Skip to main content
Version: Next

Task 02: Test Connectivity

Objective: Verify network connectivity for VPN, Bastion, and DNS resolution


VPN Connectivity Tests

1. Check VPN Connection Status

Azure Portal Method:

  1. Navigate to Virtual network gateways
  2. Select the VPN Gateway
  3. Click Connections
  4. Verify connection shows Connected

Azure CLI Method:

az network vpn-connection show \
--name conn-{cid}-cluster-{instance} \
--resource-group rg-{cid}-{env}-{region}-management \
--query connectionStatus

Expected: "Connected"

2. Verify BGP Peering

Azure Portal:

  1. Virtual network gateways → VPN Gateway
  2. Select BGP peers
  3. Verify:
  • On-premises BGP peer shows Connected
  • Routes are being learned
  • Peer IP matches on-prem configuration

Azure CLI:

az network vnet-gateway list-bgp-peer-status \
--name vpngw-{cid}-{env}-{region} \
--resource-group rg-{cid}-{env}-{region}-management

Expected output shows peer with "connectedDuration" value.

3. Test Connectivity to On-Premises

If VPN connection is established and you have access to on-premises:

# From Azure VM or Cloud Shell
ping 10.0.0.1 # Replace with actual on-prem management IP
BGP Convergence Time

BGP peering may take 5-15 minutes after VPN connection is established. If status shows "Connecting," wait and recheck.


Bastion Connectivity Tests

1. Verify Bastion Status

Azure Portal:

  1. Navigate to Bastions
  2. Select the Bastion host
  3. Verify Status: Succeeded

2. Test Bastion Connection (if VMs deployed)

If optional NDM or Utility servers were deployed:

  1. Azure Portal → Virtual machines
  2. Select the VM
  3. Click ConnectBastion
  4. Enter credentials
  5. Verify successful connection

DNS Resolution Tests

1. Verify DNS Resolver

Azure Portal:

  1. Navigate to Private DNS zones
  2. Select the management DNS zone
  3. Check Virtual network links
  4. Verify linked to management VNet

2. Test DNS Resolution

From Azure Cloud Shell:

# Test DNS resolver for cluster nodes
nslookup c01-n01-prd-ral.azlocal.internal 10.100.1.164

# Replace with:
# - Your cluster node hostname
# - Your DNS resolver IP (from dns subnet)

Expected: Returns the node's IP address.

From Windows VM (if deployed):

# Test DNS resolution
Resolve-DnsName c01-n01-prd-ral.azlocal.internal

# Test DNS forwarding
Resolve-DnsName google.com

3. Verify DNS A Records

Azure Portal:

  1. Private DNS zones → Select zone
  2. Click Record sets
  3. Verify A records for all cluster nodes:
NameTypeIP Address
c01-n01-prd-ralA10.100.3.101
c01-n02-prd-ralA10.100.3.102
c01-n03-prd-ralA10.100.3.103

Validation Checklist

VPN Connectivity

  • VPN connection status is Connected
  • BGP peering established
  • Routes learned from on-premises
  • On-prem gateway can reach Azure VNet (if testable)

Bastion Connectivity

  • Bastion host status is Succeeded
  • Can connect to VMs via Bastion (if VMs deployed)
  • No connectivity errors

DNS Resolution

  • Private DNS zone linked to VNet
  • DNS resolver deployed and running
  • A records created for all cluster nodes
  • DNS resolution working from Azure resources
  • Conditional forwarding working (if configured)

Troubleshooting

VPN shows "Connecting" for extended time:

  • Verify on-prem gateway configuration matches Azure settings
  • Check pre-shared key (PSK) matches both sides
  • Confirm on-prem firewall allows IKE/IPsec (UDP 500, 4500)

BGP peering not establishing:

  • Verify BGP ASN correct on both sides
  • Check BGP IP addresses match configuration
  • Confirm no ACLs blocking BGP (TCP port 179)

Bastion connection fails:

  • Verify VM is running
  • Check NSG allows inbound from Bastion subnet
  • Confirm credentials are correct

DNS resolution not working:

  • Verify DNS resolver deployed in correct subnet
  • Check VNet link exists for Private DNS zone
  • Confirm A records created with correct IPs

PreviousUpNext
Task 01 - Verify ResourcesPhase 03 - ValidationTask 03 - Validate Configuration

Version Control

VersionDateAuthorChanges
1.0.02026-03-24Azure Local Cloudnology TeamInitial release