Hi,
customer has a VPN between on-premise CP and Azure VPN host and can access Azure servers from the office.
Now they want to access the Azure servers from the Internet via office CP and VPN.
I have added the necessary access rule and a source and destination NAT rule so that traffic will traverse the VPN.
I have also included the public IP of the Azure server in the Azure VPN domain.
Logs show the connection "Encrypted in community ..." and the relevant NAT rule but we are unable to connect.
tcpdump and a "fw monitor" do not capture any traffic for the source and destination NAT IP addresses.
I suspect the issue is with the NAT as I see this for my IP from a "fw monitor" capture.
[vs_0][ppak_0] eth1:Oe[44]: 41.160.x.x -> 196.x.x.x (TCP) len=52 id=51573
TCP: 56844 -> 80 .S.... seq=106564e8 ack=0000000
From my understanding the NAT should have taken place before the Post-outbound VPN and I shouldn't see my IP at this stage?
I have also changed the VPN routing in the VPN community.
Am I missing something?