We have used the ikev2 to our azure palo running panos 11.1, with minimal issues from several mx68w and one site with mx105. But one site has mx250 and it constantly had problems. On the Palo side we have it configured in tunnel mode, and using a full tunnel(0.0.0.0/0), on the meraki side we broke up the 0.0.0.0/0 to omit the 10/8, 192.168/16 and 172.16/12 ranges to remove the overlap warnings. But with all that said, I've had never had a issue with meraki mx in ikev1 mode, but this is policy mode on the meraki. So you do not want any overlap with it, and the tunnels phase 2's have to match on both sides, which is laborious with this many ranges on the palo side. We also stay on meraki mx stable firmware train. Been running this way for almost a year. But it does seem to matter what mx device you have.
0.0.0.0/5, 8.0.0.0/7, 11.0.0.0/8, 12.0.0.0/6, 16.0.0.0/4, 32.0.0.0/3, 64.0.0.0/2, 128.0.0.0/3, 160.0.0.0/5, 168.0.0.0/6, 172.0.0.0/12, 172.32.0.0/11, 172.64.0.0/10, 172.128.0.0/9, 173.0.0.0/8, 174.0.0.0/7, 176.0.0.0/4, 192.0.0.0/9, 192.128.0.0/11, 192.160.0.0/13, 192.169.0.0/16, 192.170.0.0/15, 192.172.0.0/14, 192.176.0.0/12, 192.192.0.0/10, 193.0.0.0/8, 194.0.0.0/7, 196.0.0.0/6, 200.0.0.0/5, 208.0.0.0/4