Skip to main content
Cisco Meraki

Netskope Integration Overview

Netskope Integration Overview

Netskope delivers a modem cloud security stack with unifies capabilities for data and threat protection. Nextskope can act as a secure web gateway where 0.0.0.0/0 traffic will be routed for inspection and enforcement prior to internet termination.

This document describes how to configure Netskope IPsec peers with the Meraki security appliance (MX/Z platforms).

Prerequisites Edit section

  • Netskope account 

  • Meraki MX/Z device (running MX17+ firmware)

  • Meraki MX/Z Site-to-site VPN enabled

Netskope Configuration

  1. Log into your Netskope tenant

  2. Click on Setting at the bottom left corner of the page.

  3. Click on Security Cloud Platform on the left pane, then IPsec


     

  4. Add New Tunnel 
    Below I have added the User FQDN for our Atlanta Office as the Source Identity. We also selected a POP in Atlanta as primary and Miami as Backup

 

Note: Netskope preconfigures ciphers and supports a variety of Crypto ciphers linked on the IPsec configuration page. All that is needed is to ensure our Meraki site configuration aligns with supported cipher defaults on Netskope.  

  1. Save your configuration

 
Enable Meraki site-to-site VPN
Edit section

On the Meraki Network, Navigate to Site-to-site VPN settings through the Security & SD-WAN > Configure > Site-to-site VPN page.