Is it possible to connect existing VPN tunnels to Azure VPN gateway?

Wondering if anyone here has the same experience. Have been trying this with our MSP and Azure portal but couldn’t get any luck.

We have 2 offices with existing VPN network (SonicWall NSA) setup for remote workers. They need to log to access our file server on prem. Right now, I’m trying to set up a test environment so when they log into the VPNs, they will also be able to access Azure VM that are joined to both office networks through Azure VPN gateway. When we work in either office, the connection is successful. But when we connect to on prem VPN, Azure resource are not accessible. I confirm the local network gateway in Azure has the same IP ranges as the on prem networks.

The VPN gateways I have set up in Azure to both offices are site2site connections.

I’d appreciate any suggestions.

does your SSL VPN for remote workers have it’s own IP range and is that range allowed across the site-to-site VPN to Azure?

Probably depends on your endpoints. Are these Azure AD joined and intune managed devices?

I built something similar. Endpoints connect to Azure VPN Gateway directly. Secondly you could create a S2S VPN to your on-prem infra. Would be possible then.

Yes, they do, and those are added into the Azure Local Network Gateway.

Our NSA is managed by the MSP and they added client routes to Azure. I’m not sure if that is necessary after I have added those IP ranges in Azure.

Yes, I do have a S2S VPN from Azure to on-prem, which enables connections between Azure to on-prem networks. The problem is we can’t connect to Azure after we VPN into on-prem network.

Those machines are not Azure AD joined nor Intune, just joined to on-prem AD.

yeah its usually required on both sides, it’s probably just blocked by the firewall or something