You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/global-secure-access/how-to-create-remote-network-custom-ike-policy.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ ms.custom:
14
14
15
15
IPSec tunnel is a bidirectional communication. This article provides the steps to set up the policy side the communication channel using the Microsoft Graph API. The other side of the communication is configured on your customer premises equipment.
16
16
17
-
For more information about creating a remote network and the custom IKE policy, see [Create a remote network](how-to-create-remote-networks.md#create-a-remote-network-with-the-microsoft-entra-admin-center) and [Remote network configurations](reference-remote-network-configurations.md).
17
+
For more information about creating a remote network and the custom IKE policy, see [Create a remote network](how-to-create-remote-networks.md#create-a-remote-network) and [Remote network configurations](reference-remote-network-configurations.md).
Remote networks are configured on three tabs. You must complete each tab in order. After completing the tab either select the next tab from the top of the page, or select the **Next** button at the bottom of the page.
66
70
@@ -74,7 +78,7 @@ The first step is to provide the name and location of your remote network. Compl
74
78
-**Region**
75
79
1. Select the **Next** button.
76
80
77
-

81
+

78
82
79
83
### Connectivity
80
84
@@ -96,12 +100,10 @@ You can assign the remote network to a traffic forwarding profile when you creat
96
100
97
101
The final tab in the process is to review all of the settings that you provided. Review the details provided here and select the **Create remote network** button.
98
102
99
-
## Create remote networks using the Microsoft Graph API
103
+
#[Microsoft Graph API](#tab/microsoft-graph-api)
100
104
101
105
Global Secure Access remote networks can be viewed and managed using Microsoft Graph on the `/beta` endpoint. Creating a remote network and assigning a traffic forwarding profile are separate API calls.
102
106
103
-
### Create a remote network
104
-
105
107
1. Sign in to [Graph Explorer](https://aka.ms/ge).
106
108
1. Select POST as the HTTP method.
107
109
1. Select BETA as the API version.
@@ -163,6 +165,39 @@ Associating a traffic forwarding profile to your remote network using the Micros
163
165
```
164
166
165
167
1. Select **Run query** to update the remote network.
168
+
---
169
+
170
+
## Verify your remote network configurations
171
+
172
+
There are a few things to consider and verify when creating remote networks. You may need to double-check some settings.
173
+
174
+
- **Verify IKE crypto profile**: The crypto profile (IKE phase 1 and phase 2 algorithms) set for a device link should match what has been set on the CPE. If you chose the **default IKE policy**, ensure that your CPE is set up with the crypto profile specified in the [Remote network configurations](reference-remote-network-configurations.md) reference article.
175
+
176
+
- **Verify pre-shared key**: Compare the pre-shared key (PSK) you specified when creating the device link in Microsoft Global Secure Access with the PSK you specified on your CPE. This detail is added on the **Security** tab during the **Add a link** process. For more information, see [How to manage remote network device links.](how-to-manage-remote-network-device-links.md#add-a-device-link-using-the-microsoft-entra-admin-center).
177
+
178
+
- **Verify local and peer BGP IP addresses**: The public IP addresses and BGP addresses specified while creating a device link in Microsoft Global Secure Access should match what you specified when configuring the CPE.
179
+
- The local and peer BGP addresses are reversed between the CPE and what is entered in Global Secure Access.
180
+
- **CPE**: Local BGP IP address = IP1, Peer BGP IP address = IP2
181
+
- **Global Secure Access**: Local BGP IP address = IP2, Peer BGP IP address = IP1
182
+
- Choose an IP address for Global Secure Access that doesn't overlap with your on-premises network.
183
+
- The same rule applies to ASNs.
184
+
185
+
- **Verify ASN**: Global Secure Access uses BGP to advertise routes between two autonomous systems: your network and Microsoft's. These autonomous systems should have different ASNs.
186
+
- When creating a remote network in the Microsoft Entra admin center, use your network's ASN.
187
+
- When configuring your CPE, use Microsoft's ASN. Go to **Global Secure Access** > **Devices** > **Remote Networks**. Select **Links** and confirm the value in the **Link ASN** column.
188
+
189
+
- **Verify your public IP address**: In a test environment or lab setup, the public IP address of your CPE may change unexpectedly. This change can cause the IKE negotiation to fail even though everything remains the same.
190
+
- If you encounter this scenario, complete the following steps:
191
+
- Update the public IP address in the crypto profile of your CPE.
192
+
- Go to the **Global Secure Access** > **Devices** > **Remote Networks**.
193
+
- Select the appropriate remote network, delete the old tunnel, and recreate a new tunnel with the updated public IP address.
194
+
195
+
- **Port forwarding**: In some situations, the ISP router can also be a network address translation (NAT) device. A NAT converts the private IP addresses of home devices to a public internet-routable device.
196
+
- Generally, a NAT device changes both the IP address and the port. This port changing is the root of the problem.
197
+
- For IPsec tunnels to work, Global Secure Access uses port 500. This port is where IKE negotiation happens.
198
+
- If the ISP router changes this port to something else, Global Secure Access can't identify this traffic and negotiation fails.
199
+
- As a result, phase 1 of IKE negotiation fails and the tunnel isn't established.
200
+
- To remediate this failure, complete the port forwarding on your device, which tells the ISP router to not change the port and forward it as-is.
166
201
167
202
[!INCLUDE [Public preview important note](./includes/public-preview-important-note.md)]
Copy file name to clipboardExpand all lines: articles/global-secure-access/resource-faq.yml
+8-2Lines changed: 8 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -17,7 +17,7 @@ sections:
17
17
- name: Common platform questions
18
18
questions:
19
19
- question: |
20
-
I received an error when trying to access
20
+
I received an error when trying to access a tenant I have access to.
21
21
answer: |
22
22
If you have enabled universal tenant restrictions and you're accessing the Microsoft Entra admin center for one of the allow listed tenants, you may see an "Access denied" error.
23
23
Add the following feature flag to the Microsoft Entra admin center:
@@ -47,4 +47,10 @@ sections:
47
47
- question: |
48
48
I can't access an internal resource using the hostname or FQDN when IP is configured in Quick Access.
49
49
answer: |
50
-
Private DNS is currently not supported. Specify the Hostname or FQDN being used to access the internal resource in the Quick Access configuration along with the respective port.
50
+
Private DNS is currently not supported. Specify the Hostname or FQDN being used to access the internal resource in the Quick Access configuration along with the respective port.
51
+
- name: Remote networks
52
+
questions:
53
+
- question: |
54
+
I've configured my customer premises equipment (CPE) and Global Secure Access, but the two aren't connecting. I've specified the Local and Peer BGP IP addresses, but the connection isn't working.
55
+
answer: |
56
+
Make sure you've reversed the BGP IP addresses between the CPE and Global Secure Access. For example, if you specified the Local BGP IP address as 1.1.1.1 and the Peer BGP IP address as 0.0.0.0 for the CPE, then you'd swap those in Global Secure Access. So the Local BGP IP address in Global Secure Access is 0.0.0.0 and the Peer GBP IP address is 1.1.1.1.
0 commit comments