How do I connect my Meraki client VPN?

If you’re a Meraki administrator, you can connect your Meraki client VPN in a few different ways. Below, we’ll outline how to connect using the Meraki dashboard, Windows, and Mac.

Connecting on the Meraki Dashboard

1. Log in to the Meraki Dashboard and navigate to Security appliance > Site-to-site VPN.
2. Under ClientRemote address(es), add the public IP addresses or hostnames of any clients that will be connecting to this VPN. Add one address per line.
3. Click Save changesat the bottom of the page.

You can now use your client’s public IP addresses/hostnames to connect to the VPN! If you want more fine-tuned control over who can connect and when, see below for instructions on adding firewall rules. Adding Firewall Rules (Optional) By default, anyone with your Client VPN subnet’s range will be able to attempt a connection once they have authenticated with a valid username and password However, you may want some users to be always allowed while others must request access (like with an Austin Ping). Or maybe you only want certain devices connected at certain times of day To add these types of rules: Navigate to Security appliance > Configure > Firewall rulesand click Add a rule at the top right Select Client VPN asthe rule type Give your firewall rulea name (for organizational purposes) Set Conditionsto restrict traffic by schedule, user/group, or subnet Create whichever Exceptionally Allowedyou need then click Save Click Commitat the top right That’s it! You should now see your new firewall rule under Security appliance > Configure > Firewall rules

Meraki VPN can be accessed by opening the Meraki Go app and navigating to Settings -> Advanced Settings -> Client VPN. After logging in, tap Client VPN Settings and toggle the feature on. Then, tap Administrators to choose which users have access to Client VPN. Finally, enter the shared secret to complete the process.

Worth knowing

Meraki client VPN uses the password authentication protocol (PAP) to transmit and authenticate credentials. PAP authentication is always transmitted inside an IPsec tunnel between the client device and the MX security appliance using strong encryption. This means that your VPN credentials are always secure and cannot be intercepted.

Worth knowing

If you have a SonicWall account and need to connect to a VPN, there are a few things you need to do. First, make sure you have the SonicWall client installed on your computer. You can get it from the SonicWall website. Once you have the client installed, open it and click the “New” button. In the “Name” field, enter a name for your connection. In the “Server Address” field, enter the address of your SonicWall server. In the “Shared Secret” field, enter a shared secret that will be used to encrypt your data. Finally, click the “Connect” button to connect to your VPN.

Worth knowing

When you connect your client device to a VPN, you establish a secure connection between that device and the VPN server. This connection is known as a “tunnel” because data passing through it is effectively encapsulated or hidden from view. All of the data passing through the tunnel is encrypted, ensuring that anyone who tries to intercept it will be unable to read it.

Once the tunnel has been established, you can access network resources on the server as if you were physically present there. Your traffic will appear to originate from the IP address of the VPN server, making it difficult for third parties to track your online activity.

Thank your for reading!