- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Azure vMX and default routing
Dear all,
I've a vMX deployment in Azure and i need to use it as default gateway for the vnet connected. I mean that the vMX have to be the security gateway for internet access for the VMs attached at the vnet.
I've set up the vMX following this guide: https://documentation.meraki.com/MX/MX_Installation_Guides/vMX_Setup_Guide_for_Microsoft_Azure
and on Azure routing table I've set 0.0.0.0/0 and next hope the vMX ip but it doesn't work.
Can you please clarify if this configuration is supported?
Thank you
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
As things stand, the VMX is not built for this use case. From the Overview section of the document you have linked: VMX is "a virtual MX appliance running in the Azure Cloud that serves as an Auto VPN termination point for your physical MX devices" The features that make an MX appliance a UTM for a site (firewall, IPS, content filtering, malware scanning) are not charged for / supported by the vMX (there's no Advanced Security license for vMX)
For your use case, you're probably better off with something like a virtualised Firepower: https://www.cisco.com/c/en/us/products/collateral/security/firepower-ngfw-virtual/threat-defense-vir...
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
It will route via VPN - to Meraki MX via AutoVPN or other IPSec tunnel terminators via non-Meraki VPN. If your on-prem devices are 'out there' via the the Internet, you won't be able to reach them natively (no VPN) via the VMX. Do you not need to secure that traffic?
