Unable to Ping Azure VM from Nested Hyper-V VM

Somil Bajaj 0 Reputation points
2025-03-04T17:21:56.5133333+00:00

Attempting to ping an Azure VM (10.3.1.4) in the Hub Virtual Network (10.3.0.0/16) from a nested VM (VM1 at 192.168.100.10) running on a Hyper-V host (10.2.1.5) within another Virtual Network, HyperVNet (10.2.0.0/16). The networks are connected via a successful Site-to-Site (S2S) VPN. However, pinging 10.3.1.4 from VM1 results in a "Request Timed Out" error.

  • An Internal NAT switch has been created (192.168.100.10).
  • The VM inside the virtual machine and the hypervisor itself are able to ping each other.
  • The firewall is disabled on all VMs.
  • IP forwarding is enabled in all VMs.

What steps can be taken to troubleshoot this connectivity issue?

Azure VPN Gateway
Azure VPN Gateway
An Azure service that enables the connection of on-premises networks to Azure through site-to-site virtual private networks.
1,674 questions
{count} votes

1 answer

Sort by: Most helpful
  1. Adam Zachary 0 Reputation points
    2025-03-07T01:23:20.67+00:00

    Please check the NSG rules, ICMP is blocked by default in Azure NSGs. Allow inbound ICMP traffic on the Azure VM's NSG.

    Also, verify your VM Firewall, ensure Windows/Linux firewall allows ICMP requests.

    Another possibility could be VPN Routing, ensure routes between Hub VNet and HyperVNet are correct.

    finally, if using nested virtualization, enable IP forwarding on the VM NIC.

    0 comments No comments

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.