This article will help you establish a site-to-site IPsec connection between Timus Networks and Cisco Meraki.
Step 1: Access the VPN Configuration
Navigate to:
Security & SD-WAN > Configure > Site-to-site VPN
Click Add a peer to begin setting up the connection.
Step 2: Add Peer Details
-
Name:
IPsec Tunnel to Timus
-
IKE Version:
IKEv1
-
Public IP or Hostname:
Timus Gateway Public IP
-
Remote ID:
Timus Gateway Public IP
-
Shared Secret Key:
Your Pre-shared Key
-
Routing:
Static
Step 3: Define Subnets and Availability
-
Private Subnets:
192.168.249.0/24
-
Availability:
All Networks
Phase 1 Configuration:
-
Encryption:
AES256
-
Authentication:
SHA256
-
Diffie-Hellman Group:
2
-
Lifetime:
28800 seconds
Phase 2 Configuration:
-
Encryption:
AES256
-
Authentication:
SHA256
-
PFS Group:
Disabled
-
Lifetime:
3600 seconds
Step 5: Enable Local Subnet for Tunnel
Ensure the local LAN you want to share over the tunnel is Enabled:
-
Example LAN:
10.105.0.0/23
Timus Configuration for Meraki Firewall:
- Go to the Timus Manager -> Sites -> Create New. Please note that you need to have a gateway to be able to create an IPsec tunnel (Connector).
- After clicking on Create New, you need to select Connector on top and enter an IPsec tunnel name.
Parameters:
- Note - You now have the option to select "Create firewall rules automatically".
Miscellaneous:
- To enable Dead Peer Detection (DPD) is highly recommended. Once the IPsec tunnel gets disconnected for any reason, it will automatically reconnect.
- After configuring the Phase 1 IKE configuration, click Save.
- Then expand the gateway using the arrow, click the three dots, and select View.
- On the View page, click Create New Tunnel to configure Phase 2 for IPsec.
Phase 2 configuration of Timus:
- Note - You now have the option to select "Create firewall rules automatically".
- After configuring Phase 2, click Save.
0 comments
Please sign in to leave a comment.