getting error -"Manually configure line of sight to private IP address" post migrating Windows server to Azure,do have VPN ipsec enabled but still not able to resolve this error and RDP to the VM

bagh, sukriti 0 Reputation points
2025-10-13T23:46:10.1233333+00:00

Have migrated a Windows server to Azure VM, unable to RDP using Native RDP-i have a Site to site VPN connection shown as "Connected". There are 2 different subscription1-shared subs having Vnet1 which is peered Vnet2 in Subscription2-Production subs(that has VM as well).Client has DMZ network and trying to establish Site to site connectivity, have whiteslisted VM's public IP range in the checkpoint firewall of client to allow traffic from Azure cloud to On premise firewall.Have followed steps to resolve error ="Manually configure line of sight to private IP address" -1.Network Security Group (NSG) RulesAdd inbound rule: Port: 3389Protocol: TCPSource: Your on-prem IP range or VPN Gateway subnet Action: Allow 2.Ensure routes for on-prem IP ranges exist in the VM’s subnet. -->yes Does anyone know what configuration i am missing ? due to which the error still exists?

Azure VPN Gateway
Azure VPN Gateway
An Azure service that enables the connection of on-premises networks to Azure through site-to-site virtual private networks.
{count} votes

1 answer

Sort by: Most helpful
  1. Harish Peddapally 1,330 Reputation points Microsoft External Staff Moderator
    2025-10-15T05:56:20.73+00:00

    Hi bagh, sukriti,

    Good day, i hope you are doing well!

    Thank you for providing detailed information about your hybrid network setup across multiple subscriptions and VNets. This kind of multi-subscription, multi-hub architecture with Azure Firewall, VPN Gateway, and VNet peering can indeed become complex, especially when working with transit routing and gateway transit settings.

    You are correct that the Azure CAF (Cloud Adoption Framework) guidance encourages this hub-and-spoke model, but it can feel complex for smaller projects depending on how routes and peering are configured.

    Here are some important pointers and suggestions based on your scenario:

    • For the hub (Shared subscription VNet where VPN gateway resides), you must enable Allow gateway transit and Allow forwarded traffic on peering links both to the Firewall VNet (subs1) and the VM VNet (subs3). The hub VNet becomes the transit point and gateway.

    On the spoke VNets (Firewall VNet in subs1 and VM VNet in subs3), you must enable Use remote gateway on their peering connections back to the hub (subs2). Note you cannot enable Use remote gateway on more than one peering from the same spoke.

    • This means that if the Firewall VNet also needs gateway transit, it has to peer with the hub and use the remote gateway, and the VM VNet peers and uses the remote gateway. The hub routes traffic between firewall and VM subnets and forwards on-prem traffic via the VPN gateway.
    • UDRs (user-defined routes) on the VM subnet should point traffic to the firewall's private IP in the firewall VNet, and the firewall routes to the VPN gateway subnet in the hub VNet, creating a traffic flow path.

    The error and peering failure you have when adding the firewall VNet IP ranges to the VM subnet's route table might be due to missing or conflicting peering settings in the hub, or because route propagation and custom UDRs overlap or conflict.

    • Azure currently does not support multiple remote gateways on a single VNet peer, so you cannot have two VNets both enabling remote gateway via peering to the same hub.

    Recommendations:

    1. Verify the peering on the hub VNet (subs2) to both the firewall VNet and VM VNet with Allow forwarded traffic and Allow gateway transit enabled.
    2. Ensure each spoke VNet (firewall VNet and VM VNet) peering back to the hub has Use remote gateway enabled.
    3. Carefully plan UDRs to avoid route conflicts. Use UDRs on the VM subnet pointing to the firewall private IP, and on firewall subnet pointing traffic to VPN gateway.
    4. If you face conflicts in direct peering, consider using a firewall or NVA in the hub subnet to centralize routing and simplify the topology.
    5. You may want to review Microsoft’s official guidance for such hybrid, hub-and-spoke configurations, particularly:

    I understand this can be tough with CAF's recommended model, but with the right combination of peering flags and route setups, you should achieve the desired connectivity.

    Please let me know if you need help or additional clarifications.

    If the information resolved your issue, kindly consider accepting the answer — it will help others who might be facing similar challenges.

    Thanks,

    Harish.

    0 comments No comments

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.