Hello All,
Good Day. Need your help with below setup...
my client has 2 separate entities as below in network term.
organization A = 35 spoke Meraki sites with Physical Hub MX250 * 2
organization B = 30 spoke meraki sites with Physical Hub MX250 * 2
client is moving DC services to Azure and has built vWAN hub. Has asked me to spin up 2xvMX per organization in Azure. Requirement is to bring up those vMX, setup peering with vWAN Hub, introduce that as 3rd and 4th Hub in respective organization, spoke should use those newly introduced but less preferred hub in case any azure subnet needs to be accessed, there will be a time when physical hub will be removed once full data is migrated to azure. Both organization (A & B) will connect to same vWAN hub however both organizations are not supposed to talk to each other or share any server/app resources at all.
Right now I am just focussing on Organization A.
Client team gave me /24 VNET dedicated to SDWAN and subnetted it further to /28 for 2*VMX deployment. reserved further IP for future requirement if may.
I deployed vMX and can see those online in dashboard as well, received public IP (Seems this is Natted IP, correct?) anyways bringing up vMX seemed to be really the easiest part. Now trouble starts from here. Client does not want me to setup eBGP peering between vWAN hub and vMX but deploy S2S VPN (Non-Meraki VPN Peer) between vMX and VPN GW attached to vWAN Hub.
1. I have setup vMX in passthrough mode.
2. I have configured local subnet as /24 VNET dedicated to SDWAN
3. I have configured public IP of VPN GW, then configured private subnets inclusive of test service subnets, vWAN Hub subnet.
4. I have also configured IPSEC policies to match with Azure VPN GW.
More or less similar things are done from VPN GW side, Client has configured WAN IP of vMX as remote IP and SDWAN /24 subnet as private IP...
Below IPSEC policies are configured on both sides...
Phase 1
Encryption - AES256
Authentication - SHA256
PSUEDO-RANDOM - DEFAULTS TO AUTHENTICATION
DH - 14
LIFETIME - 27000
Phase 2
Encryption - AES256
Authentication - SHA256
Pfs Group - Off
Lifetime - 45
Now no matter what I do, VPN fails. It keeps showing red signal in front of vpn peer. I ran packet capture and I was surprised to see no activity related to S2S, no attempt to setup tunnel, any initiation or failure is observed. Its complete radio silence as long as S2S is concerned. Not sure why is that? I tried to generate ICMP traffic between two vnets by creating test VNET in the hope IPSEC will try to ride on that interesting traffic but no.
One thing on azure side - no route table is configured - per client it is not required. .
What could be going wrong here? Why there is no attempt from Meraki to even initiate IPSEC tunnel ? Any guesses guys ?
1. Is setting up S2S good idea here? I was told BGP is not possible with single vWAN for multiple organizations and soon there will be 2 more organizations may get acquired.
2. Or you think setting up BGP peering is good idea and that way can get rid of S2S and also easy for spokes to learn routes? Do you think vWAN can form neighborship with all different vMX ? Should I assign ASN per vMX or ASP per Org and peer it with vWAN ?
3. If anyhow S2S setup works, how do I let Meraki branches know about azure service subnets? How can those branches reach out to vMX, go through IPSEC and land on azure. I was reading any subnets learned from Non Meraki Peer wont be advertised via AutoVPN.
4. Regarding IPSEC not coming up - Can there be anything wrong with resource groups ? I have both VMX deployed under different RG ? I was reading somewhere it can be a challenge may be but was unable to understand.
5. Can VNET to VNET peering work here and take out the need to have IPSEC tunnel between vMX and VPN GW ? In that case should I ask client to peer vWAN Hub VNET and SDWAN VNET? How about incoming/outgoing route filtering as multiple organizations SDWAN VNET will come in the picture? Can route table/network intent be able to separate traffic ?
6. I see nothing in logs but couple of events like " Non-Meraki VPN negotiation msg: FIPS mode disabled " what does it mean ? Anything wrong with IPSEC policies here?
Obviously ran into CISCO TAC and not having enough guidance so far. I hope I was able to explain my query... Any help would be really really appreciated.