An Azure networking service that is used to provision private networks and optionally to connect to on-premises datacenters.
hello The Pixel Shop & thx for join me here at Q&A portal,
looks like VNet access works so VM is alive, external path broken means public IP/NIC ipconfig/effective rules, test with fresh public ip or fresh NIC.
yeah again its look like Azure public ip to nic path is broken, but I would not blame DHCP first. if same VNet access works, OS and private IP path are fine.
if external RDP and HTTP both fail, and NSG + Windows Firewall are clean, then check the actual NIC IP configuration public ip must be attached to the same primary ipconfig that owns the VM private IP. if there are multiple ipconfigs, stale public ip bindings can look correct in portal but not work, next check effective security rules and effective routes on the NIC, not just NSG rule list. portal “3389 accessible” is helpful but not proof NAT is healthy. check the public IP resource itself changed, is detached or stuck on Basic/Standard behavior mismatch.
Standard public ip needs explicit NSG allow, basic behaves differently.
Lets do a quick isolation test detach current public IP, create a brand new Standard static public IP, attach it to the NIC primary ipconfig, then test RDP/80 again. if new public IP works, old public IP mapping was stale/corrupt. if new public IP also fails, issue is NIC/ipconfig/routing, not public IP. DHCP failure inside guest can break guest networking, but Azure NAT maps to NIC private IP from platform metadata, not whatever Windows “thinks”, so stale Azure NAT from DHCP is less likely. if u want fastest recovery, create new NIC, attach same private IP if possible, attach new public IP, and swap it onto VM :)))
rgds, Alex
&
pls if my answer helps pls accept it.