Thank you, @Tadpole86, for your reply.
I had read the White Paper, but hoped for some more concrete informations.
"The dashboard and MXs establish two 16-character pre-shared keys (one per direction) and create a 128-bit AES-CBC tunnel. Meraki Auto VPN leverages elements of modern IPSec (IKEv2, Diffe-Hellman and SHA256) to ensure tunnel confidentiality and integrity. Local subnets specified in the dashboard by admins are exported across the VPN."
Is it really IKE? Because the dashboard has many informations there is no necessity for IKE, I think. And it seems that the MX is speaking to the dashboard for VPN registry (UDP 9350), no direct communication for establishing the tunnel between the two peers. So this statement in the White Paper is confusing.
If Meraki on one side states "Auto VPN leverages elements of modern IPsec", on the other side they use AES-CBC, this doesn't fit together. Besides that, "Diffie-Hellman" is no element of modern IPsec.
That is the reason why I asked.
Best regards
Peter