|
| 1 | +--- |
| 2 | +title: Extend remote network connectivity to Azure virtual networks |
| 3 | +description: Configure Azure resources to simulate remote network connectivity to Microsoft's Security Edge Solutions, Microsoft Entra Internet Access and Microsoft Entra Private Access. |
| 4 | +ms.service: network-access |
| 5 | +ms.topic: how-to |
| 6 | +ms.date: 08/28/2023 |
| 7 | +ms.author: joflore |
| 8 | +author: MicrosoftGuyJFlo |
| 9 | +manager: amycolannino |
| 10 | +ms.reviewer: absinh |
| 11 | +--- |
| 12 | +# Create a remote network using Azure virtual networks |
| 13 | + |
| 14 | +Organizations may want to extend the capabilities of Microsoft Entra Internet Access to entire networks not just individual devices they can [install the Global Secure Access Client](how-to-install-windows-client.md) on. This article shows how to extend these capabilities to an Azure virtual network hosted in the cloud. Similar principles may be applied to a customer's on-premises network equipment. |
| 15 | + |
| 16 | +:::image type="content" source="media/how-to-simulate-remote-network/simulate-remote-network.png" alt-text="Diagram showing a virtual network in Azure connected to Microsoft Entra Internet Access simulating a customer's network." lightbox="media/how-to-simulate-remote-network/simulate-remote-network.png"::: |
| 17 | + |
| 18 | +## Prerequisites |
| 19 | + |
| 20 | +In order to complete the following steps, you must have these prerequisites in place. |
| 21 | + |
| 22 | +- An Azure subscription and permission to create resources in the [Azure portal](https://portal.azure.com). |
| 23 | + - A basic understanding of [site-to-site VPN connections](/azure/vpn-gateway/tutorial-site-to-site-portal). |
| 24 | +- A Microsoft Entra ID tenant with the [Global Secure Access Administrator](/azure/active-directory/roles/permissions-reference#global-secure-access-administrator) role assigned. |
| 25 | +- Completed the [remote network onboarding steps](how-to-create-remote-networks.md#onboard-your-tenant-for-remote-networks). |
| 26 | + |
| 27 | +## Infrastructure creation |
| 28 | + |
| 29 | +Building this functionality out in Azure provides organizations the ability to understand how Microsoft Entra Internet Access works in a more broad implementation. The resources we create in Azure correspond to on-premises concepts in the following ways: |
| 30 | + |
| 31 | +- The **[virtual network](#virtual-network)** corresponds to your on-premises IP address space. |
| 32 | +- The **[virtual network gateway](#virtual-network-gateway)** corresponds to an on-premises virtual private network (VPN) router. This device is sometimes referred to as customer premises equipment (CPE). |
| 33 | +- The **[local network gateway](#local-network-gateway)** corresponds to the Microsoft side of the connection where traffic would flow to from your on-premises VPN router. The information provided by Microsoft as part of the [remote network onboarding steps](how-to-create-remote-networks.md#onboard-your-tenant-for-remote-networks) is used here. |
| 34 | +- The **[connection](#create-site-to-site-vpn-connection)** links the two network gateways and contains the settings required to establish and maintain connectivity. |
| 35 | +- The **[virtual machine](#virtual-machine)** corresponds to client devices on your on-premises network. |
| 36 | + |
| 37 | +In this document, we use the following default values. Feel free to configure these settings according to your own requirements. |
| 38 | + |
| 39 | +**Subscription:** Visual Studio Enterprise |
| 40 | +**Resource group name:** Network_Simulation |
| 41 | +**Region:** East US |
| 42 | + |
| 43 | +### Resource group |
| 44 | + |
| 45 | +Create a resource group to contain all of the necessary resources. |
| 46 | + |
| 47 | +1. Sign in to the [Azure portal](https://portal.azure.com) with permission to create resources. |
| 48 | +1. Select **Create a resource**. |
| 49 | +1. Search for **Resource group** and choose **Create** > **Resource group**. |
| 50 | +1. Select your **Subscription**, **Region**, and provide a name for your **Resource group**. |
| 51 | +1. Select **Review + create**. |
| 52 | +1. Confirm your details, then select **Create**. |
| 53 | + |
| 54 | +> [!TIP] |
| 55 | +> If you're using this article for testing Microsoft Entra Internet Access, you may clean up all related Azure resources by deleting the resource group you create after you're done. |
| 56 | +
|
| 57 | +### Virtual network |
| 58 | + |
| 59 | +Next we need to create a virtual network inside of our resource group, then add a gateway subnet that we'll use in a future step. |
| 60 | + |
| 61 | +1. From the Azure portal, select **Create a resource**. |
| 62 | +1. Select **Networking** > **Virtual Network**. |
| 63 | +1. Select the **Resource group** created previously. |
| 64 | +1. Provide your network with a **Name**. |
| 65 | +1. Leave the default values for the other fields. |
| 66 | +1. Select **Review + create**. |
| 67 | +1. Select **Create**. |
| 68 | + |
| 69 | +When the virtual network is created, select **Go to resource** or browse to it inside of the resource group and complete the following steps: |
| 70 | + |
| 71 | +1. Select **Subnets**. |
| 72 | +1. Select **+ Gateway subnet**. |
| 73 | +1. Leave the defaults and select **Save**. |
| 74 | + |
| 75 | +### Virtual network gateway |
| 76 | + |
| 77 | +Next we need to create a virtual network gateway inside of our resource group. |
| 78 | + |
| 79 | +1. From the Azure portal, select **Create a resource**. |
| 80 | +1. Select **Networking** > **Virtual network gateway**. |
| 81 | +1. Provide your virtual network gateway with a **Name**. |
| 82 | +1. Select the appropriate region. |
| 83 | +1. Select the **Virtual network** created in the previous section. |
| 84 | +1. Create a **Public IP address** and **SECOND PUBLIC IP ADDRESS** and provide them with descriptive names. |
| 85 | + 1. Set their **Availability zone** to **Zone-redundant**. |
| 86 | +1. Set **Configure BGP** to **Enabled** |
| 87 | + 1. Set the **Autonomous system number (ASN)** to an appropriate value. |
| 88 | + 1. Don't use any reserved ASN numbers or the ASN provided as part of [onboarding to Microsoft Entra Internet Access](how-to-create-remote-networks.md#onboard-your-tenant-for-remote-networks). For more information, see the article [Global Secure Access remote network configurations](reference-remote-network-configurations.md#valid-autonomous-system-number-asn). |
| 89 | +1. Leave all other settings their defaults or blank. |
| 90 | +1. Select **Review + create**, confirm your settings. |
| 91 | +1. Select **Create**. |
| 92 | + 1. You can continue to the following sections while the gateway is created. |
| 93 | + |
| 94 | +:::image type="content" source="media/how-to-simulate-remote-network/create-virtual-network-gateway.png" alt-text="Screenshot of the Azure portal showing configuration settings for a virtual network gateway." lightbox="media/how-to-simulate-remote-network/create-virtual-network-gateway.png"::: |
| 95 | + |
| 96 | +### Local network gateway |
| 97 | + |
| 98 | +You need to create two local network gateways. One for your primary and one for the secondary endpoints. |
| 99 | + |
| 100 | +You use the BGP IP addresses, Public IP addresses, and ASN values provided by Microsoft when you [onboard to Microsoft Entra Internet Access](how-to-create-remote-networks.md#onboard-your-tenant-for-remote-networks) in this section. |
| 101 | + |
| 102 | +1. From the Azure portal, select **Create a resource**. |
| 103 | +1. Select **Networking** > **Local network gateway**. |
| 104 | +1. Select the **Resource group** created previously. |
| 105 | +1. Select the appropriate region. |
| 106 | +1. Provide your local network gateway with a **Name**. |
| 107 | +1. For **Endpoint**, select **IP address**, then provide the IP address provided in the Microsoft Entra admin center. |
| 108 | +1. Select **Next: Advanced**. |
| 109 | +1. Set **Configure BGP** to **Yes** |
| 110 | + 1. Set the **Autonomous system number (ASN)** to the appropriate value provided in the Microsoft Entra admin center. |
| 111 | + 1. Set the **BGP peer IP address** to the appropriate value provided in the Microsoft Entra admin center. |
| 112 | +1. Select **Review + create**, confirm your settings. |
| 113 | +1. Select **Create**. |
| 114 | + |
| 115 | +:::image type="content" source="media/how-to-simulate-remote-network/create-local-network-gateway.png" alt-text="Screenshot of the Azure portal showing configuration settings for a local network gateway." lightbox="media/how-to-simulate-remote-network/create-local-network-gateway.png"::: |
| 116 | + |
| 117 | +### Virtual machine |
| 118 | + |
| 119 | +1. From the Azure portal, select **Create a resource**. |
| 120 | +1. Select **Virtual machine**. |
| 121 | +1. Select the **Resource group** created previously. |
| 122 | +1. Provide a **Virtual machine name**. |
| 123 | +1. Select the Image you want to use, for this example we choose **Windows 11 Pro, version 22H2 - x64 Gen2** |
| 124 | +1. Select **Run with Azure Spot discount** for this test. |
| 125 | +1. Provide a **Username** and **Password** for your VM |
| 126 | +1. Move to the **Networking** tab. |
| 127 | + 1. Select the **Virtual network** created previously. |
| 128 | + 1. Keep the other networking defaults. |
| 129 | +1. Move to the **Management** tab |
| 130 | + 1. Check the box **Login with Azure AD** |
| 131 | + 1. Keep the other management defaults. |
| 132 | +1. Select **Review + create**, confirm your settings. |
| 133 | +1. Select **Create**. |
| 134 | + |
| 135 | +You may choose to lock down remote access to the network security group to only a specific network or IP. |
| 136 | + |
| 137 | +### Create Site-to-site VPN connection |
| 138 | + |
| 139 | +You create two connections one for your primary and secondary gateways. |
| 140 | + |
| 141 | +1. From the Azure portal, select **Create a resource**. |
| 142 | +1. Select **Networking** > **Connection**. |
| 143 | +1. Select the **Resource group** created previously. |
| 144 | +1. Under **Connection type**, select **Site-to-site (IPsec)**. |
| 145 | +1. Provide a **Name** for the connection, and select the appropriate **Region**. |
| 146 | +1. Move to the **Settings** tab. |
| 147 | + 1. Select your **Virtual network gateway** and **Local network gateway** created previously. |
| 148 | + 1. Create a **Shared key (PSK)** that you'll use in a future step. |
| 149 | + 1. Check the box for **Enable BGP**. |
| 150 | + 1. Keep the other default settings. |
| 151 | +1. Select **Review + create**, confirm your settings. |
| 152 | +1. Select **Create**. |
| 153 | + |
| 154 | +:::image type="content" source="media/how-to-simulate-remote-network/create-site-to-site-connection.png" alt-text="Screenshot of the Azure portal showing configuration settings for a site-to-site connection." lightbox="media/how-to-simulate-remote-network/create-site-to-site-connection.png"::: |
| 155 | + |
| 156 | +## Enable remote connectivity in Microsoft Entra |
| 157 | + |
| 158 | +### Create a remote network |
| 159 | + |
| 160 | +You need the public IP addresses of your virtual network gateway. These IP addresses can be found by browsing to the Configuration page of your virtual and local network gateways. You complete the **Add a link** sections twice to create a link for your primary and secondary connections. |
| 161 | + |
| 162 | +:::image type="content" source="media/how-to-simulate-remote-network/virtual-network-gateway-public-ip-addresses.png" alt-text="Screenshot showing how to find the public IP addresses of a virtual network gateway." lightbox="media/how-to-simulate-remote-network/virtual-network-gateway-public-ip-addresses.png"::: |
| 163 | + |
| 164 | +1. Sign in to the **[Microsoft Entra admin center](https://entra.microsoft.com)** as a [Global Secure Access Administrator](../active-directory/roles/permissions-reference.md#global-secure-access-administrator). |
| 165 | +1. Browse to **Global Secure Access Preview** > **Remote network** > **Create remote network**. |
| 166 | +1. Provide a **Name** for your network, select an appropriate **Region**, then select **Next: Connectivity**. |
| 167 | +1. On the **Connectivity** tab, select **Add a link**. |
| 168 | + 1. On the **General** tab: |
| 169 | + 1. Provide a **Link name** and set **Device type** to **Other**. |
| 170 | + 1. Set the **IP address** to the primary IP address of your virtual network gateway. |
| 171 | + 1. Set the **Local BGP address** to the primary private BGP IP address of your local network gateway. |
| 172 | + 1. Set the **Peer BGP address** to the BGP IP address of your virtual network gateway. |
| 173 | + 1. Set the **Link ASN** to the ASN of your virtual network gateway. |
| 174 | + 1. Leave **Redundancy** set to **No redundancy**. |
| 175 | + 1. Set **Bandwidth capacity (Mbps)** to the appropriate setting. |
| 176 | + 1. Select Next to continue to the **Details** tab. |
| 177 | + 1. On the **Details** tab: |
| 178 | + 1. Leave the defaults selected unless you made a different selection previously. |
| 179 | + 1. Select Next to continue to the **Security** tab. |
| 180 | + 1. On the **Security** tab: |
| 181 | + 1. Enter the **Pre-shared key (PSK)** set in the [previous section when creating the site to site connection](#create-site-to-site-vpn-connection). |
| 182 | + 1. Select **Add link**. |
| 183 | + 1. Select **Next: Traffic profiles**. |
| 184 | +1. On the **Traffic profiles** tab: |
| 185 | + 1. Check the box for the **Microsoft 365 traffic profile**. |
| 186 | + 1. Select **Next: Review + create**. |
| 187 | +1. Confirm your settings and select **Create remote network**. |
| 188 | + |
| 189 | +For more information about remote networks, see the article [How to create a remote network](how-to-create-remote-networks.md) |
| 190 | + |
| 191 | +## Verify connectivity |
| 192 | + |
| 193 | +After you create the remote networks in the previous steps, it may take a few minutes for the connection to be established. From the Azure portal, we can validate that the VPN tunnel is connected and that BGP peering is successful. |
| 194 | + |
| 195 | +1. In the Azure portal, browse to the **virtual network gateway** created earlier and select **Connections**. |
| 196 | +1. Each of the connections should show a **Status** of **Connected** once the configuration is applied and successful. |
| 197 | +1. Browsing to **BGP peers** under the **Monitoring** section allows you to confirm that BGP peering is successful. Look for the peer addresses provided by Microsoft. Once configuration is applied and successful, the **Status** should show **Connected**. |
| 198 | + |
| 199 | +:::image type="content" source="media/how-to-simulate-remote-network/verify-connectivity.png" alt-text="Screenshot showing how to find the connection status for your virtual network gateway." lightbox="media/how-to-simulate-remote-network/verify-connectivity.png" ::: |
| 200 | + |
| 201 | +You can also use the virtual machine you created to validate that traffic is flowing to Microsoft 365 locations like SharePoint Online. Browsing to resources in SharePoint or Exchange Online should result in traffic on your virtual network gateway. This traffic can be seen by browsing to [Metrics on the virtual network gateway](/azure/vpn-gateway/monitor-vpn-gateway#analyzing-metrics) or by [Configuring packet capture for VPN gateways](/azure/vpn-gateway/packet-capture). |
| 202 | + |
| 203 | +## Next steps |
| 204 | + |
| 205 | +- [Tutorial: Create a site-to-site VPN connection in the Azure portal](/azure/vpn-gateway/tutorial-site-to-site-portal) |
0 commit comments