IPSec VPN with Cisco Meraki VPN Gateway¶
RansNet SD-WAN solutions can establish IPSec VPN tunnels with 3rd-party products using standard IPSec protocols. This interoperability enables hybrid deployments where RansNet branches connect to legacy VPN gateways, allowing multi-vendor networks without vendor lock-in. This document details how to configure IPSec VPN tunnels between RansNet branch routers and Cisco Meraki MX gateway series.
In typical hub-and-spoke deployments, only the hub (Meraki gateway) requires a static public IP address, while remote branches can connect over dynamic broadband, 4G, or 5G. The same configuration patterns apply to other VPN gateway vendors; only the GUI navigation and field names differ.
Note
All RansNet SD-WAN/SD-Branch routers (HSA, UA, CMG series) include both firewall and VPN gateway capabilities, so they can function as either VPN gateways or branch routers. See related documentation for RansNet-to-RansNet VPN setups, and IPSec VPN with Fortinet for similar setup with a Fortinet gateway.
Topology¶
This document uses a hub-and-spoke topology where:
- Hub: Cisco Meraki MX gateway with static public IP acting as the VPN gateway
- Spokes: RansNet branch routers (HSA-520, UA-520, or CMG) connecting over dynamic or static WAN links
- Network connectivity: All branches can reach the hub and each other through encrypted IPSec tunnels
Meraki Gateway Configuration¶
This section covers the required VPN and firewall settings on the Meraki gateway to establish IPSec tunnels with RansNet branch routers. Other Meraki configuration areas (system, interfaces, etc.) are assumed to be preconfigured and are omitted.
Step 1: Configure VPN Network Settings¶
Configure VPN network settings including the LAN subnet range on the Meraki gateway.
Step 2: Configure IPSec VPN Type¶
Configure the IPSec VPN type and general parameters.
Note
- Enable NAT Traversal if the Meraki gateway is behind a firewall with NAT
- Most other parameters can remain at their defaults
Step 3: Configure Non-Meraki VPN Peers¶
Configure Non-Meraki VPN peer settings including: - Name — Identifier for the peer - IKE version — IKE protocol version - Public IP — Remote peer public IP address - Local ID — Local gateway identifier (required if behind NAT) - Private subnets — Remote networks participating in the VPN - Pre-shared secret — Shared authentication key (case sensitive)
Note
If the Meraki gateway is behind a firewall with NAT, the Local ID must be explicitly configured.
Step 4: Configure IPSec Policies¶
Configure IPSec security policies for Phase 1 (IKE) and Phase 2 (IPSec) settings.
Step 5: Configure Firewall Rules¶
Configure firewall rules to permit VPN tunnel traffic and disable NAT for inter-site communications.
RansNet Branch Router Configuration¶
Branch routers can connect over dynamic broadband, 4G/5G, or static IP links. Rather than manually configuring each branch router individually, use the RansNet SD-WAN orchestrator (mfusion) to centrally provision and manage all branch VPN configurations. This approach creates a “dummy VPN gateway” on mfusion that emulates the Meraki settings, allowing mfusion to generate and push configuration to all branches with a few clicks.
Step 1: Provision Branch Routers and Dummy Gateway¶
- Provision all branch routers on mfusion (see Device Provisioning for details)
- Add a dummy VPN gateway to mfusion to emulate the Meraki gateway
Step 2: Create IPSec VPN Instance¶
On the dummy VPN gateway, create an IPSec VPN instance with settings that match the Meraki gateway.
Note
- Gateway IP — The publicly accessible IP address of the Meraki VPN gateway
- Gateway ID — Must match the “Local ID” configured in Meraki Step 3 (required if the gateway IP is NATed)
- Pre-shared Key — Must match the key configured on the Meraki gateway
- Phase I & II Policies — Must match the IKE and IPSec policies on the Meraki gateway
- Gateway Network — Must match the “Local Address” configured on the Meraki gateway
Step 3: Assign Branches to VPN Instance¶
Assign all branch routers to the VPN instance and configure each branch’s local network.
Note
For multiple branch routers, assign them all to the same VPN instance and configure each router’s unique branch network separately. On the Meraki side, ensure you create corresponding VPN peer for each branch router.
Step 4: Apply Configuration¶
Save and apply the configuration from mfusion.
Note
The configuration push to the dummy VPN gateway will fail (expected behavior — the gateway is not real). However, mfusion will successfully generate and push IPSec configuration to all assigned RansNet branch routers. On the Meraki side, ensure you create corresponding VPN peer for each branch router.
Step 5: Configure Firewall Rules on Branches¶
Configure firewall access rules on the branch routers to permit VPN tunnel traffic between the branch LAN and Meraki gateway network.
You can create a firewall template and apply it to all branch routers. Ensure rules permit bidirectional communication between the branch network and Meraki gateway network. NAT is automatically disabled for VPN tunnel networks — no special configuration is required.
Verification¶
Verify that IPSec tunnels are established and configured correctly on RansNet branch routers.
| Items to Test | Command | Expected Outcome |
|---|---|---|
| Routing to VPN gateway | show ip route |
Branch router has a route to the Meraki VPN gateway IP (at minimum, a default route to ISP) |
| IPSec tunnel status | show ipsec status |
IPSec tunnel shows UP status with established IKE and IPSec SAs (Security Associations) |
| Firewall rules | show firewall access-list |
Firewall rules permit bidirectional traffic between branch LAN and Meraki gateway network |
| Connectivity to Meraki | ping <meraki-lan-ip> source <branch-lan-ip> |
Ping succeeds with latency appropriate to internet link |
Troubleshooting¶
| Symptom | Likely Cause | Solution |
|---|---|---|
| IPSec tunnel stays DOWN | IKE negotiation failed; pre-shared key mismatch; firewall blocking UDP 500/4500 | Verify pre-shared key matches on both Meraki and RansNet. Check Meraki IKE logs. Verify firewall permits UDP 500 (IKE) and 4500 (NAT-T) to the Meraki gateway IP. |
| Tunnel UP but no traffic flows | Phase 2 (IPSec) selectors misconfigured; firewall rules blocking traffic; NAT not disabled | Verify Phase 2 selectors on Meraki match branch networks. On RansNet, check firewall rules permit traffic between branch LAN and Meraki network. |
| Partial connectivity (some branches work, others don't) | Phase 2 selectors on Meraki missing for specific branches; remote network configuration mismatch | On Meraki, verify an IPSec selector exists for each branch router. Ensure "Remote Address" on Meraki matches each branch's "Local Network" in mfusion. |
| Intermittent tunnel drops | NAT-T not enabled if gateway behind NAT; firewall timeout on idle tunnels | Enable NAT Traversal on Meraki if gateway is behind NAT. Check firewall doesn't timeout idle IPSec sessions. |
Run show logging system to inspect IPSec negotiation and tunnel state change logs for detailed troubleshooting.
Example IPSec Configuration¶
Below is example CLI configuration generated by mfusion and pushed to a RansNet branch router:
!
ipsec ike-policy 2
authentication psk
policy AES-256 SHA-256 5
!
ipsec esp-policy 2
policy AES-256 SHA-256 5
!
ipsec peer 48.128.58.71
local-id 1c-40-e8-13-cb-8f
local-net 192.168.98.1/24
remote-id merakivpn.cmi
remote-net 192.168.1.0/24
policy ike 2 esp 2
psk Letmein99
!
This configuration:
- Defines IKE and IPSec security policies (AES-256 encryption, SHA-256 hashing)
- Establishes a peer relationship with the Meraki gateway at
48.128.58.71 - Protects traffic between the branch LAN (
192.168.98.1/24) and Meraki gateway network (192.168.1.0/24) - Uses pre-shared key (PSK) authentication with the configured passphrase









