Hi All, i wanted to share a problem that i'm having with my VPN setup in my company. The VPN as such works without any issues. So I have enabled the VPN in the Cisco meraki dashboard, and am using the IP range ( for eg: 172.16.150.0) as specified in the dashboard settings, and using AD to authenticate users . Using the windows L2TP protocol on the windows 10 client, with split tunneling and all configured, and working properly. No problems. I checked the route print, and split tunneling working as supposed. I’m able to ping from vpn client to any other internal LAN clients using hostname. Also can open UNC path from VPN client to my company servers via hostname and stuff. No issues. However I’m not able to ping from an internal LAN client device to the vpn client using hostname. I can ping using IP address though, and able to UNC into the vpn client using the VPN ip for example, \\172.16.150.10\C$. All working with IP from internal client to VPN client, and the VPN client is reaching all internal servers/workstations etc via hostname. How is it possible to ping the vpn client device from the internal company LAN using hostname?. Is this because the IP range configured in the cisco meraki dashboard is completely different from my internal LAN subnet (For eg: 172.16.0.0) . I assume so. If so, how do I add my VPN subnet to my DHCP server or Cisco meraki portal, so that the internal clients can talk to it using hostname. My main reason for doing this is because my RMM solution that we use does not detect the vpn client devices as online , once they become external or are VPN connected is what i mean. for eg: suppose, Computer A is connected to the internal LAN from our buildings, and so is getting an internal LAN IP from our DHCP server. Then our RMM software has no problem detecting the machine as online. And I can remote into them to help users having IT issues. However when the same computer moves out of the internal LAN network( in this case the user is working from home). So the user connects to the Windows built in VPN. They enter their AD credentials and connect to VPN successfully. And Meraki allocates the client an IP from the 172.16.150 subnet. All good. They are able to have access to the Shared drives/Outlook and everything else as if they are working from the office. All good there as well. So the user is fine from a work stand point. But when the user is working from home, I’m not able to use our RMM tool to remote connect to the vpn connected computer A, if the user needs some IT help, because the IP used via VPN is not our internal IP. Where or how can I make my RMM tool recognize that the VPN client is online and make VPN subnet recognizable, with internal LAN IP range . Is this done via a static route from the client side, or should I add something in the scope options of my DHCP server, or should I add the VPN subnet with some settings in the meraki dashboard ? I’m kinda confused on how I can make this happen Please help!!
... View more