An Azure network security service that is used to protect Azure Virtual Network resources.
Meraki walled garden rules must allow all required Microsoft endpoints for Microsoft Entra sign-in and password change flows; allowing only *.msauth.net and login.microsoftonline.com is not sufficient.
From the provided context, the only explicitly listed Microsoft cloud endpoints are for Microsoft 365 traffic and Microsoft Entra-related services. For a guest/Wi‑Fi walled garden that must allow Microsoft sign-in and password change, configure the Meraki walled garden (or equivalent allowlist) to permit at least:
- Microsoft 365 / Microsoft cloud IP ranges (for sign-in and related services)
Add the following IP ranges to the allowed list (as destinations that bypass the walled garden restrictions):
-
132.245.0.0/16 -
204.79.197.215/32 -
150.171.32.0/22 -
131.253.33.215/32 -
23.103.160.0/20 -
40.96.0.0/13 -
52.96.0.0/14 -
40.104.0.0/15 -
13.107.128.0/22 -
13.107.18.10/31 -
13.107.6.152/31 -
52.238.78.88/32 -
104.47.0.0/17 -
52.100.0.0/14 -
40.107.0.0/16 -
40.92.0.0/15 -
150.171.40.0/22 -
52.104.0.0/14 -
104.146.128.0/17 -
40.108.128.0/17 -
13.107.136.0/22 -
40.126.0.0/18 -
20.231.128.0/19 -
20.190.128.0/18 -
20.20.32.0/19
-
- Microsoft Entra / Global Secure Access FQDNs
Ensure the walled garden allows at least the documented Microsoft Entra service FQDN suffix:
-
globalsecureaccess.microsoft.com(Meraki supports wildcards, so*.globalsecureaccess.microsoft.comor the base domain depending on configuration)
-
- General guidance for the scenario
- Confirm that DNS queries from the guest network can resolve Microsoft domains (no DNS blocking or redirection for these domains).
- Make sure the walled garden rules are applied to both HTTP and HTTPS traffic.
- After updating the allowlist, test with a freshly joined hybrid-joined PC on the guest Wi‑Fi and attempt to reach the Microsoft sign-in page and password change page.
If, after adding these documented IP ranges and FQDNs, sign-in still fails, verify on the Meraki side that:
- The rules are ordered correctly so that the allow rules for these IPs/domains are evaluated before any deny/captive-portal rules.
- There is no SSL inspection or proxy behavior that breaks Microsoft sign-in flows for these endpoints.
References: