@MDHackett yes, that's what I was originally thinking, downside is that all traffic from the MX64 will get NATed to the IP address on the WAN interface of the MX64, which may not (or may) work for you. That NAT is how the traffic gets back to where it came, but obviously hides all the addresses behind the NAT. You can achieve this without encryption using the No NAT feature (you have to request) support to turn it on, on a per network basis, but then you have to make sure all your routing on the head-end is correct to send data back across the Layer 2 WAN. The other way of achieving this it to use the AutoVPN. Since you already have a firewall with internet access you can set your MX250 up as a VPN concentrator. Establish an IP subnet across the Layer 2 WAN, assign the MX64 WAN port an IP address from the WAN subnet, put a gateway for the WAN subnet at the head-end, and put the MX250 in concentrator mode at the head-end (so you can route to it from the WAN subnet). Then establish AutoVPN between all the MX64 (as spokes) to the MX250 (as a hub). The traffic will then be tunneled across the Layer 2 WAN and won't be NATed. You'll need a route to all the networks sitting behind the MX64s pointing to the MX250 (the MX250 will learn all the remote subnets through AutoVPN), and the MX250 will need a default route to the rest of your network. (You could also do the head-end routing with OSPF or BGP if you've a neighbor to peer with). Essentially you are doing this, https://documentation.meraki.com/MX/Deployment_Guides/VPN_Concentrator_Deployment_Guide, but with the Layer 2 network in place of the Internet. You just need to ensure that there is a path from the MX64 WAN IP address to the internet so they register with the Meraki cloud. This would, be via the existing firewall.
... View more