Skip to content

Commit f43e3ef

Browse files
committed
PM-updates
1 parent f93fe81 commit f43e3ef

File tree

2 files changed

+17
-14
lines changed

2 files changed

+17
-14
lines changed

articles/global-secure-access/how-to-create-remote-networks.md

Lines changed: 9 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -169,39 +169,36 @@ Associating a traffic forwarding profile to your remote network using the Micros
169169
170170
## Verify your remote network configurations
171171
172-
There are a few things to consider and verify when creating remote networks. You may need to double-check some settings based.
172+
There are a few things to consider and verify when creating remote networks. You may need to double-check some settings.
173173
174174
- **Verify IKE crypto profile**: The crypto profile (IKE phase 1 and phase 2 algorithms) set for a device link should match what has been set on the CPE. If you chose the **default IKE policy**, ensure that your CPE is set up with the crypto profile specified in the [Remote network configurations](reference-remote-network-configurations.md) reference article.
175175
176176
- **Verify pre-shared key**: Compare the pre-shared key (PSK) you specified when creating the device link in Microsoft Global Secure Access with the PSK you specified on your CPE. This detail is added on the **Security** tab during the **Add a link** process. For more information, see [How to manage remote network device links.](how-to-manage-remote-network-device-links.md#add-a-device-link-using-the-microsoft-entra-admin-center).
177177
178-
- **Verify local and peer BDP IP addresses**: The public IP addresses and BGP addresses specified while creating a device link in Microsoft Global Secure Access should match what you specified when configuring the CPE.
179-
- In general, the settings in Microsoft Entra admin center and your CPE should be complementary.
180-
- Peer BGP IP addresses, such as IP1, in the Microsoft Entra admin center is a private IP address used for BGP service on your on-premise device.
181-
- Local BGP IP address, such as IP2, in the Microsoft Entra admin center is a private IP address used for BGP service on the Global Secure Access gateway.
182-
- You can choose the IP address for Global Secure Access that doesn't overlap with your on-premises network.
183-
- However, when setting up the on-premises device, the relationship is reversed. From the device's perspective, the peer BGP IP address is IP2, and the local BGP IP address is IP2.
184-
- The same considerations apply to ASNs.
178+
- **Verify local and peer BGP IP addresses**: The public IP addresses and BGP addresses specified while creating a device link in Microsoft Global Secure Access should match what you specified when configuring the CPE.
179+
- The local and peer BGP addresses are reversed between the CPE and what is entered in Global Secure Access.
180+
- **CPE**: Local BGP IP address = IP1, Peer BGP IP address = IP2
181+
- **Global Secure Access**: Local BGP IP address = IP2, Peer BGP IP address = IP1
182+
- Choose an IP address for Global Secure Access that doesn't overlap with your on-premises network.
183+
- The same rule applies to ASNs.
185184
186185
- **Verify ASN**: Global Secure Access uses BGP to advertise routes between two autonomous systems: your network and Microsoft's. These autonomous systems should have different ASNs.
187186
- When creating a remote network in the Microsoft Entra admin center, use your network's ASN.
188187
- When configuring your CPE, use Microsoft's ASN. Go to **Global Secure Access** > **Devices** > **Remote Networks**. Select **Links** and confirm the value in the **Link ASN** column.
189-
<!--- Need to confirm how to view the configuration. --->
190188
191189
- **Verify your public IP address**: In a test environment or lab setup, the public IP address of your CPE may change unexpectedly. This change can cause the IKE negotiation to fail even though everything remains the same.
192190
- If you encounter this scenario, complete the following steps:
193191
- Update the public IP address in the crypto profile of your CPE.
194192
- Go to the **Global Secure Access** > **Devices** > **Remote Networks**.
195193
- Select the appropriate remote network, delete the old tunnel, and recreate a new tunnel with the updated public IP address.
196194
197-
- **Port forwarding**: In some situations, the IPS router can also be a network address translation (NAT) device. A NAT converts the private IP addresses of home devices to a public internet-routable device.
195+
- **Port forwarding**: In some situations, the ISP router can also be a network address translation (NAT) device. A NAT converts the private IP addresses of home devices to a public internet-routable device.
198196
- Generally, a NAT device changes both the IP address and the port. This port changing is the root of the problem.
199197
- For IPsec tunnels to work, Global Secure Access uses port 500. This port is where IKE negotiation happens.
200-
- If the ISP router changes this port to something else, GLobal Secure Access cannot identify this traffic and negotiation fails.
198+
- If the ISP router changes this port to something else, Global Secure Access cannot identify this traffic and negotiation fails.
201199
- As a result, phase 1 of IKE negotiation fails and the tunnel is not established.
202200
- To remediate this failure, complete the port forwarding on your device, which tells the ISP router to not change the port and forward it as-is.
203201
204-
205202
[!INCLUDE [Public preview important note](./includes/public-preview-important-note.md)]
206203
207204
## Next steps

articles/global-secure-access/resource-faq.yml

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ sections:
1717
- name: Common platform questions
1818
questions:
1919
- question: |
20-
I received an error when trying to access
20+
I received an error when trying to access a tenant I have access to.
2121
answer: |
2222
If you have enabled universal tenant restrictions and you're accessing the Microsoft Entra admin center for one of the allow listed tenants, you may see an "Access denied" error.
2323
Add the following feature flag to the Microsoft Entra admin center:
@@ -47,4 +47,10 @@ sections:
4747
- question: |
4848
I can't access an internal resource using the hostname or FQDN when IP is configured in Quick Access.
4949
answer: |
50-
Private DNS is currently not supported. Specify the Hostname or FQDN being used to access the internal resource in the Quick Access configuration along with the respective port.
50+
Private DNS is currently not supported. Specify the Hostname or FQDN being used to access the internal resource in the Quick Access configuration along with the respective port.
51+
- name: Remote networks
52+
questions:
53+
- question: |
54+
I've configured my customer premises equipment (CPE) and Global Secure Access, but the two aren't connecting. I've specified the Local and Peer BGP IP addresses, but the connection isn't working.
55+
answer: |
56+
Make sure you've reversed the BGP IP addresses between the CPE and Global Secure Access. For example, if you specified the Local BGP IP address as 1.1.1.1 and the Peer BGP IP address as 0.0.0.0 for the CPE, then you'd swap those in Global Secure Access. So the Local BGP IP address in Global Secure Access is 0.0.0.0 and the Peer GBP IP address is 1.1.1.1.

0 commit comments

Comments
 (0)