Forum Discussion

Sharyn_S's avatar
Sharyn_S
Copper Contributor
Oct 21, 2020

Unable to connect to resources via site to site vpn using Meraki VMX100

Hi.

We have established a site to site vpn between our Azure Meraki vmx100 (managed Azure service/app) and our on premise mx64. Although the tunnel is up, running and passing traffic, I can't rdp to my resources in Azure. 

 

I spoke to Cisco and they confirmed my vmx100 is configured correctly and traffic is reaching the Azure resources however traffic from Azure VM is not being passed back. I need, specifically, to be able to rdp to the VMs in Azure.

 

I have set up routes but obviously they are not correct or else this would be working!

I have also set up network security groups allowing inbound and outbound traffic to port 3389 (rdp). When I run the connection test it tells me that access has been granted. However, when I try to rdp using the MS rdp client, I get the generic unable to connect message. When I try to rdp using the Azure rdp client, it tells me another computer has disconnected my session which is not possible since I'm the only one setting this up.

 

Anyone out there that has successfully set up a Cisco Meraki VMX100 in Azure and is able to access the resources in Azure behind the vmx100?

 

Thanks,

Sharyn_S

7 Replies

  • IrishTechie's avatar
    IrishTechie
    Brass Contributor
    Hi Sharyn_S,

    Hope you’re well.

    Can you confirm your route tables and that they’re connected to the correct subnets?

    I’m not familiar with the Meraki vmx specifically but will try to assist.

    Thanks
    • Sharyn_S's avatar
      Sharyn_S
      Copper Contributor

      IrishTechie 

      My route tables look correct. I've attached a network diagram. If you look at the diagram, it's the part at the top, in azure, where the two way connection is not happening. The Azure resources are not passing traffic back to the vmx.

       

      According to cisco, there is 2 way communication between the azure vmx and the on premise Meraki

      • IrishTechie's avatar
        IrishTechie
        Brass Contributor
        Thanks for sharing the diagram.

        So if I read it right Your EliteU subnet should have a route table attached that looks a bit like:

        - 0.0.0.0/0 > Next Hop Appliance: 10.0.9.4

        Can you ping the internal interface of the VMX from the EliteU subnet? Can you do a tracert to the internet, Google or something and post the results? That’s assuming internet traffic is running via the VMX.

        Also, sorry, could you confirm your address space in your azure VNET is? As the default 10.0.0.0/16 would overlap with your on-premise.

        Edit: corrected as I misread diagram.

Resources