So If I have understood you correctly, the IPSec VPN (non-meraki VPN) created on the MX portal is ok, and it will work for all the other site and not only for site A, BUT I need more tunnels on Azure in order to reach every site behind MXs, f.ex. one tunnel on MX portal pointing on Azure, then on Azure two tunnels pointing on the public IP addresses of Site A and Site B MXs? The VPN clients gets IPs from this range 192.168.20.0/24 and I have added this on the non-meraki IPSec VPN on MX portal under private subnet and it is working as I mentioned before to reach the resources attached behind the MX on site A (probably because the azure engineer has created the IPSec tunnel pointing only to the public IP address of the site A)! Does that mean that the tunnel in Azure is only pointing on the MX which is located on site A, and I should ask to create another tunnel on azure to point on the site C also? You mentioned that I have to include the subnets at each MX site in the VPN? I don´t understand this, where I should include these? Which settings should I look for in order to includes these?
... View more