Skip to content

Commit d4ef0db

Browse files
authored
Merge pull request #251314 from shlipsey3/gsa-updates-091323
gsa-updates-091323
2 parents 7e51cc2 + 0425c00 commit d4ef0db

File tree

6 files changed

+54
-8
lines changed

6 files changed

+54
-8
lines changed

articles/global-secure-access/how-to-configure-customer-premises-equipment.md

Lines changed: 54 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,38 +1,84 @@
11
---
22
title: How to configure customer premises equipment for Global Secure Access (preview)
3-
description: Learn how to configure customer premises equipment for Global Secure Access (preview).
3+
description: Learn how to configure the connectivity between your customer premises equipment and the Global Secure Access (preview) network.
44
author: shlipsey3
55
ms.author: sarahlipsey
66
manager: amycolannino
77
ms.topic: how-to
8-
ms.date: 06/08/2023
8+
ms.date: 09/22/2023
99
ms.service: network-access
1010
ms.custom:
1111

12+
# Customer Intent: As a Global Secure Access administrator, I need to know how to configure the connection between my customer premises equipment and Microsoft's network so that I can create a tunnel from my remote network to the Global Secure Access network.
1213
---
1314
# Configure customer premises equipment for Global Secure Access (preview)
1415

1516
IPSec tunnel is a bidirectional communication. One side of the communication is established when [adding a device link to a remote network](how-to-manage-remote-network-device-links.md) in Global Secure Access (preview). During that process, you enter your public IP address and BGP addresses in the Microsoft Entra admin center to tell us about your network configurations.
1617

17-
The other side of the communication channel is configured on your customer premises equipment (CPE). This article provides the steps to set up your CPE using the network configurations provided by Microsoft.
18+
This article provides the steps to set up the other side of the communication channel.
1819

1920
## Prerequisites
2021

2122
To configure your customer premises equipment (CPE), you must have:
2223

2324
- A **Global Secure Access Administrator** role in Microsoft Entra ID.
24-
- Sent an email to Global Secure Access onboarding according to the onboarding process in the **Remote network** area of Global Secure Access.
25-
- Received the connectivity information from Global Secure Access onboarding.
2625
- The preview requires a Microsoft Entra ID P1 license. If needed, you can [purchase licenses or get trial licenses](https://aka.ms/azureadlicense).
26+
- To configure your CPE, you must have completed the Global Secure Access onboarding process.
2727

2828
## How to configure your customer premises equipment
2929

30-
To onboard to Global Secure Access remote network connectivity, you must have completed the [onboarding process](how-to-create-remote-networks.md#onboard-your-tenant-for-remote-networks). In order to configure your CPE, you need the connectivity information provided by the Global Secure Access onboarding team.
30+
You can set up the CPE using the Microsoft Entra admin center or using the Microsoft Graph API. When you create a remote network and add your device link information, configuration details are generated. These details are needed to configure your CPE.
3131

32-
Once you have the details you need, go to the preferred interface of your CPE (UX or API), and enter the information you received to set up the IPSec tunnel. Follow the instructions provided by the CPE provider.
32+
## [Microsoft Entra admin center](#tab/microsoft-entra-admin-center)
3333

34+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as a **Global Secure Access Administrator**.
35+
1. Browse to **Global Secure Access** > **Devices** > **Remote network**.
36+
1. Select **View configuration** for the remote network you need to configure.
37+
38+
:::image type="content" source="media/how-to-configure-customer-premises-equipment/remote-network-view-configuration.png" alt-text="Screenshot of the configuration details with the Microsoft information highlighted." lightbox="media/how-to-configure-customer-premises-equipment/remote-network-view-configuration-expanded.png":::
39+
40+
1. Locate and save Microsoft's public IP address `endpoint` from the panel that opens.
41+
42+
![Screenshot of the view configuration details panel.](media/how-to-configure-customer-premises-equipment/view-configuration-details-panel.png)
43+
44+
1. In the preferred interface for *your CPE*, enter the IP address you saved in the previous step. This step completes the IPSec tunnel configuration.
45+
46+
The following diagram highlights each of the major sections of the device configuration details. Text descriptions of each section follow the diagram.
47+
48+
:::image type="content" source="media/how-to-configure-customer-premises-equipment/device-configuration-map.png" alt-text="Diagram of the configuration details with each section highlighted." lightbox="media/how-to-configure-customer-premises-equipment/device-configuration-map-expanded.png":::
49+
50+
- The `branchId` and `branchName` represent the remote network details.
51+
- The `displayName` is the device link name.
52+
- The `endpoint`, `asn`, `bdpAddress`, and `region` represent the Microsoft connectivity details. Enter these details on your CPE.
53+
- For zone redundant device links, a second set of details are generated.
54+
- `PeerConfiguration` and the subsequent details represent the CPE connectivity details.
55+
- If you've configured more devices, their details follow.
56+
3457
> [!IMPORTANT]
35-
>The crypto profile you specified for the device link should match with what you specify on your CPE. If you chose the "default" IKE policy when configuring the device link, use the configurations described in the [Remote network configurations](reference-remote-network-configurations.md) article.
58+
>The crypto profile you specified for the device link should match with what you specify on your CPE. If you chose the "default" IKE policy when configuring the device link, use the configurations described in the **[Remote network configurations](reference-remote-network-configurations.md)** article.
59+
60+
## [Microsoft Graph API](#tab/microsoft-graph-api)
61+
62+
Follow these instructions to download the connectivity information for your remote network.
63+
64+
1. Sign in to [Graph Explorer](https://aka.ms/ge).
65+
1. Select **GET** as the HTTP method from the dropdown.
66+
1. Set the API version to **beta**.
67+
1. Run the following query to list your remote networks and their device links:
68+
69+
``` http
70+
GET https://graph.microsoft.com/beta/networkaccess/connectivity/branches
71+
```
72+
1. Run the following query to get the connectivity information, replacing `{branchSiteId}` with the ID of your remote network and `{deviceLinkId}` with the ID of your device link:
73+
74+
``` http
75+
GET https://graph.microsoft.com/beta/networkAccess/connectivity/branches/{branchSiteId}/deviceLinks/{deviceLinkId}
76+
```
77+
78+
The details in the response are similar to the device configuration details found in the Microsoft Entra admin center.
79+
80+
---
81+
3682
3783
[!INCLUDE [Public preview important note](./includes/public-preview-important-note.md)]
3884
Loading
367 KB
Loading
Loading
Loading
Loading

0 commit comments

Comments
 (0)