SASE - Configuring Meraki vMX (AWS) Site to Site VPN with MX67W - SDWAN

แชร์
ฝัง

ความคิดเห็น • 15

  • @mcorona09
    @mcorona09 ปีที่แล้ว

    Very helpful video! Helped me when i got stuck in a rut. Appreciate your work!

  • @movingpictures2378
    @movingpictures2378 ปีที่แล้ว

    This is a great video. Thank you very much!!!!

  • @jaymarcotte494
    @jaymarcotte494 ปีที่แล้ว

    Great video this helped me setup the environment for basic traffic, my question is how do you configure the Environment to have ALL traffic passthrough the Meraki? Inbound and outbound.
    I would like the Meraki to manage inbound firewall filtering if possible. Or is this Meraki only for VPN management?

    • @dracocybersecurity
      @dracocybersecurity  ปีที่แล้ว

      Thanks, Meraki vMX in the cloud only function as a One-Arm VPN Concentrator. If you need VPN and Firewall capabilities in AWS. You can check out the Cisco Firewall that is available in the Cloud Market place.
      For your on-prem Meraki MX it is both a firewall as well as a VPN Server.

  • @germanglopez
    @germanglopez ปีที่แล้ว

    Thank you for your detailed presentation. Issue I am having is SSH from AWS SSH server cannot connect to SSH server at client side via VPN. It times out.

    • @dracocybersecurity
      @dracocybersecurity  ปีที่แล้ว

      For a start I will check if the SSH Server is routing the traffic through the VPN Tunnel.

  • @mopikozz
    @mopikozz ปีที่แล้ว

    Thanks for the Guide! Detailed & precise
    Any idea if it works by not using AutoVPN but standard non-meraki ipsec across to AWS?
    Reason being, both our branch Mx and vMx belongs to diff organization account...can't do autoVPN

    • @dracocybersecurity
      @dracocybersecurity  ปีที่แล้ว

      It should work with the standard IPSec config. as long as the crypto and protocol is supported have not done with AWS but did a standard IPsec with oracle cloud before. the tricky part is getting the protocol to match and then the routing. let us know if u manage to get it working with AWS.

    • @trininox
      @trininox ปีที่แล้ว +1

      You may want to get an Elastic IP to use with the vMX for its Public IP so it doesn't ever change and break your IPsec tunnel.

    • @davidtq8723
      @davidtq8723 ปีที่แล้ว

      It's not going to work for what you need. IPSEC tunnels on regular site to site can only recognize and pass traffic for one subnet to AWS from Meraki. I think this has something to do w/Meraki being policy based instead of route based site to site. You'd be much better off merging sites into the same org. Contact support for help.

  • @ankitmagan
    @ankitmagan ปีที่แล้ว

    Great Video!!
    One question here.
    Would we be able to configure /16 (10.111.0.0/16) as the local subnet on the vMX instead of 10.111.10/24? This is because you would want your entire AWS network reachable from the remote sites.

    • @dracocybersecurity
      @dracocybersecurity  ปีที่แล้ว +1

      It is possible to expand the subnet to /16. You do have to determine how the existing AWS routing works as well. But if it is simple inclusion on the subnet in a single LAN then it should be fine.

    • @ankitmagan
      @ankitmagan ปีที่แล้ว

      Will really appreciate if you can make a video spinning two virtual MX in AWS depicting High Availability