Skip to content

Commit afbecce

Browse files
authored
Merge pull request #248888 from shlipsey3/gsa-remote-network-082123
gsa-remote-network-082123
2 parents 7904a21 + 5cfb02b commit afbecce

File tree

3 files changed

+51
-10
lines changed

3 files changed

+51
-10
lines changed

articles/global-secure-access/how-to-create-remote-network-custom-ike-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.custom:
1414

1515
IPSec tunnel is a bidirectional communication. This article provides the steps to set up the policy side the communication channel using the Microsoft Graph API. The other side of the communication is configured on your customer premises equipment.
1616

17-
For more information about creating a remote network and the custom IKE policy, see [Create a remote network](how-to-create-remote-networks.md#create-a-remote-network-with-the-microsoft-entra-admin-center) and [Remote network configurations](reference-remote-network-configurations.md).
17+
For more information about creating a remote network and the custom IKE policy, see [Create a remote network](how-to-create-remote-networks.md#create-a-remote-network) and [Remote network configurations](reference-remote-network-configurations.md).
1818

1919

2020
## Prerequisites

articles/global-secure-access/how-to-create-remote-networks.md

Lines changed: 42 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -5,9 +5,9 @@ author: kenwith
55
ms.author: kenwith
66
manager: amycolannino
77
ms.topic: how-to
8-
ms.date: 07/27/2023
8+
ms.date: 08/30/2023
99
ms.service: network-access
10-
ms.custom:
10+
1111
---
1212
# How to create a remote network
1313

@@ -60,7 +60,11 @@ Before you can set up remote networks, you need to onboard your tenant informati
6060

6161
You MUST complete the email step before selecting the checkbox.
6262

63-
## Create a remote network with the Microsoft Entra admin center
63+
## Create a remote network
64+
65+
You can create a remote network in the Microsoft Entra admin center or through the Microsoft Graph API.
66+
67+
# [Microsoft Entra admin center](#tab/microsoft-entra-admin-center)
6468

6569
Remote networks are configured on three tabs. You must complete each tab in order. After completing the tab either select the next tab from the top of the page, or select the **Next** button at the bottom of the page.
6670

@@ -74,7 +78,7 @@ The first step is to provide the name and location of your remote network. Compl
7478
- **Region**
7579
1. Select the **Next** button.
7680

77-
![Screenshot of the General tab of the create device link process.](media/how-to-create-remote-networks/create-basics-tab.png)
81+
![Screenshot of the basics tab of the create device link process.](media/how-to-create-remote-networks/create-basics-tab.png)
7882

7983
### Connectivity
8084

@@ -96,12 +100,10 @@ You can assign the remote network to a traffic forwarding profile when you creat
96100

97101
The final tab in the process is to review all of the settings that you provided. Review the details provided here and select the **Create remote network** button.
98102

99-
## Create remote networks using the Microsoft Graph API
103+
# [Microsoft Graph API](#tab/microsoft-graph-api)
100104

101105
Global Secure Access remote networks can be viewed and managed using Microsoft Graph on the `/beta` endpoint. Creating a remote network and assigning a traffic forwarding profile are separate API calls.
102106

103-
### Create a remote network
104-
105107
1. Sign in to [Graph Explorer](https://aka.ms/ge).
106108
1. Select POST as the HTTP method.
107109
1. Select BETA as the API version.
@@ -163,6 +165,39 @@ Associating a traffic forwarding profile to your remote network using the Micros
163165
```
164166
165167
1. Select **Run query** to update the remote network.
168+
---
169+
170+
## Verify your remote network configurations
171+
172+
There are a few things to consider and verify when creating remote networks. You may need to double-check some settings.
173+
174+
- **Verify IKE crypto profile**: The crypto profile (IKE phase 1 and phase 2 algorithms) set for a device link should match what has been set on the CPE. If you chose the **default IKE policy**, ensure that your CPE is set up with the crypto profile specified in the [Remote network configurations](reference-remote-network-configurations.md) reference article.
175+
176+
- **Verify pre-shared key**: Compare the pre-shared key (PSK) you specified when creating the device link in Microsoft Global Secure Access with the PSK you specified on your CPE. This detail is added on the **Security** tab during the **Add a link** process. For more information, see [How to manage remote network device links.](how-to-manage-remote-network-device-links.md#add-a-device-link-using-the-microsoft-entra-admin-center).
177+
178+
- **Verify local and peer BGP IP addresses**: The public IP addresses and BGP addresses specified while creating a device link in Microsoft Global Secure Access should match what you specified when configuring the CPE.
179+
- The local and peer BGP addresses are reversed between the CPE and what is entered in Global Secure Access.
180+
- **CPE**: Local BGP IP address = IP1, Peer BGP IP address = IP2
181+
- **Global Secure Access**: Local BGP IP address = IP2, Peer BGP IP address = IP1
182+
- Choose an IP address for Global Secure Access that doesn't overlap with your on-premises network.
183+
- The same rule applies to ASNs.
184+
185+
- **Verify ASN**: Global Secure Access uses BGP to advertise routes between two autonomous systems: your network and Microsoft's. These autonomous systems should have different ASNs.
186+
- When creating a remote network in the Microsoft Entra admin center, use your network's ASN.
187+
- When configuring your CPE, use Microsoft's ASN. Go to **Global Secure Access** > **Devices** > **Remote Networks**. Select **Links** and confirm the value in the **Link ASN** column.
188+
189+
- **Verify your public IP address**: In a test environment or lab setup, the public IP address of your CPE may change unexpectedly. This change can cause the IKE negotiation to fail even though everything remains the same.
190+
- If you encounter this scenario, complete the following steps:
191+
- Update the public IP address in the crypto profile of your CPE.
192+
- Go to the **Global Secure Access** > **Devices** > **Remote Networks**.
193+
- Select the appropriate remote network, delete the old tunnel, and recreate a new tunnel with the updated public IP address.
194+
195+
- **Port forwarding**: In some situations, the ISP router can also be a network address translation (NAT) device. A NAT converts the private IP addresses of home devices to a public internet-routable device.
196+
- Generally, a NAT device changes both the IP address and the port. This port changing is the root of the problem.
197+
- For IPsec tunnels to work, Global Secure Access uses port 500. This port is where IKE negotiation happens.
198+
- If the ISP router changes this port to something else, Global Secure Access can't identify this traffic and negotiation fails.
199+
- As a result, phase 1 of IKE negotiation fails and the tunnel isn't established.
200+
- To remediate this failure, complete the port forwarding on your device, which tells the ISP router to not change the port and forward it as-is.
166201
167202
[!INCLUDE [Public preview important note](./includes/public-preview-important-note.md)]
168203

articles/global-secure-access/resource-faq.yml

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ sections:
1717
- name: Common platform questions
1818
questions:
1919
- question: |
20-
I received an error when trying to access
20+
I received an error when trying to access a tenant I have access to.
2121
answer: |
2222
If you have enabled universal tenant restrictions and you're accessing the Microsoft Entra admin center for one of the allow listed tenants, you may see an "Access denied" error.
2323
Add the following feature flag to the Microsoft Entra admin center:
@@ -47,4 +47,10 @@ sections:
4747
- question: |
4848
I can't access an internal resource using the hostname or FQDN when IP is configured in Quick Access.
4949
answer: |
50-
Private DNS is currently not supported. Specify the Hostname or FQDN being used to access the internal resource in the Quick Access configuration along with the respective port.
50+
Private DNS is currently not supported. Specify the Hostname or FQDN being used to access the internal resource in the Quick Access configuration along with the respective port.
51+
- name: Remote networks
52+
questions:
53+
- question: |
54+
I've configured my customer premises equipment (CPE) and Global Secure Access, but the two aren't connecting. I've specified the Local and Peer BGP IP addresses, but the connection isn't working.
55+
answer: |
56+
Make sure you've reversed the BGP IP addresses between the CPE and Global Secure Access. For example, if you specified the Local BGP IP address as 1.1.1.1 and the Peer BGP IP address as 0.0.0.0 for the CPE, then you'd swap those in Global Secure Access. So the Local BGP IP address in Global Secure Access is 0.0.0.0 and the Peer GBP IP address is 1.1.1.1.

0 commit comments

Comments
 (0)