Home > Security Appliances > Deployment Guides > Branch Network Setup

Branch Network Setup

This section provides additional information on how to configure MX security appliances as the Internet gateways for branch locations.

Example topology

In this example, there are three remote locations that use MX60 devices. The devices are connected to HQ by means of a Meraki site-to-site VPN.

Branch WAN and LAN settings

First, you need to make sure that the appliance can connect to the Internet and access the Meraki Dashboard. Once this is done, you can use the Dashboard to set the subnet range and DHCP settings, as well as to assign fixed IP addresses to devices such as printers and access points within the branches.

Here are the WAN and LAN settings for the Branch #1:

  1. Connect the appliance to the DSL or cable modem through the modem's Ethernet output.
  2. Set the MX series WAN IP address and DNS settings, with the following two options
    1. You can let the device negotiate these settings with the local ISP automatically through DHCP.
    2. Alternatively, if your ISP has provided you with a static IP address and DNS settings, you can enter them manually. (For more on how to set the device WAN IP address, refer to the appropriate installation guide for your MX series device.)
  3. Login to your Dashboard account at https://dashboard.meraki.com.
  4. To verify that the device is accessible in the Dashboard, choose Security Appliance > Monitor > Appliance status.
  5. Assign a subnet for each branch:
    1. Choose Security Appliance > Configure > Addressing & VLANs.
    2. Choose Mode > NAT.
    3. Choose whether you want a single LAN or multiple VLANS through Routing > VLANs.
    4. Enter the local subnet scope in CIDR notation in Local subnet field. For example, if your subnet is from 192.168.11.1 to 192.168.11.254, you'll need to enter the following information in the Local subnet field: 192.168.11.0/24.

    5. Enter the MX LAN IP (for example, 192.168.11.1). This sets the IP address of the MX device on this LAN.
  6. Choose your DHCP option.
    1. For locations with a third-party DHCP server (such as a Microsoft Windows server that serves as the local domain controller):
      1. Choose Security Appliance > Configure > DHCP.
      2. Choose Do not respond to DHCP requests.
    2. For locations, where you'd like the MX to provide DHCP services:
      1. Choose Security Appliance > Configure > DHCP.
      2. Choose Run a DHCP server.
  7. Connect a laptop to one of the LAN ports of the MX, and then make sure that you have Internet access and that you are getting an IP address within the subnet field you have assigned.

 

If you are using the DHCP service on the MX series, you can reserve IP addresses for devices such as printers and APs by adding fixed IP assignments (see Fixed IP assignments on the Security Appliance > Configure > DHCP page).

In NAT mode, the MX series is the default gateway on the LAN/VLANs that you've created above. If you are going to connect branches through a site-to-site VPN connection, each network must have a different (non-overlapping) subnet.

Site-to-site VPN

Traditional site-to-site VPN

Although there are a variety of solutions for site-to-site VPN connection, all peering devices need the following information:

  • Preshared key (PSK) or certificate
  • Public IP addresses of other peer devices
  • NATed subnets behind the peer devices
  • VPN phase1 and phase2 parameters to ensure matching encoding and various other settings

Based on the information above, peer devices establish the VPN tunnel through the following:

  • Connecting to each other directly
  • Jointly negotiating VPN phase1 and phase2 offers
  • Adding one or several routes to their route maps to reach the other peer's NATed subnets through the VPN interface

Meraki site-to-site VPN is different

Traditionally, most of the steps above are manual and therefore are prone to user errors (such as mistyped subnet information or nonmatching VPN configs). MX devices are different. They are all connected to the Dashboard and they each use Dashboard to help broker VPN connections to their peer networks in a given organization, as follows:

  • Each MX device constantly advertises its public IP address and its NATed subnets to the Dashboard.
  • When VPN is enabled, VPN peers automatically contact each other and initiate an IPSec VPN connection.
  • The Dashboard assigns a unique preshared key for all participating VPN peers.
  • Finally, the Dashboard sends a globally adjusted route map to each device, so that they all know how to reach each other's NATed subnets.

The end result of this automated process is a site-to-site VPN that is always up-to-date, dynamically adjusting to any changes in the network and that is up and running with a single click.

While the Meraki VPN solution uses the power of the Dashboard during the setup and control of the VPN, the actual VPN traffic never flows through the cloud, but instead travels directly between peered VPN devices.

Setting up site-to-site VPN with Meraki MX devices

Creating a site-to-site VPN tunnel to the HQ from branches is simple:

  1. Choose Security Appliance > Configure > Site-to-site VPN.
  2. Choose Hub from the VPN type options.
  3. Choose 'Yes' for Use VPN for the local subnets that should be available on the VPN.
  4. Choose Automatic from the NAT traversal options.

You are done!

You must to post a comment.
Last modified
11:00, 21 Aug 2017

Tags

Classifications

This page has no classifications.

Explore Meraki

You can find out more about Cisco Meraki on our main site, including information on products, contacting sales and finding a vendor.

Explore Meraki

Contact Support

Most questions can be answered by reviewing our documentation, but if you need more help, Cisco Meraki Support is ready to work with you.

Open a Case

Ask the Community

In the Meraki Community, you can keep track of the latest announcements, find answers provided by fellow Meraki users and ask questions of your own.

Visit the Community