Description: You can securely connect your Cisco Meraki network to CloudConnexa using the IPSec tunneling protocol to access CloudConnexa resources.
Prerequisites
- A Cisco Meraki device with IPSec VPN capability.
- Access to your CloudConnexa account.
- Administrator permissions to configure networks and routing on both systems.
Step 1: Set up an IPSec connector in CloudConnexa
- Sign in to CloudConnexa.
- Click Networks > Networks.
- Click Add Network and choose Remote Access > Continue.
- Enter a name for your network.
- Select IPSec for the tunneling protocol.
- Choose the Region closest to your Cisco Meraki resources.
- Click Next.
- For Platform to Connect, choose Other.
CloudConnexa will now generate IPSec parameters that you'll use to configure your Cisco Meraki.
Step 2: Configure the Cisco Meraki device
Use the IPSec configuration values provided by CloudConnexa to complete the following on your Cisco Meraki dashboard:
Setting | Value from CloudConnexa |
Connector Hostname |
A unique value, not necessarily a public or real domain. e.g., meraki |
Connector Domain |
A unique value, not necessarily a public or real domain. e.g., org.local |
Authentication |
Pre-Shared Key (PSK) |
Encryption Algorithm | e.g., AES-256 |
Hash Algorithm | e.g., SHA-256 |
DH Group | e.g., Group 14 |
Lifetime | e.g., 28800 seconds |
Cisco Meraki Configuration:

Cisco Meraki Phase 1 (IKE Policy):
Cisco Meraki Phase 2 (IPSec Policy):
Setting | Value from CloudConnexa |
Encryption Algorithm | e.g., AES-256 |
Authentication | e.g., SHA-256 |
PFS Group | e.g., Group 14 |
Lifetime | e.g., 3600 seconds |
Step 3: Add static routes in Cisco Meraki
You must define routes on the Cisco Meraki device to allow traffic to the CloudConnexa WPC.
Add the following static routes (default values shown):
- CloudConnexa WPC Subnet: 100.96.0.0/11
- Domain Routing Subnet: 100.80.0.0/12
Those routes ensure traffic destined for CloudConnexa-connected resources is routed over the IPSec tunnel.
Final Notes
- Ensure both tunnel sides use matching Phase 1 and Phase 2 parameters.
- Once the tunnel is established, verify connectivity by pinging internal resources or using traceroute from each side.
- If the tunnel fails to establish, check firewall rules, NAT traversal settings, and logs in both the Cisco Meraki dashboard and CloudConnexa.
Comments
0 comments
Please sign in to leave a comment.