- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Special Routing Over AnyConnect VPN
We have a vendor we work with that needs to see our whitelisted IP when we connect to their network. We just moved over to Meraki from an ASA that had this ability. It was configured by our ISP. We want traffic destined for a specific public IP to show as coming from our VPN IP. Is this possible on the Meraki? If so, where would that be setup?
Solved! Go to solution.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I'd have the developers use the old client vpn. As far as I'm aware you can run both simultaneously and with your authentication setup (RADIUS) you would still have the same level of login security.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
By default, an MX will do NAT and hide everything within your internal network (and Reote Access VPN) to its offical IP address on the outside interface.
So, in a nutshell - it could be working right out of the box. Don‘t know anything about your infrastructure though
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
As it's setup now, and we went live on Friday night, while in the office it shows the IP address we need. While remote on VPN it shows the remote public IP. Can it show a specific IP while remote over VPN to a specific public IP? So, only traffic looking to get to the public IP of a vendor we use will show a public IP as if in the office over VPN. Hope that makes sense. We have a Meraki MX 68.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
If you do full tunneling on your client or anyconnect vpn it should work. If you do split tunneling this scenario is not supported by Meraki directly. It will only work if you have another firewall to route this traffic out of and thus could include the relevant static route in the client vpn.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
That's what I was afraid of. Full tunneling would mean all users on VPN always use everything on the VPN network instead of taking advantage of their own network, correct?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Correct
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
What about adding a second connection profile for AnyConnect like we had on the ASA and making that a full-tunnel VPN? Is that even possible?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Based on the documentation and the GUI, I don't believe that's possible. You could do that with the old school client vpn as split tunneling is a client side configuration.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Thanks for all your replies.
Then let me ask you this... What would you do in this scenario without over complicating the new setup?
-You moved to a new internet circuit with a Meraki MX68
-Using AnyConnect VPN split-tunneling (w\RADIUS/AD Authentication) for 70 remote workers
-You have 2 developers that need to show a specific public IP to connect to a 3rd party server
Would you even entertain the idea of going with a full tunnel for all?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I'd have the developers use the old client vpn. As far as I'm aware you can run both simultaneously and with your authentication setup (RADIUS) you would still have the same level of login security.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Ok, thanks we might just do that. I guess that would be the easiest. There will have to be some major cleanup on the ASA so it's not conflicting with the Meraki. We actually didn't change the AnyConnect client. It worked with the Meraki. Would've been a lot more work.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Just wanted to add the end solution to this in case anyone runs into the same problem. It was resolved by adding the remote host IP in the split tunneling configuration as one of the interesting traffic to be allowed through the VPN Tunnel.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Was just about to suggest doing this exact solution, that's how we have got around it.
