I am working with customer to setup vmx in azure cloud. As per meraki documentation from OCT 31 2022, meraki supports routed mode in vmx. However there is no documentation or deployment model from meraki to follow. Also does vmx supports multiple interfaces such as wan and lan. Is there anyone who deployed vmx nat mode, if so please share then info.
https://documentation.meraki.com/MX/Other_Topics/vMX_NAT_Mode_Use_Cases_and_FAQ
Meraki vMX's Limited NAT mode has only one Uplink.
Communication from the branch MX to the vMX "LAN Config > subnet" is absorbed by the vMX.
Therefore, in Limited NAT mode, Full Tunnel must be configured from the branch MX to the vMX.
Also, vMX must be deployed in a separate segment.
My assumption is that the "LAN Config > subnet" setting may have been installed as Connected in the Routing table. (Blackhole)
A reboot is required after changing the settings.
If not rebooted, the system may operate halfway.
Equivalent to Routed Mode of MX, DC-DC Failover topology is not possible in Limited NAT mode.
basically we are building autovpn to vmx and to access services in azure. For internet connection traffic will drop locally at the branch site.
> basically we are building autovpn to vmx and to access services in azure.
The vMX in Limited NAT mode performs Source NAT and hides the Branch's address.
This may be a problem if you want to identify the user (Real IP address) on the Azure side.
In Limited NAT mode, communication from Azure to Branch is not possible because the branch's address is hidden by NAT.
If it is a one-way communication (Branch -> Azure) like Shared Service, that restriction would not be a problem.
As of now we are only targeting to one way communication from branch to azure. If we enable azure default route option, all branch advertised vpn routes will routed through full tunnel to azure vmx, which I don’t want. I would like to know how vmx can advertise the azure subnets to branch mx thats what’s i am trying to figure out?
From what you say, it seems to me that there is no need to stick to Limited NAT mode.
It would be simple to configure vMX as One-Armed Concentrator [Passthrough or VPN Concentrator Mode] and advertise the subnet in Azure's vMX.
The Local Networks setting can advertise specified subnets.
Overlay (on the Auto VPN tunnel) access control can be configured with the "site-to-site outbound firewall", which also allows One-Way communication (Branch -> Azure) can be allowed.