This is a Meraki MX replacing another brand of firewall.
Client has chosen to use the IPSec VPN on the firewall, not wanting to pay for AnyConnect so that option is unfortunately out.
- edit: attempted with AnyConnect as well... same issue.
VPN is configured with Radius Authentication and DUO mfa
It is operating using the Windows VPN and is operating as expected to connect to the site.
The problem I fear is the client, far in the painful past, chose to use a Private IP subnet for their LAN Vlan.
Config:
VLAN 1 is setup as in the 100.0.1.0/24 subnet
IPsec VPN is setup with the Private IP subnet 192.168.18.0/24
Layer 3 Rules allow access from the VPN subnet to VLAN 1
Layer 3 Rules allow for any source and destination ports
Ipsec is currently setup to forward all traffic over the VPN to the client site (confirmed with show my ip when connected)
Pings to the local DNS server do not return from VPN client, but do from MX Tests
Client Tracert results show Tracing route to lo0-100.BSTNMA-VFTTP-350.verizon-gni.net [100.0.1.1]
Firewall reports and packet captuers show that the Firewall is receiving the packets and that Layer 3 rules are allowing the VPN to access through to 100.0.1.1
Based on this information I believe the MX is routing the traffic destined for the 100.0.1.0/24 subnet to the internet
I cannot enter a static route to point to the firewall VLAN ip for the Subnet as it already exists in its routing table
Any ideas out there on if there is a way to make this work, the previous VPN on the old firewall allowed for it to work