
Microsoft Entra Private Access, part of the Microsoft Global Secure Access (GSA) Security Service Edge (SSE), is a compelling new cloud-based Zero Trust Network Access (ZTNA) solution that offers enhanced security compared to traditional VPNs. Until recently, traffic for all defined applications flowed through the GSA tunnel regardless of the client’s location. This resulted in sub-optimal traffic flow when the client is on the same network as resources defined in Quick Access or Enterprise applications. Fortunately, Microsoft has introduced a new feature to address this crucial limitation.
Intelligent Local Access
Historically, DirectAccess used the Network Location Server (NLS) to determine network location. Always On VPN used Trusted Network Detection (TND) to accomplish this same task. GSA has lacked this critical feature since its initial release. Thankfully, Microsoft recently added Intelligent Local Access (ILA). This feature allows GSA to identify a trusted private network and bypass the client, routing traffic directly to the local resource.
How It Works
With GSA ILA, administrators define a Private Network in their GSA configuration. Administrators define a resource by FQDN along with DNS servers to use for name resolution. When the client resolves this FQDN to a matching IP address (CIDR or IP address range is accepted as well), the client will then bypass GSA for target resources defined in the policy.
Note: Authentication is still performed for access to GSA applications even when ILA indicates the client is on a private network. However, after successful authentication and the client satisfies any conditional access policies, traffic is forwarded directly to the resource rather than routed through the GSA tunnel.
Configure ILA
To configure ILA, open the Microsoft Entra admin center and follow these steps.
- Navigate to Global Secure Access > Connect > Private Networks.
- Select Add Private Network.
- Enter a name for the trusted network in the Name field.
- Enter the IPv4 address(es) of any DNS server(s) used for this network in the DNS servers field.
- Enter the fully qualified domain name (FQDN) of a resource on this network for name resolution in the Fully qualified domain name field (see below for additional information).
- Select an option from the Resolved to IP address type drop-down list. Options include IP address, IP address range (CIDR), and IP address range (IP to IP).
- Enter the expected name resolution result in the Resolved to IP address value field.
- Click Select applications below Target resource to exclude from GSA processing when on this network.
- Click Create.
ILA FQDN Recommendation
Technically speaking, the FQDN used by GSA for ILA can be any internal resource, even those included in Quick Access or Enterprise applications. Since the GSA client only attempts to resolve this name and doesn’t connect to it, administrators should configure a dedicated static DNS record with a dummy IP address for this purpose. A static DNS record ensures it won’t be overwritten, scavenged, or accidentally deleted. For example, administrators can create a DNS A record named ‘ILA’ that resolves to any IP address they choose, as long as it matches the IP address defined in the Private network configuration for GSA.
Troubleshooting
When confirming GSA client traffic bypass, using standard network troubleshooting tools isn’t sufficient. Here are a few examples.
Resolve-DnsName
Although the client is on a private network, Resolve-DnsName shows the IP address of the GSA address range of 6.6.x.x.
Ping (ICMP)
Interestingly, if you try to ping the FQDN, you’ll see that traffic bypasses the GSA client, as the response comes from the destination’s address.
By contrast, attempts to ping the FQDN outside the private network fail as the GSA client does not pass ICMP.
Advanced Diagnostics
The best way to confirm GSA client traffic bypass for private network resources is to use the Advanced diagnostics tool included with the GSA client. Click the GSA client icon in the notification area, then follow these steps to validate GSA client bypass when ILA is detected.
- Select the Troubleshooting tab in the navigation tree.
- Click Run Tool in the Advanced diagnostics tool section.
- Select the Traffic tab.
- Remove the Action == Tunnel filter.
- Click Start collecting.
- Initiate traffic to a Quick Access or Enterprise application configured for bypass when ILA detects a private network.
- Click Stop collecting.
- Review the log and note the Connection status for the traffic generated previously. It should indicate Bypassed when ILA detects a private network, as shown here.
Summary
With Intelligent Local Access now a feature of the Global Secure Access client, administrators can configure the client to bypass the GSA tunnel and access Quick Access and Enterprise applications directly for better performance, while still enforcing authentication and Conditional Access.
Additional Information
Enable Intelligent Local Access in Microsoft Entra Private Access




















