Hello All! Thank you for taking the time to read this. I am having an issue with once connected to vMX in Azure using the Client VPN - I cannot get a ping response to the vMX100 in Azure First off - I have searched the entire breadth of the internet to try spot if I am missing something, but I just cannot find it - I also have a case open with Meraki which has been open for sometime without resolution. Therefore, I would be extremely grateful for any ideas / guidance. ------------------------------------------------------------------------------------------------ I have deployed a VMX100 into Azure using the CSP work around. - Shows online with Public IP in Meraki Dashboard. My vMX100 has its own dedicated VNET (Meraki-LAN) and Subnet dedicated to the vMX100 My Servers have their own VNET (Server-LAN) and Subnet (Peeing between the vMX VNET and my Server VNET With IP Forwarded Traffic on the Peering from meraki to Servers VNET) I have enabled Client VPN in the Meraki Dashboard. Azure VMX100: - VNET = 10.140.1.0/24 || Subnet = 10.140.1.0/24 (vMX gets IP of: 10.140.1.4) Meraki Dashboard Client VPN - 10.140.2.0/24 Servers: - VNET = 10.140.8.0/21 || Subnet = 10.140.8.0/24 ----------------------------------------------------------------------------------------------- Once the above was setup (Before I added any route table anywhere) I thought a good first test would be to Connect to the vMX100 using the Client VPN and Ping the vMX100's Local IP. I used Meraki Authentication, and connect to the VPN, it prompts me for username and password, and it then connects - I get a IP that I would expect. 10.140.2.86 - However, When I try to ping the Meraki (10.140.1.4) I do not get a response. I cannot work out why or how to resolve this. 😞 I also enabled Split Tunnelling (Just un-ticking a box in the IPV4 Advance settings on thje VPN NIC) (Windows 10) ------------------------------------------------------------------------------------------------ I guess after I have successfully got the device to ping with my local device I can then deploy a Route Table with the Client VPN route and the Servers Subnet in the table. Until then I am just trying to get the first part to work. Many thanks Adam
... View more