You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/global-secure-access/how-to-create-remote-networks.md
+37-2Lines changed: 37 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ author: kenwith
5
5
ms.author: kenwith
6
6
manager: amycolannino
7
7
ms.topic: how-to
8
-
ms.date: 07/27/2023
8
+
ms.date: 08/21/2023
9
9
ms.service: network-access
10
10
ms.custom:
11
11
---
@@ -74,7 +74,7 @@ The first step is to provide the name and location of your remote network. Compl
74
74
-**Region**
75
75
1. Select the **Next** button.
76
76
77
-

77
+

78
78
79
79
### Connectivity
80
80
@@ -164,6 +164,41 @@ Associating a traffic forwarding profile to your remote network using the Micros
164
164
165
165
1. Select **Run query** to update the remote network.
166
166
167
+
## Verify your remote network configurations
168
+
169
+
There are a few things to consider when creating remote networks.
170
+
171
+
- **Verify IKE crypto profile**: The crypto profile (IKE phase 1 and phase 2 algorithms) set for a device link should match what has been set on the CPE. If you chose the **default IKE policy**, ensure that your CPE is set up with the crypto profile specified in the [Remote network configurations](reference-remote-network-configurations.md) reference article.
172
+
173
+
- **Verify pre-shared key**: Compare the pre-shared key (PSK) you specified when creating the device link in Microsoft Global Secure Access with the PSK you specified on your CPE. This detail is added on the **Security** tab during the **Add a link** process. For more information, see [How to manage remote network device links.](how-to-manage-remote-network-device-links.md#add-a-device-link-using-the-microsoft-entra-admin-center).
174
+
175
+
- **Verify local and peer BDP IP addresses**: The public IP addresses and BGP addresses specified while creating a device link in Microsoft Global Secure Access should match what you specified when configuring the CPE.
176
+
- In general, the settings in Microsoft Entra admin center and your CPE should be complementary.
177
+
- Peer BGP IP addresses, such as IP1, in the Microsoft Entra admin center is a private IP address used for BGP service on your on-premise device.
178
+
- Local BGP IP address, such as IP2, in the Microsoft Entra admin center is a private IP address used for BGP service on the GSA gateway.
179
+
- You can choose the IP address for Global Secure Access that doesn't overlap with your on-premises network.
180
+
- However, when setting up the on-premises device, the relationship is reversed. From the device's perspective, the peer BGP IP address is IP2, and the local BGP IP address is IP2.
181
+
- The same considerations apply to ASNs.
182
+
183
+
- **Verify ASN**: Global Secure Access uses BGP to advertise routes between two autonomous systems: your network and Microsoft's. These autonomous systems should have different ASNs.
184
+
- When creating a remote network in the Microsoft Entra admin center, use your network's ASN.
185
+
- When configuring your CPE, use Microsoft's ASN. Go to **Global Secure Access** > **Devices** > **Remote Networks**. Select **Links** and confirm the value in the **Link ASN** column.
186
+
<!--- Need to confirm how to view the configuration. --->
187
+
188
+
- **Verify your public IP address**: In a test environment or lab setup, the public IP address of your CPE may change unexpectedly. This change can cause the IKE negotiation to fail even though everything remains the same.
189
+
- If you encounter this scenario, complete the following steps:
190
+
- Update the public IP address in the crypto profile of your CPE.
191
+
- Go to the **Global Secure Access** > **Devices** > **Remote Networks**.
192
+
- Select the appropriate remote network, delete the old tunnel, and recreate a new tunnel with the updated public IP address.
193
+
194
+
- **Port forwarding**: In some situations, the IPS router can also be a network address translation (NAT) device. A NAT converts the private IP addresses of home devices to a public internet-routable device.
195
+
- Generally, a NAT device changes both the IP address and the port. This port changing is the root of the problem.
196
+
- For IPsec tunnels to work, Global Secure Access uses port 500. This port is where IKE negotiation happens.
197
+
- If the ISP router changes this port to something else, GLobal Secure Access cannot identify this traffic and negotiation fails.
198
+
- As a result, phase 1 of IKE negotiation fails and the tunnel is not established.
199
+
- To remediate this failure, complete the port forwarding on your device, which tells the ISP router to not change the port and forward it as-is.
200
+
201
+
167
202
[!INCLUDE [Public preview important note](./includes/public-preview-important-note.md)]
0 commit comments