I did this yesterday. We have an Meraki vMX in Azure. We couldnt detach the Basic IP from it since it was locked. It was deployed about 2,5 years ago. We have a Site 2 Site from Azure vMX to onprem Meraki and also from Azure vMX to onsite Fortigate. And we also use AnyConnect for User VPN. Here is what we did. Remove appliance from Network in Meraki Dashboard. Then we was able to add vMX in the same Network. We added it. Create vMX in Azure, put it in the same Subnet as the old one. It got a new internal IP from that Subnet. In Azure change the Route Table so that Next Hop IP Address points to the new IP-address of the vMX. Activate Hub in Site 2 Site VPN in Meraki Dashboard for the Meraki vMX. Create an NSG in Azure for the vMX. Created two Inbound Rules. RULE 1 for Site 2 Site with Fortigate: Source: Any (or public ip in Fortigate site) Source port ranges: * Destination: IP Addresses Destination IP addresses/CIDR ranges: The vMX internal IP Address Service: Custom Destination port ranges: 500,4500 Protocol: UDP Action: Allow Priority: 100 RULE 2 for AnyConnect: Source: Any Source port ranges: * Destination: IP Addresses Destination IP addresses/CIDR ranges: The vMX internal IP Address Service: HTTPS Destination port ranges: 443 Protocol: TCP Action: Allow Priority: 110 The vMX had the same DNS-name in Meraki Dashboard as before. Deleted the old Managed Application in Azure. Thats pretty much all.
... View more