Loading

How to create a remote network into Entra Global Security Access

The following steps detail how to create a direct VPN connection using FortiGate Firewall into the Entra Global Security Access service to protect network traffic of all device within your corporate networks.

The scenario is focused on a FortiGate Firewall Appliance but other VPN Devices should work in a similar way.

NB: not all VPN device will work. IKEv2 Phase 2 is limited to support only GCMAES128, GCMAES192, GCMAES256 and not all device will support these cyphers.

StepScreenshot
Navigate to https://entra.microsoft.com/  
Expand Global Secure Access
Expand Remote Network  
Click “Create remote network”
 
Basic Information:  

Name: <Endpoint Name>
Region: <Local Region>  

Click Next
Connectivity Information:  

Select Add a Link
 
Add a Link – General Information  

Link Name: <Name of the connected location>
Device Type: <Your VPN Device Make>
IP Address: <Your VPN Public IP>
Local BGP Address: <Microsoft BGP IP Address which you generate and must not conflict with any existing networks>
Peer BGP Address: <Your Route BGP Address>
Link ASN: <Your Router BGP ASN Address>
Redundancy: <Select as per your requirements>
Bandwidth capacity: <Select you required capacity; 250mbps, 500mbps, 750mbps, 1000mbps>  

Click Next
Add a Link – Details Information  

Protocol: IKEv2 IPSEC/IKE
Policy: <Default / Custom>  

If custom then the following options will need to be completed:  

IKE Phase 1: Encryption: <AES128, AES192, AES256, GCMAES128, GCMAES265>
IKEv2 integrity: <SHA256,SHA384, GCMAES128, GCMAES265>
DH Group: <DHGroup14,>  
IKE Phase 2:
IPSec Encryption: <GCMAES128, GCMAES192, GCMAES256, None>
IPSec Integrity: <GCMAES128, GCMAES192, GCMAES256, SHA256>
PFS Group: <None, PFS1, PFS2, PFS14, PFS2048, PFSMM, SCP256, ECP384>
SA lifetime (seconds): <value from 300 – 86400>  

Click Next  

Note: SA IP Range must be configured as 0.0.0.0/0 – 0.0.0.0/0
   
Add a Link – Security  

Pre-shared key (PSK): <enter a key to be used on Entra and on your VPN Device>

Click Save
 
Connectivity Tab Information:  

Click Next
 
Traffic Profile:  
Select the traffic profile for this connection
Review + Create Information  

Confirm the information is correct  

Click Create remote network
From the main remote network

Select view configuration
From the network configuration  

Click Copy and Save

FortiGate Firewall Configuration

The following table details the steps to configure a FortiGate Firewall (in this instance a 60E)

StepScreenshot
Navigate to your routers IP http://x.x.x.x

Expand VPN
Expand IPsec Tunnel
Click Create New Tunnel

Within the Wizard

Name: VPNtoEntra
Template Type: Custom

Click Next
On the Next Screen complete the following:

IP Version: IPv4
IP Address: EntraID VPN
Interface: WAN Port
NAT: Disabled
DPD: On Idle
Method: PSK
Pre-Shared Key: xxxxx
IKE: 2

Phase 1 Proposal
Encryption: AES256
Authentication: SHA256
DH: G14
Key Life: 86400

Phase 2 Proposal
Local Address: 0.0.0.0/0.0.0.0
Remote Address: 0.0.0.0/0.0.0.0
Encryption: AES256GCM
Enable PFS: uncheck
Key Lifetime: 27000 (from above)

Next Click OK
Configure BGP

Navigate to Network
Expand BGP (if missing add via system/feature visibility)
Enter your Local AS: (ASN from above)
Under Neighbors
Click Create New
Add in the Azure BGP details:

IP: (Azure BGP from above)
Remote AS: (Azure ASN from above)
Update source: name of your IPSEC tunnel
Enable Enforce eBGP multihop
Enable Activate IPv4
Check Soft reconfiguration
Check Capability: route refresh

Click OK
Navigate to Network
Expand BGP (if missing add via system/feature visibility)

Add in the local networks

Click Apply

Confirm the BGP has established and is not idle
And confirm that the routes are visible
Next you will need to config
the firewall policy to allow
the internal traffic to Entra
TBC

Conclusion

Make sure the following are in place:

  • SA is configured with the routes 0.0.0.0/0 – 0.0.0.0/0.
  • Route is configured for the Entra BGP Peer within the subnet /32 i.e. 172.16.2.254/32 (172.16.2.254 being the Microsoft BGP endpoint).
  • Within BGP make sure enforce eBGP multihop is enabled (if you see packets being RST/DROP from your router IP to the Azure BGP IP it’s likely because eBGP is not enabled.
  • Routes to your local network is enabled in BGP