How to allow traffic from VPN vlan to local vlans

ErnstTFD
Getting noticed

How to allow traffic from VPN vlan to local vlans

Hello,

 

I have only recently succeeded in establishing a VPN connection from a client PC to my Meraki.

 

The specified vlan for the VPN is 192.168.5.0/24. My clients have to access servers in my local vlans. These are 10.5.5.0/24 and 192.168.1.0/24.

 

Do I set this up under port forwarding or under the Firewall? Can you please show an example of how to do it properly?

 

Second question is there a way to give some clients access to one local vlan, but not the other and vice versa?

12 Replies 12
Brash
Kind of a big deal
Kind of a big deal

You can restrict VPN clients access to local LAN servers by using L3 firewall rules.

See example 2 at the bottom of the following doc

https://documentation.meraki.com/MX/Client_VPN/Restricting_Client_VPN_access_using_Layer_3_firewall_...

 

As for your second question, it's only possible using Meraki group policies. You'll need to create two (or more) group policies with the applicable firewall rules. You'll then need to login to the VPN as the user so the client shows up in the dashboard, and then assign the policy to the client.

Not particularly elegant but it will work.

Sadly, group policies linked to AD groups isn't supported for users logging in via VPN.

ErnstTFD
Getting noticed

I don't understand. I don't want to restrict access. I want to allow it. How do I allow it?

 

I am now connected as 192.168.5.118. When I ping 192.168.1.3 I don't get a ping. When I try to access 192.168.1.3 with my file explorer is cannot find that IP. How do I reach it?

 

I have added a rule to the Layer 3 firewall like this:

ErnstTFD_0-1665566180626.png

This does not help. I still cannot access 192.168.1.3.

Brash
Kind of a big deal
Kind of a big deal

Meraki VPN clients have access to all local subnets within the network by default.

 

Are you seeing an increase of hits on the deny all rule when running the test? What is the local IP (non-vpn) of your test machine?

 

You could try a Meraki packet capture to see if the ping packets are making it across the VPN.

ErnstTFD
Getting noticed

My laptop is on wifi at the moment to test VPN connectivity, here is the wifi and VPN IP's

Capture.PNG

Capture2.PNG

I have (for now) changed the block rule to allow, for testing.

ErnstTFD_0-1665568639489.png

 

 

Brash
Kind of a big deal
Kind of a big deal

Do you have a route on the MX for the 192.168.1.0/24 network? (Security and SD-WAN -> Route table)

And similarly, do you have routes in the rest of your network to route back to the 192.168.5.0/24 network via the MX?

 

Do you have any group policies set on the client you're testing from?

ErnstTFD
Getting noticed

I've not changed anything in the routing table, it is still on default settings and look like this:

ErnstTFD_0-1665644122064.png

I do have several Group policies setup and the laptop in question is configured for one of these policies. But I must add that the Group policies are assigned by MAC adress and as the VPN is not using the MAC address of the LAN port on the laptop, I'm not sure that the Meraki will identify the laptop correctly. That being said I'm not interested in using the internet throught the meraki. The laptop can use it's own local internet as long as I can access the LAN on my office network.

ErnstTFD_1-1665644341478.png

 

 

alemabrahao
Kind of a big deal
Kind of a big deal

Well, I suggest you try putting the machine on the allowed group policy and test again, It's not a route problem and probably a rule on your group policies are blocking the connection.

I am not a Cisco Meraki employee. My suggestions are based on documentation of Meraki best practices and day-to-day experience.

Please, if this post was useful, leave your kudos and mark it as solved.
ErnstTFD
Getting noticed

I use MAC addresses to add clients to a Group Policy. The VPN connection does not have a MAC adress. How will I add a policy to it?

alemabrahao
Kind of a big deal
Kind of a big deal

Has the client connected to VPN right? So you can add to a Group Policy.

 

alemabrahao_0-1666005545597.png

 

I am not a Cisco Meraki employee. My suggestions are based on documentation of Meraki best practices and day-to-day experience.

Please, if this post was useful, leave your kudos and mark it as solved.
alemabrahao
Kind of a big deal
Kind of a big deal

Group Policies

It is possible to manually apply group policies to clients connected via client VPN. Group Policy applied to a client VPN user is associated with the username and not the device. Different devices that connect to client VPN with the same username will receive the same group policy. For more help on assigning or removing group policies applied to a client, refer to the Creating and Applying Group Policies document.

Note: It is not possible to assign group policies automatically once a user connects to client VPN.

I am not a Cisco Meraki employee. My suggestions are based on documentation of Meraki best practices and day-to-day experience.

Please, if this post was useful, leave your kudos and mark it as solved.
alemabrahao
Kind of a big deal
Kind of a big deal

Is it a non-Meraki VPN point or Meraki VPN?

 

If it is a non-Meraki VPN point, does the point on the other end need to allow its local networks?

 

There is an example of the configuration between a Cisco ASA and an MX Meraki ( It's Just a example OK?).

 

https://documentation.meraki.com/MX/Site-to-site_VPN/MX_to_Cisco_ASA_Site-to-site_VPN_Setup

I am not a Cisco Meraki employee. My suggestions are based on documentation of Meraki best practices and day-to-day experience.

Please, if this post was useful, leave your kudos and mark it as solved.
ErnstTFD
Getting noticed

So I am simulating a person working from home. That is a windows laptop on a home wifi using VPN to connect to the office MX64.

 

At the office they must, for example, be able to access the local NAS drive, Server1 or 192.168.1.3. Another user must be able to access a SQL server located at 10.5.5.1.

 

The VPN only assigns a subnet that is not the same as the local vlan's subnet and I cannot find a way to add more than one subnet to the VPN. So I don't know what to do to access the local subnet/vlan once looged in as a VPN user.

 

Maybe I'm missing something obvious, as everyone is telling me by default it is all accessible. However the method of accessing it eludes me.

Get notified when there are additional replies to this discussion.
Welcome to the Meraki Community!
To start contributing, simply sign in with your Cisco account. If you don't yet have a Cisco account, you can sign up.
Labels