Skip to main content

 

Cisco Meraki Documentation

vMX Setup Guide for ESXI

Overview 

This document is a walkthrough for setting up a virtual MX (vMX) appliance ESXI/VMware After completing the steps outlined in this document, you will have a virtual MX appliance running on ESXI that serves as a Secure Gateway and Auto VPN termination point for your physical MX devices. 

Meraki Dashboard Configuration 

Begin by creating a new Security Appliance network in your organization. If needed, please refer to the guide on creating a new network in the Meraki dashboard. 

  

1. Add license(s) to the Meraki dashboard 

To complete the vMX Meraki dashboard configuration, a vMX license must be available for use in your organization. 

If your organization has already reached its vMX license limit, you will be unable to create new vMX networks until a vMX network is deleted, or additional vMX licensing added. 

If you do not have access to a vMX license or require additional vMX licenses, please reach out to your Meraki reseller or sales representative. 

  

2. Create a "Security appliance" network type:  

  

 

  

  

  

3. Assign vMX type to network 

Once you have created the "Security appliance" network and added the appropriate license you will be able to deploy a new vMX to your network by clicking on the 'Add vMX' button. 

  

 

  

4. Generate the authentication token 

Before generating the token, please verify the firmware is configured for MX 26.1.2 or higher. If the vMX network firmware is set to anything below that, the upgrade will not occur. 

After you add the new vMX to your network, navigate to Security & SD-WAN > Monitor > Appliance status and select “Generate authentication token” to generate the token to be entered on VMware ESXI as a CD-ROM in later steps 

NOTE: Generate Authentication Token button on the left pane, under CONFIG and above "Remove Appliance From Network" 

  

5. Copy the newly generated token and save it for later.  

The newly generated token will be provided as a CD-ROM when deploying an instance.  

The authentication token must be entered into the instance and used to connect to the Dashboard within one hour of generating it, otherwise a new token must be generated.  

Obtaining the image 

The vMX image for ESXI can be obtained via the Cisco Downloads site. The link below will take you there: 

https://software.cisco.com/download/beta/1970167153

Once the VMDK file has been downloaded and unzipped it will need to be converted to be compatible with VMware. The following commands can be run in the VMware console to convert the file: 

$: vmkfstools -i [vmx_vmdk_file_name]_raw.vmdk [vmx_vmdk_file_name]_converted.vmdk  

This converted.vmdk file will be used to replace the hard disk in the later deployment steps. 

An additional VMDK file with "-flat" in the name will be created during this process. If the converted VMDK is ever moved to a different directory, ensure that the -flat VMDK is moved with it. 

Recommended vMX Sizing 

Below are the recommended resource allocations for each vMX: 

 

Cores 

Memory 

VMX-S 

4 GB 

VMX-M 

4 GB 

VMX-L 

4+  

8+ GB 

 

NOTE: When the image is imported as a disk in the ESXi environment, the command will auto-allocate the storage as follows:  

  • EFI: 6 GB 

The above allocation is fixed and cannot be changed 

ESXi Pre-Requisites 

Before deploying, ensure that you are running ESXi 6.7 or higher.  

ESXI Deployment 

This section will walk you through configuring the necessary requirements within an ESXi Hypervisor and adding a vMX instance to your server. For a guide on setting up ESXi itself we recommend their documentation on how to do so.  

 

Create ISO file with vmx_authentication_token 

1. Using the Authentication token you generated for your vMX in the previous section, create a user-data file on your local machine.  

echo "token <token value>" > user-data 

2. Create an ISO file with the user-data file. 

mkisofs -output <ISO file name>.iso -volid cidata -joliet -rock user-data 

NOTE: The vmx-authentication-token expires within an hour of generation. Please deploy the vmx within that time. 

3. Then upload the ISO and the VMDK file for the vMX to the ESXI Server Datastore.   

 

Create the VM  

Step 1: Click the button to create a VM. Select "Create a new VM" and configure the following: 

  • Name for the VM
  • Guest OS Family: Other
  • Guest OS Version: Other (64-bit)

 

Step 2: Select the desired datastore and click next

Step 3: Perform the following operations:

  • Select the CPU and Memory based on the recommended sizes from earlier in this document (The settings shown in the screenshot are for a vMX-L)
  • Remove the default Hard Disk
  • Select the desired network adapter. If you intend to run the vMX in Routed Mode, we recommend adding an additional Network Adapter for the LAN interface. 
  • CD/DVD Drive: Attach the ISO you created previously and change the controller location to Sata Controller 0 if it is not already set by default

 

Caution: Do not put the LAN and WAN port on the same network. 

Step 4: Go to the VM Options tab and expand the Boot Options section. The Firmware option should be changed to EFI if it is not already selected. Once complete, go back to the Virtual Hardware tab. 

NOTE: If Secure Boot is desired and your server has Secure Boot capabilities, check the box for "Enable UEFI secure boot". 

clipboard_eb15dfefa791417e08f79274aa511d615.png

Step 5: Click the button to add a Hard Disk 

  • Select the "Existing Hard Disk" option  
  • Select the converted VMDK from your Datastore
  • Set the Hard Disk Controller type to SATA controler 0 if it is not already by default
     

Step 6: Click Next and Finish. On a successful boot without secure boot, the VM Console show the vMX Boot Splash similar to what is shown below. 
 clipboard_eb95c608b0686f0a4da9388a55df0a882.png

The vMX should then receive an IP address on its WAN interface via DHCP, and reach out to Dashboard. The vMX should show as online within around 5 minutes after the boot is complete.  

  • Was this article helpful?