The Meraki Community
Register or Sign in
cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Show  only  | Search instead for 
Did you mean: 
  • About MGregC
MGregC

MGregC

Conversationalist

Member since Dec 5, 2022

‎12-08-2022
Kudos given to
User Count
JustinBennett
JustinBennett
1
alemabrahao
Kind of a big deal alemabrahao
1
View All

Community Record

3
Posts
0
Kudos
0
Solutions

Badges

Lift-Off View All
Latest Contributions by MGregC
  • Topics MGregC has Participated In
  • Latest Contributions by MGregC

Re: remote VPN clients not showing correctly in terminal server

by MGregC in Security / SD-WAN
‎12-07-2022 04:30 AM
‎12-07-2022 04:30 AM
Sorry for the confusion.    When I say remote clients I mean they are connected to an MX on the other end of the Meraki AutoVPN. They are not using L2TP or AnyConnect. ... View more

remote VPN clients not showing correctly in terminal server

by MGregC in Security / SD-WAN
‎12-06-2022 12:50 PM
‎12-06-2022 12:50 PM
We use MS 2019 terminal servers and have remote locations connecting via MX' to the data center where the TS live. Clients on the other end of the VPN show as coming from the WAN IP of the hub MX at the data center. We are tracking clients by their IP address given the non-Meraki parts of our infrastructure.   Is there something on the Meraki side that will present the correct IP of the remote client--192.168.x.x, etc? ... View more
Labels:
  • Labels:
  • Auto VPN

Re: Meraki MX250 to Palo alto

by MGregC in Security / SD-WAN
‎12-06-2022 12:46 PM
‎12-06-2022 12:46 PM
I've done this with no issues.   Set up the "Non-Meraki VPN peers" on the Meraki. Use the paramters you need. Enable the Meraki subnets you want in the tunnel and save. Then go to the Palo, create an IKE profile that matches the choices from the Meraki. Do the same for IPSec profile. Create an IKE Gateway on the Palo using the same autheneticated method, we used PSK.   Create the IPSec Tunnel and use Proxy IDs to match up subnet on the Meraki to a subnet on the Palo. Just like configuring an ASA, these have to match the Palo and the Meraki.   Then put in routes in the Palo router for the traffic.    Finally create Security Policies to allow the tunnel to be created (outside interface to outside interface) and then a policies for the traffic to pass.   Pay attention to the IKE, IPSec, PSK, subnets and Proxy IDs and you should have no trouble. ... View more
Kudos given to
User Count
JustinBennett
JustinBennett
1
alemabrahao
Kind of a big deal alemabrahao
1
View All
Powered by Khoros
custom.footer.
  • Community Guidelines
  • Cisco Privacy
  • Khoros Privacy
  • Cookies
  • Terms of Use
© 2023 Meraki