Netskope Integration Overview
Netskope Integration Overview
Netskope delivers a modem cloud security stack with unifies capabilities for data and threat protection. Nextskope can act as a secure web gateway where 0.0.0.0/0 traffic will be routed for inspection and enforcement prior to internet termination.
This document describes how to configure Netskope IPsec peers with the Meraki security appliance (MX/Z platforms).
Prerequisites
-
Netskope account
-
Meraki MX/Z device (running MX17+ firmware)
-
Meraki MX/Z Site-to-site VPN enabled
Netskope Configuration
-
Log into your Netskope tenant
-
Click on Setting at the bottom left corner of the page.
-
Click on Security Cloud Platform on the left pane, then IPsec
-
Add New Tunnel
Below I have added the User FQDN for our Atlanta Office as the Source Identity. We also selected a POP in Atlanta as primary and Miami as Backup
Note: Netskope preconfigures ciphers and supports a variety of Crypto ciphers linked on the IPsec configuration page. All that is needed is to ensure our Meraki site configuration aligns with supported cipher defaults on Netskope.
-
Save your configuration
Enable Meraki site-to-site VPN
On the Meraki Network, Navigate to Site-to-site VPN settings through the Security & SD-WAN > Configure > Site-to-site VPN page.