Just a FYI to everyone, I have been having issues with 3rd party VPNs since 18.x code. I am on the latest 19.x code for all devices in question. I even split them to 19.x code and remotes 18.x code etc. for testing purposes. I have spent about 40 hours with support working on this specific issue. A little background, head end is a MX95, and remotes are MX67/MX68, so all Meraki just in different orgs hence the 3rd party vpn setup. The first tunnel that comes up works fine. When the second tunnel tries to come up, the initial udp/500 packet works on the proper primary uplink, but return traffic gets send out WAN2 and the tunnel never comes up. Now on 19x code, it just stops working all together even with one tunnel. We went through all 18.x versions and then 19 with the issue still present. I have had a ticket open for months on this, but the workaround was to disable multi-core support. However I figured out a month later that was adding latency of 2-4 ms to ALL connections, and limited the WAN2 speeds by 60-70% on throughput. This was causing major issues. Recently I had to get that workaround removed, and latency and speeds returned to normal. However the 3rd party VPN issue cropped back up again. Looking at the logs, the VPN inst even trying to come up. It just stops working at all randomly. Rebooting the head-end seems to fix it until the next re-key, ISP issue etc. All VPN settings are correct, and it worked 100% fine with multi-core disabled other than the issues I stated above. AMP/IPS isn't working (I think) as I never get any alerts while active/prevention. If I disable AMP and set IPS to detection, I start seeing alerts again. There is nothing in the event logs showing any issues. I have to say im shocked that basic functionality of MXs are not even working correctly over multiple major release versions. It seems like (since 2017 when I started using them) major/core features are not working correctly, or problems with code causing issues etc. This inst a rant at all, and I know each vendor has their own problems, but these are basic components of a "firewall" esp a stripped feature/functionality one that costs a premium to use. Has anyone else had similar issues like this, or is just me that is lucky to find problems with every release? I ended up having to move the devices from their own org into the org with the head-end to use auto vpn which magically works great. That presents its own problems with licensing, subnet allocation etc. It now takes congress/CEO level approval to move devices from Co-term to PDL as they are pushing subscription licensing model on everyone now. PDL is no longer possible and is being phased out. It took over an hour of approvals from AM, Licensing management team just to move the license, which all stemmed from the 3rd party vpns not working. Had this not been a known issue, they would have denied it and it wouldn't have worked at all.
... View more