79740641

Date: 2025-08-20 05:23:30
Score: 2
Natty:
Report link

The issue you're experiencing, where the internet stops working after connecting to the Azure VPN Client, is likely due to the VPN configuration routing all traffic through the VPN tunnel by default, which can disrupt access to the public internet. Your configuration already includes excluderoutes to keep public internet traffic off the VPN tunnel, but it seems the settings might not be fully effective, or additional configuration is needed to ensure split tunneling works correctly.Here’s a step-by-step analysis and solution to rectify the issue:1. Understand the Current ConfigurationYour configuration includes:

Despite these settings, the internet is being blocked, which suggests that either:

2. Steps to Rectify the Issuea. Verify Split Tunneling in Azure VPN GatewayThe Azure VPN Gateway may be configured to route all traffic (including internet traffic) through the VPN tunnel, overriding the client-side excluderoutes. To ensure split tunneling is enabled on the Azure side:

  1. Check the Point-to-Site Configuration in Azure:

    • Go to the Azure Portal > Navigate to your Virtual Network Gateway > Point-to-site configuration.

    • Ensure that the Address Pool only includes the VNet address range (e.g., 10.0.0.0/16) and does not include 0.0.0.0/0 (which would route all traffic through the VPN).

    • If 0.0.0.0/0 is present in the address pool, remove it to enable split tunneling.

  2. Download a Fresh VPN Profile:

    • After confirming or updating the Point-to-Site configuration, download a new VPN profile from the Azure Portal and compare it with your current configuration.

    • Update your XML file with any new settings from the downloaded profile, ensuring the fqdn, servervalidation, and certificate details match.

b. Adjust the Client ConfigurationYour current excluderoutes configuration (0.0.0.0/1 and 128.0.0.0/1) is correct for split tunneling, as it covers the entire public internet address space while allowing 10.0.0.0/16 to go through the VPN. However, you can make the configuration more explicit or troubleshoot further:

c. Check DNS SettingsIf the internet is inaccessible, it could be due to DNS resolution issues rather than routing. When connected to the VPN, the client might be using the Azure VNet’s DNS servers, which may not resolve public internet domains correctly.

d. Test with TCP Instead of UDPYour configuration uses UDP (<transportprotocol>udp</transportprotocol>), which is generally faster but can be less reliable in some network environments due to NAT or firewall issues. If the internet issue persists, try switching to TCP:

xml

<transportprotocol>tcp</transportprotocol>

After making this change, reconnect and test internet access.e. Verify Azure VPN Client VersionEnsure you’re using the latest version of the Azure VPN Client, as older versions may have bugs or compatibility issues with split tunneling:

f. Check Local Firewall or Network SettingsYour local machine’s firewall or network settings might block internet access when the VPN is active:

g. Test ConnectivityAfter making changes:

  1. Re-import the modified VPN profile into the Azure VPN Client.

  2. Connect to the VPN.

  3. Test internet access by visiting a public website (e.g., google.com).

  4. Verify VNet access by pinging or connecting to a resource in the 10.0.0.0/16 range.

  5. If the issue persists, check the Azure VPN Client logs (available in the client’s diagnostic section) for errors related to routing or DNS.

3. Sample Adjusted ConfigurationHere’s a modified version of your configuration with a single excluderoutes entry and DNS settings (if supported by the client):

xml

<?xml version="1.0" encoding="utf-8"?>
<AzVpnProfile>
  <clientconfig>
    <!-- Keep public internet OFF the VPN tunnel -->
    <excluderoutes>
      <route>
        <destination>0.0.0.0</destination><mask>0</mask>
      </route>
    </excluderoutes>
    <!-- Send only your VNet over the tunnel -->
    <includeroutes>
      <route>
        <destination>10.0.0.0</destination><mask>16</mask>
      </route>
    </includeroutes>
    <!-- Optional: Specify public DNS servers -->
    <dnsservers>
      <dns>8.8.8.8</dns>
      <dns>8.8.4.4</dns>
    </dnsservers>
  </clientconfig>

  <name>Geovert-VM-vnet</name>
  <protocolconfig>
    <sslprotocolConfig>
      <transportprotocol>tcp</transportprotocol> <!-- Switched to TCP for testing -->
    </sslprotocolConfig>
  </protocolconfig>

  <serverlist>
    <ServerEntry>
      <displayname i:nil="true" />
      <fqdn>azuregateway-0ad30063-afcb-4d23-9960-b3fc2f4b4b06-ae638e987919.vpn.azure.com</fqdn>
    </ServerEntry>
  </serverlist>

  <servervalidation>
    <Cert>
      <hash>DF3C24F9BFD666761B268073FE06D1CC8D4F82A4</hash>
      <issuer i:nil="true" />
    </Cert>
    <serversecret></serversecret>
    <type>cert</type>
  </servervalidation>

  <version>1</version>
</AzVpnProfile>

Note: The <dnsservers> section may not be supported in all Azure VPN Client versions. If it causes an error, remove it and configure DNS manually in the client or Azure Gateway settings.4. If the Issue PersistsIf none of the above resolves the issue:

5. Additional Notes

If you need further assistance with specific steps (e.g., checking the Azure Portal, interpreting logs, or testing routes), please let me know, and I can provide more detailed instructions or analyze any additional details you share (e.g., logs or Azure Gateway settings).

Reasons:
  • RegEx Blacklisted phrase (2.5): please let me know
  • Long answer (-1):
  • Has code block (-0.5):
  • Low reputation (1):
Posted by: Dee Master