I am managing the above network, which consists of a corporate office and one branch. The branch is connected to the internet via an MX67 in routed mode, configured as a S2S VPN Spoke with automatic NAT traversal. It currently only has users, so it is in Single LAN mode.
The corporate network is behind a Cisco ASA. All the networks in the corporate office are L2 up to the ASA. The MX84 currently has a P2P link to the ASA over its own VLAN. This MX84 is in passthrough / VPN concentrator mode, with the S2S VPN set as a hub and NAT traversal as automatic.
At this time, users in the branch office can reach the DMZ in the corporate office over the S2S VPN, via the MX67 and then the ASA, as they should. The goal is to add the protected servers network to the branch office, and let it reach the already-existing protected servers VLAN in the corporate office. This network is on its own VLAN (1000) and no other networks should be able to reach it unless permitted by the ASA.
Users in the branch should continue to be able to reach the DMZ at corporate, as well as the internet via split-tunnel configuration already present in the S2S configuration.
I think I'll need to continue with the MX67 as gateway for the branch. I assume I'll need to change it to have multiple VLANs, one for users and one to match the protected servers VLAN at corporate. Then, can I just trunk those VLANs from the ASA to the MX84? What should my configuration look like for the MX's? Finally, when I'm making these changes, is it possible to break the Meraki configurations from the dashboard enough to lose connectivity to the firewalls (and if this happens, how can I revert)?
The networks shown are not accurate to the network in reality, and there are multiple networks on each side that will need this configuration. Thank you.