Watchguard VPN Cloud Sophos VPN Cloud Sonicwall VPN Cloud Palo Alto VPN Cloud Fortigate VPN Cloud Cisco VPN Cloud
In the Azure portal, you can view the connection status of a Resource Manager VPN Gateway by navigating to the connection.
In the Meraki portal, you can view the VPN status of a Meraki by navigating to the Non-Meraki peer.
E. Note: while making a request to a host on the other side of the Site-to-Site VPN, it will take a few attempts for the request to complete while the tunnel is initialized. The more traffic sent across the tunnel the less likely this lag is to occur as the tunnel will stay up. This often leads to people writing quick ping scripts that send a ping every couple second to keep the tunnel up.
The virtual MX appliance will allow for site-to-site VPN connectivity using Auto VPN between GCP and other remote MXs. In order to have proper bidirectional communication between remote subnets that are terminating into GCP via the vMX and hosts within GCP, the VPC routing table must be updated for the remote Auto VPN-connected subnets.
In order for the vMX to function on GCP it must be running 16.8+ firmware.
By default, HTTP traffic inbound to the vMX is disabled for security purposes. You can enable inbound HTTP traffic to the vMX (for accessing the local status page) by performing the following:
When navigating to Security & SD-WAN > Appliance Status, if there is no "Add vMX" button, please ensure the following two conditions are met: