You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/global-secure-access/how-to-create-remote-networks.md
+9-12Lines changed: 9 additions & 12 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -169,39 +169,36 @@ Associating a traffic forwarding profile to your remote network using the Micros
169
169
170
170
## Verify your remote network configurations
171
171
172
-
There are a few things to consider and verify when creating remote networks. You may need to double-check some settings based.
172
+
There are a few things to consider and verify when creating remote networks. You may need to double-check some settings.
173
173
174
174
- **Verify IKE crypto profile**: The crypto profile (IKE phase 1 and phase 2 algorithms) set for a device link should match what has been set on the CPE. If you chose the **default IKE policy**, ensure that your CPE is set up with the crypto profile specified in the [Remote network configurations](reference-remote-network-configurations.md) reference article.
175
175
176
176
- **Verify pre-shared key**: Compare the pre-shared key (PSK) you specified when creating the device link in Microsoft Global Secure Access with the PSK you specified on your CPE. This detail is added on the **Security** tab during the **Add a link** process. For more information, see [How to manage remote network device links.](how-to-manage-remote-network-device-links.md#add-a-device-link-using-the-microsoft-entra-admin-center).
177
177
178
-
- **Verify local and peer BDP IP addresses**: The public IP addresses and BGP addresses specified while creating a device link in Microsoft Global Secure Access should match what you specified when configuring the CPE.
179
-
- In general, the settings in Microsoft Entra admin center and your CPE should be complementary.
180
-
- Peer BGP IP addresses, such as IP1, in the Microsoft Entra admin center is a private IP address used for BGP service on your on-premise device.
181
-
- Local BGP IP address, such as IP2, in the Microsoft Entra admin center is a private IP address used for BGP service on the Global Secure Access gateway.
182
-
- You can choose the IP address for Global Secure Access that doesn't overlap with your on-premises network.
183
-
- However, when setting up the on-premises device, the relationship is reversed. From the device's perspective, the peer BGP IP address is IP2, and the local BGP IP address is IP2.
184
-
- The same considerations apply to ASNs.
178
+
- **Verify local and peer BGP IP addresses**: The public IP addresses and BGP addresses specified while creating a device link in Microsoft Global Secure Access should match what you specified when configuring the CPE.
179
+
- The local and peer BGP addresses are reversed between the CPE and what is entered in Global Secure Access.
180
+
- **CPE**: Local BGP IP address = IP1, Peer BGP IP address = IP2
181
+
- **Global Secure Access**: Local BGP IP address = IP2, Peer BGP IP address = IP1
182
+
- Choose an IP address for Global Secure Access that doesn't overlap with your on-premises network.
183
+
- The same rule applies to ASNs.
185
184
186
185
- **Verify ASN**: Global Secure Access uses BGP to advertise routes between two autonomous systems: your network and Microsoft's. These autonomous systems should have different ASNs.
187
186
- When creating a remote network in the Microsoft Entra admin center, use your network's ASN.
188
187
- When configuring your CPE, use Microsoft's ASN. Go to **Global Secure Access** > **Devices** > **Remote Networks**. Select **Links** and confirm the value in the **Link ASN** column.
189
-
<!--- Need to confirm how to view the configuration. --->
190
188
191
189
- **Verify your public IP address**: In a test environment or lab setup, the public IP address of your CPE may change unexpectedly. This change can cause the IKE negotiation to fail even though everything remains the same.
192
190
- If you encounter this scenario, complete the following steps:
193
191
- Update the public IP address in the crypto profile of your CPE.
194
192
- Go to the **Global Secure Access** > **Devices** > **Remote Networks**.
195
193
- Select the appropriate remote network, delete the old tunnel, and recreate a new tunnel with the updated public IP address.
196
194
197
-
- **Port forwarding**: In some situations, the IPS router can also be a network address translation (NAT) device. A NAT converts the private IP addresses of home devices to a public internet-routable device.
195
+
- **Port forwarding**: In some situations, the ISP router can also be a network address translation (NAT) device. A NAT converts the private IP addresses of home devices to a public internet-routable device.
198
196
- Generally, a NAT device changes both the IP address and the port. This port changing is the root of the problem.
199
197
- For IPsec tunnels to work, Global Secure Access uses port 500. This port is where IKE negotiation happens.
200
-
- If the ISP router changes this port to something else, GLobal Secure Access cannot identify this traffic and negotiation fails.
198
+
- If the ISP router changes this port to something else, Global Secure Access cannot identify this traffic and negotiation fails.
201
199
- As a result, phase 1 of IKE negotiation fails and the tunnel is not established.
202
200
- To remediate this failure, complete the port forwarding on your device, which tells the ISP router to not change the port and forward it as-is.
203
201
204
-
205
202
[!INCLUDE [Public preview important note](./includes/public-preview-important-note.md)]
Copy file name to clipboardExpand all lines: articles/global-secure-access/resource-faq.yml
+8-2Lines changed: 8 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -17,7 +17,7 @@ sections:
17
17
- name: Common platform questions
18
18
questions:
19
19
- question: |
20
-
I received an error when trying to access
20
+
I received an error when trying to access a tenant I have access to.
21
21
answer: |
22
22
If you have enabled universal tenant restrictions and you're accessing the Microsoft Entra admin center for one of the allow listed tenants, you may see an "Access denied" error.
23
23
Add the following feature flag to the Microsoft Entra admin center:
@@ -47,4 +47,10 @@ sections:
47
47
- question: |
48
48
I can't access an internal resource using the hostname or FQDN when IP is configured in Quick Access.
49
49
answer: |
50
-
Private DNS is currently not supported. Specify the Hostname or FQDN being used to access the internal resource in the Quick Access configuration along with the respective port.
50
+
Private DNS is currently not supported. Specify the Hostname or FQDN being used to access the internal resource in the Quick Access configuration along with the respective port.
51
+
- name: Remote networks
52
+
questions:
53
+
- question: |
54
+
I've configured my customer premises equipment (CPE) and Global Secure Access, but the two aren't connecting. I've specified the Local and Peer BGP IP addresses, but the connection isn't working.
55
+
answer: |
56
+
Make sure you've reversed the BGP IP addresses between the CPE and Global Secure Access. For example, if you specified the Local BGP IP address as 1.1.1.1 and the Peer BGP IP address as 0.0.0.0 for the CPE, then you'd swap those in Global Secure Access. So the Local BGP IP address in Global Secure Access is 0.0.0.0 and the Peer GBP IP address is 1.1.1.1.
0 commit comments