Part 18 – Configure Azure vNET Peering

Loading

Azure networks are isolated networks in the cloud and by default a vNET member cant commute to members in another vNET.

This is the same as AWS VPC Peer.

  • Azure supports connecting two virtual networks located in the same region or networks located across regions.
  • Once you enable virtual network peering between two virtual networks, the virtual machines can then communicate via their private IP addresses across the peering connection.
  • You can also peer virtual networks that are located across different subscriptions.
  • The virtual networks can’t have overlapping CIDR blocks

1- Create a virtual network as VPC_B

2- Create a second virtual network as VPC_A

3- Create two VM’s in each vNET

4- Configure Network Security Group (NSG) to allow ICMP traffic

5- Set up the operating system to answer to Ping/ICMP echo request

# For IPv4
netsh advfirewall firewall add rule name="ICMP Allow incoming V4 echo request" protocol="icmpv4:8,any" dir=in action=allow

  

6- We won’t be able to ping our Azure Virtual Machine (VM) on the other vPC now

7- Create a vpc peer by going to the peering section of any VPC

8- Give the peering connection a name

9- Choose the peer vPC to link

10- Our link between VPC-A and VPC-B is now established

11– login to demovm01 and validate if we are able to ping demovm2

That proves our vNET peering is working as desired.

(Visited 59 times, 1 visits today)

By C A Thomas

Chinchu A. Thomas is an Infrastructure Analyst specializing in Microsoft Azure, the Microsoft 365 suite, AWS, and Windows infrastructure management products.

Leave a Reply