Skip to main content
Cisco Meraki Documentation

Meraki Secure SD-WAN Microsoft SSE Configuration Guide

Microsoft’s SSE Meraki SD-WAN Configuration Guide 

The integration of Cisco Meraki Secure SD-WAN with Microsoft's SSE solution facilitates inspection of north-south traffic originating from SD-WAN branches destined for the internet or Software-as-a-Service (SaaS) applications routed through Microsoft's SSE solution.

This guide details the process of securing Microsoft's SSE solution with Cisco Meraki Secure SD-WAN networks, specifically for internet and SaaS applications. The integration has undergone extensive testing and validation for deployment on Cisco Meraki version… in conjunction with the Microsoft's SSE solution cloud dashboard.  

Microsoft Entra Internet Access traffic, alongside Microsoft Entra Access, are integral components of Microsoft's SSE solution: Global Secure Access. Microsoft Entra Internet Access ensures secure access to internet and SaaS apps, providing robust protection for users, devices, and data against internet-borne threats. This document focuses on the Internet Access use case. 

There are multiple ways to connect remote networks to Global Secure Access. In a nutshell, you're creating an Internet Protocol Security (IPSec) tunnel between a core router, known as the customer premises equipment (CPE), at your remote network and the nearest Global Secure Access endpoint. All internet-bound traffic is routed through the core router of the remote network for security policy evaluation in the cloud. A key customer benefit is the seamless deployment of a comprehensive end-to-end SD-WAN and security solution where the installation of a client isn't required on individual devices. In addition, customer also benefit from enhanced security capabilities such as universal tenant restrictions, compliant network check and source IP restoration

Prerequisites 

  • Microsoft’s SSE solution account  

  • Meraki MX/Z device (running MX19.1+ firmware) 

  • BGP routing over IPsec (IKEv2 required) 

  • BGP port TCP 179 is permitted on your VPN Firewall 
     

Caveats 

  • This integration only applies to tunneling Microsoft 365 traffic 

  • Only NULL encryption is supported for Phase 2 IPsec encryption settings 

  • Configuration templates are not supported with this integration 

  • User FQDN is not supported on Microsoft’s SSE solution 

  • Zone Redundancy configuration via Microsoft’s SSE solution is not supported. To achieve Zone redundancy, see Redundant tunnel section 

  • eBGP routes are redistributed into iBGP by default, this could lead to sub optimal routing for a remote AutoVPN peer. 
     

Configuration of Microsoft’s SSE solution 

How to create remote networks - Global Secure Access | Microsoft Learn 

  1. Navigate to entra.microsoft.com and login with your credentials  
     

  1. On the left pane, navigate to Global Secure Access > Connect > Remote Networks

     
     

  1. On the top left, click + Create remote Network 

     
     

  1. Under Basics tab, configure a remote network Name and select a Region. Select a region closest to your remote network. Then click next: Connectivity


     

  1. Under Connectivity tab, click + Add a link  

5a. Under General - configure the following 

  • Name – Name of your Branch Site 
     

  • Device Type – Cisco Meraki 
     

  • IP address – Public IP of your Meraki SD-WAN device 
     

  • Local BGP Address – Microsoft BGP IP address (for eBGP peering, Meraki SD-WAN requires the local and peer BGP addreSSEs to be within the same /30 subnet) 
     

  • Peer BGP Address – Meraki SD-WAN BGP IP address (for eBGP peering, Meraki SD-WAN requires the local and peer BGP addreSSEs to be within the same /30 subnet) 
     
    For this example the 10.0.0.0/30 IPsec subnet was chosen with 10.0.0.1 as   my  Meraki BGP peering IP and 10.0.0.2 as my Microsoft Entra BGP peering IP 

 

  • Link ASN - Meraki SD-WAN AS number (this can be found on the routing page of your Meraki Network 
     

  • Redundancy – Not Applicable 
     

  • Bandwidth Capacity – Choose based on your branch device/needs 

5b. Under Details - Configure the following 
 

  • Protocol – IKEv2 

  • IPsec/IKE policy – Custom 
     

Phase 1 settings  

  • Encryption – SHA 256 

  • IKEv2 Integrity – SHA 256 

  • DH group – DH 14 
     

Phase 2 Settings 

  • IPsec encryption – NULL  

  • IPsec Integrity – SHA 256 

  • PFS group - Off 

  • Lifetime - 300 

5c. Under Security - configure the following 

  • Pre-shared key – configure a shared secret 

 

5d. Save your configuration 

5e. After your configuration has been saved, the created link will be listed under connectivity as seen below: 

 


 
Click Next: Traffic profiles 

 

 
 
6. Under the Traffic profiles tab,  

Select the checkbox for Microsoft 365 traffic profile, and click Next: Review + create  


 

7. Under the Review + create tab 

Review your settings and click Create remote network  


 
The newly created remote network will be listed on the Remote Network page. 

 


 
The ”view configuration link” under connectivity details can be used to view configurations needed to configure the Meraki Secure SD-WAN Firewall at my branch location.  

The local configuration is what I need to configure my Meraki Secure SD-WAN device. 

Meraki Secure SD-WAN Configuration 

On the Meraki Network, Navigate to Site-to-site VPN settings through the Security & SD-WAN > Configure > Site-to-site VPN page. 

There are three options for configuring the MX-Z's role in the Auto VPN topology: 

 

meraki sdwan hub and spoke configuration

  • Off: The MX-Z device will not participate in site-to-site VPN. 

  • Hub (Mesh): The MX-Z device will establish VPN tunnels to all remote Meraki VPN peers that are also configured in this mode, as well as any MX-Z appliances in hub-and-spoke mode that have the MX-Z device configured as a hub. 

  • Spoke: This MX-Z device (spoke) will establish direct tunnels only to the specified remote MX-Z devices (hubs). Other spokes will be reachable via their respective hubs unless blocked by site-to-site firewall rules. 
     

  • You can configure a VPN peering to Microsoft’s SSE solution by clicking "Add a peer" button 

 


 

You can configure a VPN peering to Microsoft SSE by clicking "Add a peer" button enter the following information: 

  • Name – Name of IPsec peer 
     

  • IKE version – IKEv2. Only IKEv2 is supported with BGP over IPsec (a requirement for Microsoft SSE Integration) 

Peers 

  • Public IP or Hostname – Microsoft Entra IP address  
     

  • Shared secret – Configured secret must match verbatim what is configured on Microsoft Entra 

  • Routing – Dynamic routing is required for connectivity to Microsoft Entra 
     

  • Network – Select the name of the Meraki SD-WAN network you want to connect to Microsoft Entra. This field replaces the availability tag for dynamically routed peers 
     

  • IPsec subnet – This is a /30 IPsec subnet required and used for eBGP peering between your Meraki SD-WAN device and Microsoft Entra  
     

  • BGP Source IP – This is the local BGP IP the Meraki SD-WAN device will use for BGP peering with Microsoft Entra. This IP should match the IP in the “Peer BGP address” field on Microsoft Entra. 
     

  • BGP Neighbor IP – This is BGP peering IP address for Microsoft Entra. This IP should match the IP address in the “Local BGP address” field on Microsoft Entra.   
     

  • Remote AS – This is the Remote ASN for Microsoft Entra. The ASN can be found in the “view configuration” file on Microsoft Entra. 

 

IPsec policy 

Phase 1 settings  

  • Encryption – AES 256 

  • Authentication – SHA 256 

  • Pseudo-random function – Defaults to Auth 

  • Diffie-Hellman group - DH14 

  • Lifetime – 3600 
     

Phase 2 Settings 

  • Encryption - NULL 

  • Authentication – SHA 256 

  • PFS group – Off 

  • Lifetime – 300 

 

 

Once all configurations' parameters have been filled, click Add, at the button right corner of the sider drawer.  

Now your peer has been configured.  

The corresponding eBGP peer will show up grayed out on the Security & SD-WAN > Routing page, and can only be removed when the peer is deleted via the Site-to-Site VPN page.

Screenshot 2024-08-28 at 11.38.03 AM.png

Verifying connectivity to Microsoft’s SSE solution 

The connectivity to Microsoft SSE starts with an IPsec tunnel, and then an eBGP peering relationship. Hence, to verify connectivity, first verify that the IPsec tunnel is up. We can verify by navigating to Security & SD-WAN > VPN Status – Non-Meraki VPN tab.  

Here we can see the status of the IPsec tunnel.  

Indicator Meaning
Green Phase 1 and phase 2 are up (IPsec connectivity is up)  
Amber Phase 1 is up but phase 2 is down
Red Phase 1 and phase 2 are both down. To troubleshoot, see troubleshooting IPsec peer guide 

A Green indicator means the IPsec tunnel is up.  

Next, we navigate to the Dynamic protocol status page to see if the eBGP peering relationship with Microsoft SSE solution is up. An Established peer status indicates that the BGP neighbor relationship is established, and the routes column indicates how many routes have been learned from the BGP neighbor. 

The exact routes learned can viewed on the Security & SD-WAN > Route table page. 

Screenshot 2024-08-29 at 9.43.54 AM.png

Redundant tunnels 

 
Meraki Secure SD-WAN native primary & backup tunnels are not supported with BGP over IPsec enabled tunnels, to achieve redundancy to Microsoft SSE, simply create two IPsec peering to a different Microsoft SSE zone and manipulate BGP attributes to give priority to one tunnel over the other. 

 Redundant tunnels can be created to provide availability in the following failure scenarios. 

Microsoft SSE Primary DC failure
 
    To avoid the impact of a potential failure of Microsoft’s SSE solution DC failure, it is recommended to create one connection for each two different     Microsoft’s SSE solution DCs. Then manipulate BGP attributes to give preference to one Microsoft SSE DC over the other. The Weight, MED (Multiple Exit     Discriminator) or Path prepend fields under the routing section of the IPsec peer configuration can be used to prefer BGP routes from one peer over     another.  

  1. For example, the default Weight for BGP peers is 0, setting the Weight of one Microsoft’s SSE DC 10, gives a higher priority to the routes advertised by the zone A over another zone with a default Weight of 0.

  1. For symmetric return traffic, use AS path prepending ensure Microsoft SSE knows the primary tunnel to return traffic. For example, the path prepending field is empty by default, on the backup tunnel, add e.g. 64550 64550 to increase hop count seen by Microsoft SSE peer, this will ensure the tunnel with the least hops will be preferred. 
     

Primary Microsoft SSE tunnel 

Backup Microsoft SSE tunnel 

Screenshot 2024-11-02 at 10.16.50 AM.png

 

  1. WAN connectivity failure  
    To avoid the impact of a potential WAN failure, it is recommended to have dual WAN links on your Secure Meraki SD-WAN device and configure an additional link under the connectivity tab. If WAN1 fails, connectivity to Microsoft’s SSE solution is established on WAN2. The tunnel over the WAN2 link will not establish until WAN1 fails on the MX Secure SD-WAN device.  

  2. Device failure 
    To avoid the impact of device failure, it is recommended to deploy your Meraki Secure SD-WAN in a High Availability configuration. See MX Warm Spare guide to learn more about High availability. 

This Topology and configuration highlights how to deploy a fully redundant connection to Microsoft’s SSE solution. 

 


 
 
WAN 1 Active primary and secondary tunnels are independent tunnels with BGP attributes configured to prefer one peer over the other. The WAN 2 inactive tunnels become active when WAN1 connection fails.  

The Single device Dual WAN topology addresses DC failure and WAN connectivity failure, while the High Availability with Dual WAN virtual IP addresses DC failure, WAN connectivity failure and device failure.  

Single device Dual WAN topology configuration 

On MSFT Entra,  

  1. Configure two remote networks  

  1. Configure with two links per remote network pointing to each WAN IP  
     

On Meraki Dashboard,  

  1. Configure higher BGP Weight for preferred MSFT DC 

  1. Increase AS path for backup tunnel to MSFT DC to ensure symmetric routing 

High Availability with Dual WAN virtual IP configuration 

On MSFT Entra,  

  1. configure two remote networks  

  1. Configure with two links per remote peer pointing to each WAN IP  

On Meraki Dashboard,  

  1. Configure MX in Warm spare mode 
  2. Configure virtual IP
  3. Configure higher BGP Weight for preferred MSFT DC 
  4. Configure lower MED value for preferred MSFT DC to ensure symmetric routing 

Non-Meraki VPN Firewall  

BGP uses TCP port 179, this means that TCP for 179 needs to be permitted through the VPN firewall to allow BGP communication between configured peers. 

You can add firewall rules to control what traffic is allowed to pass through the VPN tunnel. These rules will apply to outbound VPN traffic to/from all MX-Z appliances in the Organization that participate in site-to-site VPN. These rules are configured in the same manner as the Layer 3 firewall rules described on this documentation. Note that VPN Firewall rules will not apply to inbound traffic or to traffic that is not passing through the VPN. 

Serviceability   

Event Logs    

If you have any issues or would like to know more about the Cisco Secure Access peering details, navigate to Network-wide > Monitor > Event log  

  • Select Event type Include - Non-Meraki VPN Negotiation 

 Packet Captures     

The following options are available for a packet capture on MX/Z platforms: 

 

  • Appliance: The appliance the capture will run on. 

  • Interface: Select the interface to run the capture on; the interface names will vary depending on the appliance configuration. A few examples of interfaces you may see are: 

  • Internet 1 or Internet 2 - Capture traffic on one active WAN uplink.  Internet 2 will only appear if there is a second WAN link.  

  • LAN - Captures traffic from all LAN ports 

  • Cellular - Captures cellular traffic from the integrated cellular interface.  This does not apply to USB modems. 

  • Site-to-Site VPN - Captures AutoVPN traffic (MX/Z to MX/Z only).  This does not apply to non-Meraki VPN peers. 

  • Output: Select how the capture should be displayed; view output or download .pcap. 

  • Verbosity: Select the level of the packet capture (only available when viewing the output directly to Dashboard). 

  • Ignore: Optionally ignore capturing broadcast/multicast traffic. 

  • Filter expressions: Apply a capture filter. 

To capture packets, select the WAN interface and use the filter expressions for UDP 500 for Phase 1 or UDP 4500 for Phase 2. 

 API   

The Meraki dashboard API is an interface for software to interact directly with the Meraki cloud platform and Meraki-managed devices. The API contains a set of tools known as endpoints for building software and applications that communicate with the Meraki dashboard for use cases such as provisioning, bulk configuration changes, monitoring, and role-based access controls. The dashboard API is a modern, RESTful API using HTTPS requests to a URL and JSON as a human-readable format. The dashboard API is an open-ended tool that can be used for many purposes. 

For more information, read here

24/7 Support   

Cisco Meraki Support is available 24/7 to Enterprise customers for assistance with resolving network issues and providing answers to questions not covered by the documentation. For more information, read here

  • Was this article helpful?