To allow [the required URLs](azure-to-azure-about-networking.md#outbound-connectivity-for-urls) or the [required IP ranges](azure-to-azure-about-networking.md#outbound-connectivity-using-service-tags), follow the steps in the [networking guidance document](site-recovery-azure-to-azure-networking-guidance.md).
112141

113142
## Next steps
143+
114144
[Replicate Azure virtual machines](site-recovery-replicate-azure-to-azure.md)

0 commit comments

Comments
 (0)