The Meraki Community
Register or Sign in
cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Show  only  | Search instead for 
Did you mean: 
  • About vpseg
vpseg

vpseg

Just browsing

Member since Feb 17, 2022

‎03-30-2022

Community Record

3
Posts
0
Kudos
0
Solutions
Latest Contributions by vpseg
  • Topics vpseg has Participated In
  • Latest Contributions by vpseg

Re: Meraki Site-to-Site VPN Setup for Multiple Networks

by vpseg in Security / SD-WAN
‎03-30-2022 06:19 AM
‎03-30-2022 06:19 AM
Bumping this topic. ... View more

Re: Meraki Site-to-Site VPN Setup for Multiple Networks

by vpseg in Security / SD-WAN
‎02-21-2022 12:54 PM
‎02-21-2022 12:54 PM
There are protected servers at both corp and the branch. They should be totally separate from the users. If I need a user to ever reach a protected server, I'd like to configure that in the ASA. The protected servers at the branch should be able to talk directly to those at corp. The users in both corp and the branch should be able to route via the ASA to reach DMZ servers (which also shouldn't be able to reach protected servers). ... View more

Meraki Site-to-Site VPN Setup for Multiple Networks

by vpseg in Security / SD-WAN
‎02-18-2022 12:50 PM
‎02-18-2022 12:50 PM
Network Layout   I am managing the above network, which consists of a corporate office and one branch. The branch is connected to the internet via an MX67 in routed mode, configured as a S2S VPN Spoke with automatic NAT traversal. It currently only has users, so it is in Single LAN mode.   The corporate network is behind a Cisco ASA. All the networks in the corporate office are L2 up to the ASA. The MX84 currently has a P2P link to the ASA over its own VLAN. This MX84 is in passthrough / VPN concentrator mode, with the S2S VPN set as a hub and NAT traversal as automatic.   At this time, users in the branch office can reach the DMZ in the corporate office over the S2S VPN, via the MX67 and then the ASA, as they should. The goal is to add the protected servers network to the branch office, and let it reach the already-existing protected servers VLAN in the corporate office. This network is on its own VLAN (1000) and no other networks should be able to reach it unless permitted by the ASA.   Users in the branch should continue to be able to reach the DMZ at corporate, as well as the internet via split-tunnel configuration already present in the S2S configuration.   I think I'll need to continue with the MX67 as gateway for the branch. I assume I'll need to change it to have multiple VLANs, one for users and one to match the protected servers VLAN at corporate. Then, can I just trunk those VLANs from the ASA to the MX84? What should my configuration look like for the MX's? Finally, when I'm making these changes, is it possible to break the Meraki configurations from the dashboard enough to lose connectivity to the firewalls (and if this happens, how can I revert)?   The networks shown are not accurate to the network in reality, and there are multiple networks on each side that will need this configuration. Thank you. ... View more
Labels:
  • Labels:
  • Auto VPN
Powered by Khoros
custom.footer.
  • Community Guidelines
  • Cisco Privacy
  • Khoros Privacy
  • Privacy Settings
  • Terms of Use
© 2023 Meraki