I am trying to mount a drive on my local on-premises Windows 10 pro machine (SMB 3.0).
I setup my Vnet in Azure, my Vnet gateway (P2S VPN) and shared file storage account.
The usual way to mount the drive is to use the NET USE commnand such as :
net use [drive letter] \\xxx.file.core.windows.net\fileshare /u:user [Password key]
If I run the NET USE command on a VM it mounts the drive instantly without a problem.
However, running the command from the on-premises Windows 10 pro machine I get the System error 53 has occurred error message.
I know that this error is often due to the fact that the ISP blocks port 445. However, my understanding is that this should not be a problem if I setup and use the P2S VPN. Doesn't the VPN bypass the ISP restrictions ?
I have tested the VPN and connectivity is confirmed.
I've also turned off all firewalls (PC and router) while trying to do this.
When the VPN is connected I try to ping the public IP address of the Vnet but this times out. I have read that Azure does block these ICMP pings.
I have also tried a tracert to my xxx.file.core.windows.net and it does timeout after 5 hops.
Am I trying to do something that cannot be done ?
In Azure, we can't use P2S VPN mount file share to your local PC. Because file share service work on the Internet, and we can't force the file share network traffic through P2S/S2S vpn.
As a workaround, we can deploy a RRAS VPN on Azure VM, and use local PC to connect the RRAS server, after connected, the local PC will get an IP from Azure datacenter, so we can mount file share on you local PC.
Here a blog about how to deploy RRAS on azure VM, please refer to it.
Related
I've set up Windows Server VM instance on GCP. I've set up a static IP for that server and I'm able to remote desktop in without problem using the inside IP address as I have a VPN connection between my on premesis network and my GCP network. On the Windows Server, I've set up a sharing folder with the proper permissions.
Now, on my local PC running Windows 10, I'm trying to map a network a drive to that shared folder on the VM. What's the correct path to specific it to map to? I tried \\ but it doesn't work.
I have enabled network discovery, checked all firewall rules and enabled file and print sharing.
I can ping from my local pc to my Windows VM instance.
Thanks in advance
I have opened up the following ports on GCP Network:
tcp-access Ingress Apply to all IP ranges: 192.168.84.0/24
tcp:135-139
udp:445
Still unable to access.
I thought by default google had all ingress ports open on the local IP?
I checked the firewall on the server and everything is open as well.
Thanks in advnace.
Scenario:
Windows 10 Virtual Machine hosted using Parallels on MacOS Catalina
Azure VPN - Basic SKU
Shared Network setup using Parallels
I can successfully connect to the Azure VPN using a Point-to-site connection from the Windows 10 installation.
Problem: I would like to use the VPN connection (established by Windows 10 VM) with macOS Host. Is this possible?
I have tried adding a static route on Mac OS as below, where 10.200.0.0/16 is the Azure Network CIDR, and 10.211.55.6 is the IP address of the Windows 10 VM on Parallels.
sudo route add -net 10.200.0.0/16 10.211.55.6
But this does not work. Any suggestions, or is there no way to share the VPN connection even with custom routing configuration?
Note. I understand that you can connect to Azure VPN from MacOS using the Standard SKU of Azure VPN, but would like to see if it is possible without.
I am trying to rdp from my local mac to an Azure instance through a (IKEv2) vpn connection. I am never prompted for a password, and it looks like the connection just times out. The error code I get is 0x204.
I have tried using both Microsoft Remote Desktop 8 and 10 for mac.
The connection is active and reports that it is connected.
From the mac, I can connect to another VM (in the same azure account) which is not running behind a vpn.
From Parallels Desktop (with networking set to Shared mode and the vpn connection active on the mac), I can successfully connect using the windows rdp client.
So it seems the Microsoft RDP-client for mac is not using the vpn connection.
Is there a way to make it do so?
Is there another solution, that will allow me to rdp to an Azure VM from my mac (without going through Parallels)?
Note: This is not the same question as this, since that is not about going through an azure vnet gateway.
I needed to add hosts file entries for each azure site I needed to access.
For example for accessing my-vm-name.someregion.cloudapp.azure.com, I needed to add a hosts file entry for it's private IP within the subnet. E.g. 10.2.0.100.
The reason everything worked in Windows under Parallels, is that the relevant entries had already been added to the hosts file previously.
I want to have a SSH connection from my local windows machine or VM on my computer to Azure windows server VM. I tried Cygwin and Putty but both of them gave timeout connection. I used public ip address and opened port 22 on Azure VM.
I will appreciate if some one can give me any hints or links.
There are multiple firewalls that can be the reason here. Fist you must have a rule on the server to allow incoming SSH requests (port 22). Then you need to configure the NSG(Network security group) to allow incoming on port 22. If it still doesn't work, you need to verify that you are allowed to do an outgoing SSH request from your computer.
Thanks for suggestions, I found the problem which was the host machine IP address(ipconfig) (where is a local VM inside domain) was different from the IP address that communicate outside the domain to internet. I was set in NSG of Azure VM to only accept this IP and because of that it gave time-out error. After changing the IP it works.
I have set up a new NAS using Open Media Vault. I have installed the WebMin extension to get on to the web gui for configuration. My problem is that I have to be on the same network as my NAS. How can I connect to my NAS from a different network than it is connected to? On the network that it is connected to its IP is 192.168.0.99:1000 for the WebMin gui. How can I access this from a different network?
Setup a VPN to connect to the network that your NAS is on. Once the VPN is connected you can connect to the NAS as if you were on the local network.
You could also possibly setup firewall and/or port forwarding rules depending on how your network is setup but please consider the security issues when doing so.
You could alternatively also try to open the NAS and give it a public IP address and a DNS. This will allow you to setup SSH and FTP as it was any other server.
To SSH remotely over the internet, you need either a permanent IP address or a domain name that is updated to point to the IP address when it changes. The latter requires a dynamic domain name service. A good free one is DuckDNS (duckdns.org). First, use one of the sign-in options such as Google. In the domain line enter your preferred subdomain name.
There is a great guide on how you can do this here: https://forums.freenas.org/index.php?threads/how-to-how-to-access-your-freenas-server-remotely-and-securely.27376/