Skip to content

Commit 5ea9371

Browse files
committed
gsa-remote-network-082123
1 parent 8fc4976 commit 5ea9371

File tree

1 file changed

+37
-2
lines changed

1 file changed

+37
-2
lines changed

articles/global-secure-access/how-to-create-remote-networks.md

Lines changed: 37 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: kenwith
55
ms.author: kenwith
66
manager: amycolannino
77
ms.topic: how-to
8-
ms.date: 07/27/2023
8+
ms.date: 08/21/2023
99
ms.service: network-access
1010
ms.custom:
1111
---
@@ -74,7 +74,7 @@ The first step is to provide the name and location of your remote network. Compl
7474
- **Region**
7575
1. Select the **Next** button.
7676

77-
![Screenshot of the General tab of the create device link process.](media/how-to-create-remote-networks/create-basics-tab.png)
77+
![Screenshot of the basics tab of the create device link process.](media/how-to-create-remote-networks/create-basics-tab.png)
7878

7979
### Connectivity
8080

@@ -164,6 +164,41 @@ Associating a traffic forwarding profile to your remote network using the Micros
164164
165165
1. Select **Run query** to update the remote network.
166166
167+
## Verify your remote network configurations
168+
169+
There are a few things to consider when creating remote networks.
170+
171+
- **Verify IKE crypto profile**: The crypto profile (IKE phase 1 and phase 2 algorithms) set for a device link should match what has been set on the CPE. If you chose the **default IKE policy**, ensure that your CPE is set up with the crypto profile specified in the [Remote network configurations](reference-remote-network-configurations.md) reference article.
172+
173+
- **Verify pre-shared key**: Compare the pre-shared key (PSK) you specified when creating the device link in Microsoft Global Secure Access with the PSK you specified on your CPE. This detail is added on the **Security** tab during the **Add a link** process. For more information, see [How to manage remote network device links.](how-to-manage-remote-network-device-links.md#add-a-device-link-using-the-microsoft-entra-admin-center).
174+
175+
- **Verify local and peer BDP IP addresses**: The public IP addresses and BGP addresses specified while creating a device link in Microsoft Global Secure Access should match what you specified when configuring the CPE.
176+
- In general, the settings in Microsoft Entra admin center and your CPE should be complementary.
177+
- Peer BGP IP addresses, such as IP1, in the Microsoft Entra admin center is a private IP address used for BGP service on your on-premise device.
178+
- Local BGP IP address, such as IP2, in the Microsoft Entra admin center is a private IP address used for BGP service on the GSA gateway.
179+
- You can choose the IP address for Global Secure Access that doesn't overlap with your on-premises network.
180+
- However, when setting up the on-premises device, the relationship is reversed. From the device's perspective, the peer BGP IP address is IP2, and the local BGP IP address is IP2.
181+
- The same considerations apply to ASNs.
182+
183+
- **Verify ASN**: Global Secure Access uses BGP to advertise routes between two autonomous systems: your network and Microsoft's. These autonomous systems should have different ASNs.
184+
- When creating a remote network in the Microsoft Entra admin center, use your network's ASN.
185+
- When configuring your CPE, use Microsoft's ASN. Go to **Global Secure Access** > **Devices** > **Remote Networks**. Select **Links** and confirm the value in the **Link ASN** column.
186+
<!--- Need to confirm how to view the configuration. --->
187+
188+
- **Verify your public IP address**: In a test environment or lab setup, the public IP address of your CPE may change unexpectedly. This change can cause the IKE negotiation to fail even though everything remains the same.
189+
- If you encounter this scenario, complete the following steps:
190+
- Update the public IP address in the crypto profile of your CPE.
191+
- Go to the **Global Secure Access** > **Devices** > **Remote Networks**.
192+
- Select the appropriate remote network, delete the old tunnel, and recreate a new tunnel with the updated public IP address.
193+
194+
- **Port forwarding**: In some situations, the IPS router can also be a network address translation (NAT) device. A NAT converts the private IP addresses of home devices to a public internet-routable device.
195+
- Generally, a NAT device changes both the IP address and the port. This port changing is the root of the problem.
196+
- For IPsec tunnels to work, Global Secure Access uses port 500. This port is where IKE negotiation happens.
197+
- If the ISP router changes this port to something else, GLobal Secure Access cannot identify this traffic and negotiation fails.
198+
- As a result, phase 1 of IKE negotiation fails and the tunnel is not established.
199+
- To remediate this failure, complete the port forwarding on your device, which tells the ISP router to not change the port and forward it as-is.
200+
201+
167202
[!INCLUDE [Public preview important note](./includes/public-preview-important-note.md)]
168203
169204
## Next steps

0 commit comments

Comments
 (0)