Connecting on the Meraki Dashboard
1. Log in to the Meraki Dashboard and navigate to Security appliance > Site-to-site VPN.
2. Under ClientRemote address(es), add the public IP addresses or hostnames of any clients that will be connecting to this VPN. Add one address per line.
3. Click Save changesat the bottom of the page.
You can now use your client’s public IP addresses/hostnames to connect to the VPN! If you want more fine-tuned control over who can connect and when, see below for instructions on adding firewall rules. Adding Firewall Rules (Optional) By default, anyone with your Client VPN subnet’s range will be able to attempt a connection once they have authenticated with a valid username and password However, you may want some users to be always allowed while others must request access (like with an Austin Ping). Or maybe you only want certain devices connected at certain times of day To add these types of rules: Navigate to Security appliance > Configure > Firewall rulesand click Add a rule at the top right Select Client VPN asthe rule type Give your firewall rulea name (for organizational purposes) Set Conditionsto restrict traffic by schedule, user/group, or subnet Create whichever Exceptionally Allowedyou need then click Save Click Commitat the top right That’s it! You should now see your new firewall rule under Security appliance > Configure > Firewall rules
Worth knowing
Worth knowing
Worth knowing
Once the tunnel has been established, you can access network resources on the server as if you were physically present there. Your traffic will appear to originate from the IP address of the VPN server, making it difficult for third parties to track your online activity.
Thank your for reading!