Create a remote network with a custom IKE policy for Global Secure Access (preview)

IPSec tunnel is a bidirectional communication. This article provides the steps to set up the communication channel in Microsoft Entra admin center and the Microsoft Graph API. The other side of the communication is configured on your customer premises equipment (CPE).


To create a remote network with a custom IKE policy, you must have:

  • A Global Secure Access Administrator role in Microsoft Entra ID.
  • Received the connectivity information from Global Secure Access onboarding.
  • The preview requires a Microsoft Entra ID P1 license. If needed, you can purchase licenses or get trial licenses.

How to create a remote network with a custom IKE policy

If you prefer to add custom IKE policy details to your remote network, you can do so when you add the device link to your remote network. You can complete this step in the Microsoft Entra admin center or using the Microsoft Graph API.

To create a remote network with a custom IKE policy in the Microsoft Entra admin center:

  1. Sign in to the Microsoft Entra admin center as a Global Secure Access Administrator.

  2. Browse to Global Secure Access (preview) > Devices > Remote network.

  3. Select the Create remote network button.

    Screenshot of the remote network page with the crete new remote network button highlighted.

  4. Provide a name and region for your remote network and select the Next button.

  5. Select the + Add a link button to add the connectivity details of your CPE.

    Screenshot of the create remote network page with the add a link button highlighted.

There are several details to enter on the General tab. Pay close attention to the Peer and Local BGP addresses. The peer and local details are reversed, depending on where the configuration is completed.

Screenshot of the General tab with examples in each field.

  1. Enter the following details:
    • Link name: Name of your CPE.
    • Device type: Choose a device option from the dropdown list.
    • IP address: Public IP address of your device.
    • Peer BGP address: Enter the BGP IP address of your CPE.
      • This address is entered as the local BGP IP address on the CPE.
    • Local BGP address: Enter a BGP IP address that is not part of your on-premises network where your CPE resides.
      • For example, if your on-premises network is, then you can use as your Local BGP address.
      • This address is entered as the peer BGP​​ IP address on your CPE.
    • Link ASN: Provide the autonomous system number (ASN) of the CPE.
      • A BGP-enabled connection between two network gateways requires that they have different ASNs.
      • For more information, see the Valid ASNs section of the Remote network configurations article.
    • Redundancy: Select either No redundancy or Zone redundancy for your IPSec tunnel.
    • Zone redundant local BGP address: This optional field shows up only when you select Zone redundancy.
      • Enter a BGP IP address that is not part of your on-premises network where your CPE resides and is different from Local BGP address.
    • Bandwidth capacity (Mbps): Specify tunnel bandwidth. Available options are 250, 500, 750, and 1000 Mbps.
  2. Select the Next button.


You must specify both a Phase 1 and Phase 2 combination on your CPE.

  1. IKEv2 is selected by default. Currently only IKEv2 is supported.

  2. Change the IPSec/IKE policy to Custom.

  3. Select your Phase 1 combination details for Encryption, IKEv2 integrity and DHGroup.

  4. Select your Phase 2 combinations for IPsec encryption, IPsec integrity, PFS group and SA lifetime (seconds).

  5. Whether you choose Default or Custom, the IPSec/IKE policy you specify must match the crypto policy on your CPE.

  6. Select the Next button.

    Screenshot of the custom details for the device link.

  1. Enter the Pre-shared key (PSK). The same secret key must be used on your CPE.
  2. Select the Save button.

Screenshot of the Security tab for adding a device link.

Terms of Use

Your use of the Microsoft Entra Private Access and Microsoft Entra Internet Access preview experiences and features is governed by the preview online service terms and conditions of the agreement(s) under which you obtained the services. Previews may be subject to reduced or different security, compliance, and privacy commitments, as further explained in the Universal License Terms for Online Services and the Microsoft Products and Services Data Protection Addendum (“DPA”), and any other notices provided with the Preview.

Next steps