- 1Sign-in to Azure portal.
- 2In Search resources, service, and docs (G+/), type virtual network.
- 3Select Virtual Network from the Services results.
- 4On the Virtual Network page, select Create.
- 5Once you select Create, the Create virtual network page opens.
- 6On the Basics tab, configure Project details and Instance details VNet settings.
When you fill in the fields, you see a green check mark when the characters you enter in the field are validated. Some values are auto filled, which you can replace with your own values:
>> Subscription: Select Pay-As-You-Go.
>> Resource group: Select the existing (Create new) Resource group AZ-DR01.
>> Name: Type AZ-DR01-VNet1.
>> Region: - 7Click Next: IP Address.
- 8On the IP Addresses tab, configure the values.
IPv4 address space: Type 10.15.0.0/16. - 9Click +Add subnet.
>> Subnet name: type FrontEnd.
>> Subnet address range: 10.15.1.0/24.
>> Services: Keep the default settings (0 selected) - 10Click Add.
- 11Click Next: Security.
- 12On the Security tab, at this time, leave the default values:
>> BastionHost: Disable.
>> DDoS Protection Standard: Disable.
>> Firewall: Disable. - 13Click Next: Tags.
- 14On the Tags tab, leave the default values.
- 15Click Next: Review + create.
- 16After the settings have been validated, select Create.
- 17Make sure the new VNet deployment is complete without issues, click Go to resource.

Meraki Cloud Managed Services: Azure, AWS, GCP Security Gateway
Trusted by Global Brands
Configuring Meraki To Azure Site-To-Site-VPN Tunnels
Create Azure Virtual network
Create Azure VPN Gateway:
- 1In Search resources, service, and docs (G+/), type virtual network gateway.
- 2Select Virtual network gateway from the Services results.
- 3On the Basics tab, configure Project details and Instance details and Public IP address for Virtual network gateway settings.
>> Subscription: Select Pay-As-You-Go.
>> Name: Type AZ-DR01-VNet1-GW1.
>> Region: Select Canada Central.
>> Gateway type: Select VPN.
>> VPN type: Select Route-Based.
>> SKU: Select VpnGW1 (Bandwidth:650Mbps)
>> Virtual network: Select AZ-DR01-VNet1.
>> Gateway subnet address range: Type 10.15.255.0/27
>> Public IP address: Leave Create new selected.
>> Public IP address name: AZ-DR01-VNet1-GW1-Public-IP
>> Assignment: VPN gateway supports only Dynamic.
>> Enable Active-Active mode: Select Disabled.
>> Configure BGP ASN: Select Disabled. - 4Click Next: Tags.
- 5On the Tags tab, leave the default values.
- 6Click Next: Review + create.
- 7After the settings have been validated, select Create.
- 8Make sure the new Virtual network gateway deployment is complete without issues, click Go to resource.
Create Azure Local Network Gateway:
- 1In Search resources, service, and docs (G+/), type virtual network gateway.
- 2Select Local network gateway from the Services results.
- 3Click Create local network gateway.
- 4On the Create local network gateway page, specify the values for your local network gateway.
>> Name: Type OFFICECalgary.
>> IP address: Type OFFICE-Calgary WAN IP address (208.230.42.114).
>> Address Space: add 192.168.0.0/22 and 172.16.200.0/24 and 172.16.250.0/24.
>> Configure BGP settings: Use only when configuring BGP. Otherwise, don't select this.
>> Subscription: Select Pay-As-You-Go.
>> Resource Group: Select AZ-DR01.
>> Location: Select Canada Central. - 5Click Create.
Create VPN connection:
- 1On the Azure Services page, click the new create Virtual network gateway.
- 2On the Virtual network gateway page, select Connections.
- 3On the Connections page, click +Add.
- 4On the Add connection page, configure the values for your connection.
>> Name: Type AZ-DR01-VNet1toOFFICECalgary
>> Connection type: Select Site-to-site(IPSec).
>> Virtual network gateway: The value is fixed because you are connecting from this gateway.
>> Local network gateway: Click Choose a local network gateway and select the local network gateway that you want to use.
>> Click the OFFICECalgary local network gateway.
>> Shared Key: Type Azure
>> IKE Protocol: Select IKEv2
>> Resource Group: Select AZ-DR01 - 5Click OK.
Settings at Meraki site:
- 1Sign-in to Cisco Meraki portal.
- 2Select Security & SD-WAN, click Site-to-site VPN.
- 3On the Site-to-site VPN field, select Hub.
- 4On the VPN settings field, select the local networks that you want to connect to Azure and then select VPN on.
- 5On the Organization-wide settings page, click add a peer in the Non-Meraki VPN peers.
- 6On the Non-Meraki VPN peers, configure details settings.
>> Name: Type ToAzure
>> IKE Version: Select IKEv2
>> IPsec Policies: Click Default and then change Default to Azure
>> Click Update.
>> Public IP: Type Azure Virtual Network Gateway Public IP address (53.139.26.221)
>> Private subnets: Type 10.15.0.0/16
>> Preshared secret: Type Azure.
>> Availability: select All Networks. - 7Click Save Changes.
Verify the VPN connection:
In the Azure portal, you can view the connection status of a Resource Manager VPN Gateway by navigating to the connection.
- 1In the Azure portal menu, select All resources or search for and select All resources from any page.
- 2Select to the virtual network gateway.
- 3On the blade for the virtual network gateway, click Connections. You can see the status of each connection.
In the Meraki portal, you can view the VPN status of a Meraki by navigating to the Non-Meraki peer.
- 1Sign-in Meraki portal.
- 2Select Security & SD-WAN, click VPN Status.
- 3Click Non-Meraki peer.
- 4Make sure the Status light show green.
CONFIGURING MERAKI TO AWS SITE-TO-SITE-VPN TUNNELS
Create a VPC:
- 1After logging into AWS go to the 'Services' area (top bar) and select the 'VPC' service. This will bring you to a status page about the Networking configured for your AWS environment. Select 'Your VPCs' on the left-hand side.
- 2Select the 'Create VPC' button. This will allow you to create a Virtual Private Cloud where accessible resources on AWS will live. Enter a name and a CIDR block.
- 3You'll be taken back to the 'Your VPCs' page where there will be a new element based on what you just created.
Allocate a subnet:
- 1On the left-hand side of the VPC Service screen there is a menu bar. Under the 'Virtual Private Cloud' header there is an option for 'Subnets'. Select the 'Subnets' option.
- 2On the configuration screen select the 'Create subnet' button.
- 3On the following 'Create subnet' screen, provide a descriptive name, select the VPC we just made, and provide a subset of the total space allocated for the VPC.
- 4You'll be brought back to the Subnets configuration screen when this is complete.
Configure the VPN connection on AWS's side:
- 1On the left-hand bar within the VPC service screen there is a heading entitled VPN Connection. Within this area select the 'Customer Gateways' option.
- 2Assign the Customer Gateway a name, keep the Routing as Dynamic and in IP address slot place the IP address of your Meraki device. Select 'Create Customer Gateway' when ready.
- 3To find your Meraki devices IP address open the Meraki dashboard and select 'Security appliance' ->'Appliance Status'. In this photo the number hidden with the blue box is the public IP of the Meraki device.
- 4On the left-hand bar within the Customer Gateways service screen there is a heading entitled VPN Connections. Within this area select the 'Virtual Private Gateway' option.
- 5Select the button entitled 'Create Virtual Private Gateway'.
- 6In the configuration screen choose a name and leave the ASN as 'Amazon default ASN' (unless you have specific a BGP configuration). Select the 'Create Virtual Private Gateway' button. When complete you should be moved back to the Virtual Private Gateway Configuration Screen with a new element list.
- 7Select the checkbox next to the new element and find the 'Action' button at the top. Click it and select 'Attach to VPC'.
- 8You'll be brought to a new screen. Select the VPC you created. Then select the 'Yes, Attach' button. You'll be taken back to the Virtual Private Gateway configuration screen.
- 9On the left-hand bar within the Virtual Private Gateway service screen there is a heading entitled VPN Connection. Within this area select the 'VPN Connections' option.
- 10Select the button entitled 'Create VPN Connection'.
- 11In the Create VPN Connection window select a Name, the VPN Gateway we just created from the list, the existing customer gateway ID of the Virtual Private Gateway we just configured, and specify 'static' as the routing option. For Static IP Prefixes put the internal subnet used by your Meraki Device. Leave the rest blank and when finished select the 'Create VPN Connection' button. You can find this subnet on the Meraki Dashboard under 'Security Appliance' -> 'Addresses & VLANs' in the 'Routing' section.
- 12Once this is created it will be in a 'pending' state for a bit while Amazon allocates it. After a few minutes it should switch to an 'available' state. Once it reaches that state, select the checkbox next to the newly created resource and select the 'Download Configuration' button. Save this file for the next step.
- 13On the left-hand bar within the VPN Connections service screen there is a heading entitled 'Virtual Private Cloud'. Within this area select the 'Route' Tables option. Select the checkbox next to the route table associated with the VPC you've created.
- 14On the lower pane a configuration menu will appear. Select the 'Route Propagation' tab and select the 'Edit' button. Then check the 'Propagate' checkbox next to the Virtual Private Gateway listed.
Configure the VPN connection on Meraki's side:
- 1In your Meraki Dashboard navigate to site-to-site VPN options under Security appliance->Site-to-site VPN.
- 2Under type, select Hub (Mesh).
- 3Under the VPN settings sub header find the networks that you'd like to enable the site-to-site routing for and select 'yes' under the 'Use VPN' column.
- 4Leave NAT traversal as automatic.
- 5Leave OSPF advertisements disabled.
- 6Under the Organization-wide settings sub header find 'Non-Meraki VPN peers'. Select the 'Add a peer' link.
- 7Fill out the new peer link information based on the downloaded file.
First give the connection a descriptive name.
Then, using the information from the downloaded file, find the 'Outside IP Address' of the 'Virtual Private Gateway'. Place this value in the Public IP field.
For private subnets put the subnet address you allocated back in step 2.
Under IPsec policies, click 'default'. This will open a new configuration menu. At the top select from the 'Choose a Preset' dropdown -'AWS'. Hit Update when this is complete.
Find the Pre-Shared Key row within the downloaded file and copy the pre-Shared key into the Meraki configuration area. - 8Save your Changes.
E. Note: while making a request to a host on the other side of the Site-to-Site VPN, it will take a few attempts for the request to complete while the tunnel is initialized. The more traffic sent across the tunnel the less likely this lag is to occur as the tunnel will stay up. This often leads to people writing quick ping scripts that send a ping every couple second to keep the tunnel up.
Configuring Meraki To GCP Site-To-Site VPN
Meraki Dashboard Configuration:
- 1Add license(s) to the Meraki dashboard:
To complete the vMX Meraki dashboard configuration, a vMX license must be available for use in your organization.
If your organization has already reached its vMX license limit, you will be unable to create new vMX networks until a vMX network is deleted or additional vMX licensing added.
If you do not have access to a vMX license or require additional vMX licenses, please reach out to your Meraki reseller or sales representative. - 2Create a 'Security Appliance' Network Type.
- 3Assign vMX type to network
Once you have created the 'Security appliance' network and added the appropriate license you will be able to deploy a new vMX to your network by clicking on the 'Add vMX' button. - 4Generate the authentication token
After you add the new vMX to your network, navigate to Security Appliance > Appliance status and select 'Generate authentication token' to generate the token for the GCP vMX Authentication Token field. - 5Copy the newly generated token and save it.
The newly generated token will be used in the "New Cisco Meraki vMX deployment" configuration section when creating a new instance.
Google Cloud Setup:
- 1You must have the following before you begin:
- 2-Google Cloud VPC network.
Deploying the vMX:
- 1Access the Cisco Meraki vMX offer by clicking here or search for "Meraki" in the GCP marketplace to find the vMX solution.
- 2Click Launch on the vMX offer landing page.
- 3Enter a Deployment Name for the instance.
- 4Choose the desired Zone.
- 5Select the c2-standard-4 vMX instance size. This is the only instance size currently offered for vMX on GCP.
- 6Paste the vMX Authentication token you copied from the Meraki dashboard in the steps earlier to the vMX Authentication Token field.
- 7The Boot Disk options can remain as-is.
- 8Under the Network section select the desired Network, Subnetwork and External IP for this instance. The External IP field can be left as Ephemeral (if you would like to let GCP assign a public IP to the vMX itself) or set to None (if you would like to have a private IP on the vMX and have it egress through an upstream device like a firewall or Google Cloud NAT instance). You do not need to add more network interfaces to the VM as it is a single interface appliance.
- 9Click Deploy.
Additional VPC Configuration:
The virtual MX appliance will allow for site-to-site VPN connectivity using Auto VPN between GCP and other remote MXs. In order to have proper bidirectional communication between remote subnets that are terminating into GCP via the vMX and hosts within GCP, the VPC routing table must be updated for the remote Auto VPN-connected subnets.
- 1Navigate to VPC Networks > Routes from the GCP console and select Create Route.
- 2Specify a Name and Description for the route.
- 3Select the Network that your vMX is deployed in.
- 4In the Destination IP range, add the routes available via Auto VPN.
- 5Select the Specify an instance option for the next hop and select the vMX instance as the Next hop instance.
Firmware Version:
In order for the vMX to function on GCP it must be running 16.8+ firmware.
Token Validity:
- 1Navigate to Compute Engine > VM Instances, click on the vMX in question and click on Stop to turn it off.
- 2Click Edit.
- 3Scroll down to the Custom Metadata section and update the value in the token field.
- 4Click Save and then click Start to power the vMX back up.
Confirming Cloud Reachability:
By default, HTTP traffic inbound to the vMX is disabled for security purposes. You can enable inbound HTTP traffic to the vMX (for accessing the local status page) by performing the following:
- 1Navigate to Compute Engine > VM Instances, click on the vMX in question and click Edit (you do not need to turn off the instance for this change).
- 2Scroll down to the Firewalls section and select the box next to Allow HTTP traffic.
- 3Click Save.
- 4On the VM instance details page copy the External IP that was assigned to the instance.
- 5On the local status page you can find the health status of the vMX and whether it is successfully able to connect to the Meraki cloud or not.
No "Add vMX" Button:
When navigating to Security & SD-WAN > Appliance Status, if there is no "Add vMX" button, please ensure the following two conditions are met:
- 1You have available vMX licenses in your license pool.
- 2You have created a 'Security appliance' network type.
Key Concepts:
- 1Concentrator Mode:
All MXs can be configured in either NAT or VPN concentrator mode. There are important considerations for both modes. - 2One-Armed Concentrator:
In this mode, the MX is configured with a single Ethernet connection to the upstream network. All traffic will be sent and received on this interface. This is the only supported configuration for MX appliances serving as VPN termination points into Google Cloud. - 3NAT Mode Concentrator:
In this mode the MX is configured with a single Ethernet connection to the upstream network and one Ethernet connection to the downstream network. VPN traffic is received and sent on the WAN interfaces connecting the MX to the upstream network and the decrypted, unencapsulated traffic is sent and received on the LAN interface that connects the MX to the downstream network.
VPN Topology:
- 1Split Tunnel:
In this configuration, branches will only send traffic across the VPN if it is destined for a specific subnet that is being advertised by another MX in the same Dashboard organization. The remaining traffic will be checked against other available routes, such as static LAN routes and third-party VPN routes, and if not matched will be NATed and sent out the branch MX unencrypted. - 2Full Tunnel:
In full tunnel mode all traffic that the branch or remote office does not have another route to is sent to a VPN hub.



