Juniper-LOGO

Juniper NCE-511 AI-Driven SD-WAN Reference Architecture

Juniper-NCE-511-AI-Driven-SD-WAN-Reference-Architecture -PRODUCT

Specifications

  • Product Name: Juniper AI-Driven SD-WAN
  • Integration: Microsoft’s SSE Solution
  • Published Date: 2024-12-16

Product Information
The Juniper AI-Driven SD-WAN integrates with Microsoft’s SSE Solution to provide network configuration examples for deployment scenarios. The solution offers benefits such as improved network performance and optimized deployment planning.

Product Usage Instructions

Configuration Workflow
The configuration example involves creating and deploying a basic branch template for device connectivity. Prior to configuration, ensure you have the necessary information for each site, including WAN link addresses, BGP peering address ranges, BGP AS number, access permissions, bandwidth requirements, and redundancy model.

Configuration Basics

  1. Create a basic branch template for device connectivity.
  2. Configure the IPsec tunnel.
  3. Associate traffic profiles.
  4. View the network profile.
  5. Create applications.
  6. Update WAN Edge templates.
  7. Verify operation.

Configuration Options
Multiple configuration options are available with varying redundancy levels. Depending on the setup, you can configure single or dual WAN links with Microsoft’s SSE Solution. Ensure to follow the specified guidelines for WAN Edge and Microsoft’s SSE Solution configurations.

Juniper AI-Driven SD-WAN and Microsoft’s SSE Solution Integration—Network Configuration Example (NCE)
Juniper Networks Network Configuration Example (NCE) describes how to configure and deploy Juniper products in a typical use case scenario. In this NCE, you’ll find use case scenario with the topology, configuration information, and validation output for the configuration. Read further to plan and optimize your network deployment.

Solution Benefits

  • This network configuration example (NCE) describes the integration that you can achieve between Juniper AI-Driven SD-WAN and Microsoft’s SSE solution. The NCE describes the benefits of integrating the solutions and provides multiple example configurations including verification steps.
  • Microsoft’s cloud-based Secure Service Edge (SSE) solution includes Microsoft Entra Internet Access and Microsoft Private Access, under the Global Secure Access brand. The Juniper AI-Driven SD-WAN solution provides seamless access to Microsoft’s SSE solution from branch and office locations. This integration is automated using scalable device templates to ease the operational burden of deploying the service to many sites. This guide describes how to configure both Microsoft’s SSE solution and the Juniper Mist WAN Edge template for connectivity.

This document enables the topology shown in Figure 1 on page 2. An IPsec tunnel is configured between the Juniper AI-Driven SD-WAN device, also known as the Juniper Session Smart Router (SSR), and Microsoft’s SSE solution using the Secure Edge Connector within the WAN Edge template. Additionally, a BGP over IPsec connection is configured to dynamically learn routing destinations from Microsoft’s SSE solution. When used for Microsoft 365 access, Microsoft’s SSE solution-advertised addresses are used to determine the traffic sent to the service rather than the WAN Edge-based application dictionary.

Juniper-NCE-511-AI-Driven-SD-WAN-Reference-Architecture -FIG- (1)

Configuration Workflow
The sequence of tasks in this configuration example:

  1. Create and deploy a basic branch template for device connectivity. Creation of the basic template is out of scope of this guide, but the WAN Edge template might be stand-alone or SD-WAN with security enabled.
  2. Configure a remote network within the Microsoft Entra portal. This defines the IPsec tunnel characteristics and define routing endpoints for reachability.
  3. Configure a Secure Edge Connector in the device template. This creates a custom IPsec tunnel to Microsoft’s SSE solution and defines encryption parameters.
  4. Configure a BGP peer for Microsoft’s SSE solution service to learn Microsoft 365 destinations dynamically.
  5. Configure an application to allow traffic to be steered toward the IPsec tunnel. This application will be used in application policy to allow client networks to access the BGP learned routes.
  6. Configure an application policy with a network and application, but no traffic steering policy to indicate to the WAN Edge that the routing table should be used for learned destinations.

Configuration Planning
Prior to configuration, the following information must be available for each site:

  1. The public address of the WAN links that are used to reach Microsoft’s SSE solution service. At this time, only static WAN addresses might be used to reach the service.
  2. One or two /29 address ranges that are available for BGP peering between the WAN Edge loopback and Microsoft’s SSE solution. When zone redundancy is desired, two address ranges are required.
  3. A BGP AS for use by Microsoft’s SSE solution. This might be in the private AS range unused elsewhere in the enterprise network.
  4. Networks and users that are granted access to Microsoft’s SSE solution.
  5. Bandwidth desired for each site. This is used in remote network configuration within the Microsoft Entra portal.
  6. Desired redundancy model for each site. Options include single/dual WAN for the WAN Edge and single/dual Zone for Microsoft’s SSE solution. The single/dual WAN configuration might be used with either a single SSR or HA SSR.

Configuration Options and Workflows
Several configuration options are available with varying levels of redundancy. For the Juniper SSR WAN Edge, it is possible to configure a single node with either one or two WAN interfaces connected to Microsoft’s SSE solution. A dual node HA SSR router should be configured with two WAN interfaces connected to Microsoft’s SSE solution.

NOTE: When zone redundancy is configured on the Microsoft’s SSE solution, then two BGP peers are configured as routing neighbors across a single tunnel.

Three configuration options are covered in this guide:

  1. Single WAN link and peer on the Microsoft’s SSE solution. This configuration might be used for small deployments and testing when redundancy is not required.
  2. Single WAN link with zone redundancy on the Microsoft’s SSE solution. This configuration does not provide redundancy on the SSR WAN Edge but does cover failure of an availability zone on the Microsoft’s SSE solution. This option is included to illustrate how two BGP peers might be configured across the same IPsec tunnel.
  3. Dual WAN link using an HA SSR with zone redundancy per tunnel on the Microsoft’s SSE solution. This provides the maximum level of redundancy for both the WAN Edge and Microsoft’s SSE solution. Failure of an SSR node, WAN link or Microsoft availability zone does not impact the flow of traffic in this configuration.

Additional redundancy and WAN link variations might be configured using the basic configuration building blocks described for each of these variations.

Single WAN Link and Peer on Microsoft’s SSE Solution
This configuration option is illustrated in the diagram below.

Juniper-NCE-511-AI-Driven-SD-WAN-Reference-Architecture -FIG- (2)

Configuration Basics

Sign into Microsoft Entra portal with this URL, https://entra.microsoft.com, using credentials with administrative permissions to configure Microsoft’s SSE solution.

  1. On the Microsoft Entra Portal, navigate to Global Secure Access > Devices > Remote network.
  2. Select Create remote network and provide Name and Region details. Region specifies the Azure region where the other end of your tunnel will be (one end being the WAN Edge SSR router at the branch).
  3. Click Next.

CREATE A REMOTE  NETWORK

Juniper-NCE-511-AI-Driven-SD-WAN-Reference-Architecture -FIG- (3)

Configure IPsec Tunnel

  1. Select the + Add a link button.
  2. Enter the following details:
    1. Link name: Name of your WAN Edge device.
    2. Device type: Choose one of the options from the drop-down list (Other or Juniper).
    3. Device IP address: Public IP address of the WAN link used to connect to Microsoft.
    4. Device BGP address: The border gateway protocol address of the WAN Edge. This will be the Local BGP address of the WAN Edge and will be within the /29 range selected for connectivity. The reverse peer configuration will be done in Entra portal.
    5. Device ASN: Provide the autonomous system number of the WAN Edge network. By default, this value is 65000 but might be modified using Mist APIs.
    6. Redundancy: Select either No redundancy or Zone redundancy for your IPsec tunnel. If you select Zone redundancy, then another unique zone redundant local BGP address is configured.
      NOTE: Microsoft limits configuration to a list of valid ASNs.
    7. Bandwidth capacity (Mbps): Choose the bandwidth for your IPsec tunnel.
    8. Local BGP address: This is a private IP address outside of the on-premises network within the /29 range selected for connectivity. For example, if the device BGP address selected for the WAN Edge peer above is 10.99.99.1, then use 10.99.99.2.Juniper-NCE-511-AI-Driven-SD-WAN-Reference-Architecture -FIG- (4)
  3. Click Next.
  4. The IPsec/IKE policy is set to Default but change it to Custom.
  5. After selecting Custom, select a combination of settings that match the WAN Edge. In this example, the following settings are selected:
    • Encryption
    • IKEv2 integrity
    • DH Group
    • IPSec encryption
    • IPSec integrity
    • PFS Group
    • SA lifetime
      NOTE: The IPsec/IKE policy specified must match the policy on the WAN Edge.
  6. Review the remote network valid configurations.
  7. Click Next.
  8. Enter the pre-shared key (PSK). The same secret key must be used on your CPE.
  9. Select Add link.

Juniper-NCE-511-AI-Driven-SD-WAN-Reference-Architecture -FIG- (5)

Associate Traffic Profile

  1. Either click Next or select the Traffic profiles tab.
  2. Select the Microsoft 365 traffic profile. This ensures that only Microsoft 365 traffic is forwarded to Microsoft’s SSE solution. The rest of the traffic will follow the configured Application Policy.
  3. Select Review + Create.

NOTE: Select Create remote network to finalize the remote network configuration.

Juniper-NCE-511-AI-Driven-SD-WAN-Reference-Architecture -FIG- (6)

View the Network Profile
Once the remote network is created, go to the list of remote networks and select View configuration. This displays a task pane with connectivity details for the Microsoft gateway. The details include public endpoints of Microsoft’s SSE gateway that are added to the WAN, along with BGP and ASN values.

Juniper-NCE-511-AI-Driven-SD-WAN-Reference-Architecture -FIG- (7)

Create Application

  • One of the benefits of the Microsoft’s SSE solution is that Microsoft 365 applications are advertised dynamically to the WAN Edge. This means that, as protected destinations are updated and service addresses modified over time, the Microsoft’s SSE solution can dynamically advertise these routes to the WAN Edge for transport toward the service.
  • One of the benefits of Juniper’s AI-Driven SD-WAN is that routing policy is “Zero Trust.” This means that just because a route was learned, it does not mean a network can access the destinations reachable through the advertised route. An application policy must explicitly permit the Network to access the application.
  • A unique characteristic of the Session Smart Router (SSR) is that it might be configured to route unconditionally toward a destination using Steering Policy, or follow routes learned within the RIB (routing information base or route table). When a steering policy is defined for traffic to be forwarded locally toward a WAN or LAN link (for example, DIA), this policy overrides any learned routes. Therefore, an Internet service steered toward a local interface (not dynamically learned routes through the overlay), takes precedence over the learned routes if configured in the WAN Edge template.
  • When the Microsoft’s SSE solution is used for all Internet traffic, then a simple Internet application with a prefix 0.0.0.0/0 might be used, and the user is granted access without a steering policy as shown below:Juniper-NCE-511-AI-Driven-SD-WAN-Reference-Architecture -FIG- (8)
  • This will tell the WAN edge to allow the Network “Lab” to use any of the learned routes either through overlay or through IPsec to the Microsoft’s SSE solution.
  • However, if an Internet service is already created and uses DIA policies as shown in the example below, then a separate application must be created to allow the learned routes to be used first.
  • The way to do this is define a more specific “IPSec” application than the 0.0.0.0/0 Internet application. When the prefixes to be learned are not known (cannot be configured), then creating an IPsec application with a more specific prefix ensures the route table is imported from the IPsec BGP peer and used for the allowed networks.Juniper-NCE-511-AI-Driven-SD-WAN-Reference-Architecture -FIG- (9)
  1. In the Mist portal, navigate to Organization > WAN > Applications.
  2. Click Add Applications.
  3. Define an application name (for example, IPSec). See the image below.
  4. Select Custom Apps.
  5. Enter the prefixes 128.0.0.0/1 and 0.0.0.0/1 for the IP Addresses. These prefixes are more specific than the default 0.0.0.0/0.Juniper-NCE-511-AI-Driven-SD-WAN-Reference-Architecture -FIG- (10)
  6. Click Save and navigate to Organization > WAN > WAN Edge Templates.

Update WAN Edge Template

In the Mist portal, navigate to the WAN Edge Template for the Session Smart Router WAN Edge device.

  1. Select Add Providers under Secure Edge Connectors to open a configuration panel.Juniper-NCE-511-AI-Driven-SD-WAN-Reference-Architecture -FIG- (11)
  2. Enter the following entries to match Microsoft’s SSE solution:
    • Name: (for example, MicrosoftSSE)
    • Provider: Custom
    • Protocol: IPSec
    • LocalID: <WAN Edge Public IP address>
    • Pre-shared Key: <Same as MirosoftSSE>
    • IP or Hostname: <Microsoft endpoint address>
    • Source IP: <WAN Edge Source IP>
    • Remote ID:<Microsoft endpoint address>
    • WAN Interface:<Interface address with Public IP>
    • IPSec Proposals:
      • Encryption: aes256
      • Authentication Algorithm: sha2
      • DH Group: 14
    • IPSec Proposals:
      • Encryption Algorithm: aes_gcm256
      • DH Group: 14
      • SA Lifetime: 1800 secondsJuniper-NCE-511-AI-Driven-SD-WAN-Reference-Architecture -FIG- (12)Juniper-NCE-511-AI-Driven-SD-WAN-Reference-Architecture -FIG- (13)
  3. Click Save at the bottom of the window.
  4. Create a new BGP Group using the BGP dialog.
    Use the values selected previously:
    • Name: <name of SSE Connector>
    • Type: External
    • Local AS: <65000 or non-default AS for WAN Edge>Juniper-NCE-511-AI-Driven-SD-WAN-Reference-Architecture -FIG- (14)
  5. Select Add Neighbor in the BGP dialog box.Juniper-NCE-511-AI-Driven-SD-WAN-Reference-Architecture -FIG- (15)
  6. 6. Enter the following values for the BGP peer:
    • IP Address: BGP peer address of Microsoft’s SSE solution
    • Optional: Add BGP policy for import/export of routesJuniper-NCE-511-AI-Driven-SD-WAN-Reference-Architecture -FIG- (16)
  7. Navigate to Application Policies and click Add Application Policy.
    • Import Application Policy
    • Add Application Policy
    • Edit Applications
  8. Using the application name created in the steps above, add a policy to allow the desired networks to reach the more specific “IPSec” application using the route table. Leaving the Steering Policy blank instructs the SSR to use the routing table for prefixes within the defined application range.Juniper-NCE-511-AI-Driven-SD-WAN-Reference-Architecture -FIG- (17)
  9. Navigate to the top of the Template and click Save.
    Verify Operation
    • Once the template is updated, an IPsec configuration will be pushed to the WAN Edge device. If this is the first time IPsec deployment, this will take some time to download the software/configuration.
    • Once the IPsec configuration is deployed, you can view the IPsec status under WAN Edge > <WAN Edge Name> > Secure Edge Connector Details.Juniper-NCE-511-AI-Driven-SD-WAN-Reference-Architecture -FIG- (18)
    • BGP neighbor status might be found under Monitor > Insights > WAN Edge.Juniper-NCE-511-AI-Driven-SD-WAN-Reference-Architecture -FIG- (19)
    • It might be useful to navigate to Testing tools to observe learned routes under WAN Edge > Utilities > Testing Tools > Routes > Show Routes. In the display below, routes learned through IPsec will be displayed with Microsoft’s SSE solution BGP peer as next hop.Juniper-NCE-511-AI-Driven-SD-WAN-Reference-Architecture -FIG- (20)

Single WAN Link with Zone Redundancy on the Microsoft SSE Solution

This configuration option is illustrated in the diagram below.

Juniper-NCE-511-AI-Driven-SD-WAN-Reference-Architecture -FIG- (21)

In this configuration, a second BGP peer is created using zone redundancy within the Microsoft SSE solution. Follow the steps described above with the following additions:

  1. Ensure to select Zone redundancy when creating the link to the remote network within the Microsoft SSE solution as shown below. This creates a second BGP peer which might be reached through the same remote network link and IPsec tunnel from the SSR.Juniper-NCE-511-AI-Driven-SD-WAN-Reference-Architecture -FIG- (22)
  2. Create a second BGP peer using the same BGP group within the device template in Mist. The peer address might be found within the SSE configuration as shown.Juniper-NCE-511-AI-Driven-SD-WAN-Reference-Architecture -FIG- (23)

Dual WAN Link Using an HA SSR with Zone Redundancy Per Tunnel on the Microsoft SSE Solution
This configuration option is illustrated in the diagram below.

Juniper-NCE-511-AI-Driven-SD-WAN-Reference-Architecture -FIG- (24)

In this configuration, both a second link and a second BGP peer per link are created using zone redundancy within the Microsoft SSE solution. Follow the steps described above with the following additions:

  1. Ensure to select Zone redundancy when creating links as described above.
  2. Create the second BGP peer within the same BGP group configuration that is pointing toward the SEC Tunnel as the peering network.
  3. Create a second link within the Microsoft SSE solution for the same Remote network. This link might be added either during initial network configuration or added using the Remote network dialog box shown below. Select Remote network > Remote Network Name > Links > Add a link.
  4. Repeat the steps above for addition of another Secure Edge Connector within the device template in Mist. This provides the opportunity to steer the tunnel out a secondary interface in a high availability configuration.
  5. Create a second BGP Group that is assigned to the second Secure Edge Connector. This group is assigned to the second connector (SEC tunnel) as the outbound interface.
  6. Create a second pair of BGP peers within the BGP Group using the additional link and BGP peering configuration within the Microsoft SSR solution.

Juniper-NCE-511-AI-Driven-SD-WAN-Reference-Architecture -FIG- (25)

Juniper Networks, the Juniper Networks logo, Juniper, and Junos are registered trademarks of Juniper Networks, Inc. in the United States and other countries. All other trademarks, service marks, registered marks, or registered service marks are the property of their respective owners. Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice. Copyright © 2024 Juniper Networks, Inc. All rights reserved.

FAQ

Q: What information is required prior to configuring the network?
A: Prior to configuration, you need to have the public addresses of WAN links, BGP peering address ranges, BGP AS number, access permissions, bandwidth requirements, and redundancy model details for each site.

Q: How many configuration options are covered in the guide? 
A: The guide covers three configuration options: Single WAN link and peer on Microsoft’s SSE Solution, Single WAN link with zone redundancy on Microsoft’s SSE Solution, and Dual WAN link using an HA SSR with zone redundancy per tunnel on Microsoft’s SSE Solution.

Documents / Resources

Juniper NCE-511 AI-Driven SD-WAN Reference Architecture [pdf] User Guide
NCE-511 AI-Driven SD-WAN Reference Architecture, NCE-511, AI-Driven SD-WAN Reference Architecture, Reference Architecture, Architecture

References

Leave a comment

Your email address will not be published. Required fields are marked *