Secure and reliable connectivity is essential for any distributed organization. This guide provides end-to-end instructions for configuring Meraki Site-to-Site and Client VPNs, including technical guidance, hardware mapping, and best practices for stability and security.
Table of Contents
- Part 1: VPN Scenarios & Decision Factors
- Part 2: Technical Implementation
- Part 3: Product & Deployment Mapping
- Part 4: Conclusion & Next Steps
- FAQ

Part 1: VPN Scenarios & Decision Factors
Meraki MX appliances support two main VPN types, each suited for different organizational needs.
Site-to-Site VPN Overview
Site-to-Site VPNs establish persistent encrypted connections between networks, such as corporate HQ and branch offices, or on-premises networks and cloud platforms. Meraki uses IPsec to secure these tunnels.
In summary, Site-to-Site VPNs provide reliable and secure connectivity for multiple locations or cloud integration.
Client VPN Overview
Client VPNs allow individual remote users to connect securely to the corporate network. Meraki supports two options:
- L2TP/IPsec (Legacy): Uses native OS clients with IPSec pre-shared keys. Android 12+ is unsupported.
- Cisco Secure Client (AnyConnect): Application-based VPN using TLS/DTLS protocols for modern OS compatibility. Requires AnyConnect v4.8+.
In summary, Client VPN provides secure remote access, with AnyConnect preferred for modern environments.
Choosing the Right VPN Type
- Site-to-Site VPN: Best for network-to-network connectivity or SD-WAN cloud integration.
- Client VPN (AnyConnect Preferred): Best for individual remote employees needing reliable connections.
Summary: Select VPN type based on the connectivity scenario and client OS requirements.
Part 2: Technical Implementation
This section provides step-by-step instructions for configuring Site-to-Site and Client VPNs, including security integration and troubleshooting.
Site-to-Site VPN Setup (Non-Meraki Peers)
For third-party or cloud platform integration, configure Non-Meraki VPN Peers using the following steps:
- Enable VPN: Security & SD-WAN > Site-to-site VPN, set MX network as Hub.
- Configure Health Checks for HA redundancy (e.g.,
http://service.sig.umbrella.com). - Primary Tunnel Configuration: IKEv2, Peer IP/Hostname, Shared Secret, Routing, Private subnets, Meraki probe IP
192.0.2.3/32, enable Tunnel Monitoring. - Secondary Tunnel (HA): Inherit primary configuration, define secondary datacenter IP and Tunnel ID.
In summary, this ensures secure, resilient Site-to-Site connectivity.
Client VPN Configuration
L2TP/IPsec
Enable under Client VPN, define VPN subnet, DNS, and Shared Secret. Users configure OS with server address and credentials.
Summary: L2TP/IPsec allows legacy client connections but may have compatibility limitations on newer devices.
Cisco Secure Client (AnyConnect)
- Enable AnyConnect under Client VPN settings.
- Configure server port, VPN subnet, and DNS.
- Set routing: Full Tunnel or Split Tunnel.
- Manage certificates: Auto-generated DDNS or custom hostname certificate.
- Optional AnyConnect profile (.xml) for friendly hostname alias.
Summary: AnyConnect provides stable and secure remote connectivity across modern operating systems.
Security Integration
- Supports RADIUS, AD, SAML, and MFA (e.g., Duo).
- RADIUS timeout must be increased when using MFA.
- Apply Group Policies via RADIUS Filter-ID for access control.
Summary: Proper security integration ensures compliance and secure authentication for VPN users.
Troubleshooting
Common issues and solutions:
| Error Type | Cause | Solution |
| Login Failed / MFA Failure | RADIUS timeout too short | Increase RADIUS timeout in dashboard |
| Certificate Chain Error | Incomplete certificate chain | Upload full chain to root CA |
| SBL Failure | Using SAML | Not supported with SBL |
| VPN Disconnects (L2TP/IPsec) | Incorrect client protocol | Ensure L2TP/IPsec with PAP allowed |
| Secondary Site-to-Site Tunnel "Down" | Normal HA behavior | Traffic routed through primary tunnel |
Summary: Refer to event logs and configuration checks to resolve connectivity issues.
Part 3: Product & Deployment Mapping
This section maps MX appliance models to VPN session capacities and deployment scenarios.
| MX Model | Max Concurrent VPN Sessions |
| MX64/65 | 50 |
| MX67/68, MX84 | 100 |
| MX75, MX85, MX100, vMX100 | 250 |
| MX95, vMX Large | 500 |
| MX250, MX600 | 1,000 |
| MX450 | 1,500 |
| Z3(C), Z4(C) | 5 |
| Deployment Scenario | Recommended MX Model | Required VPN Feature |
| Small Office (5–50 users) | MX64/65 | L2TP/IPsec or AnyConnect |
| Medium Branch (100–250 users) | MX85, MX100, MX75 | AnyConnect |
| Large HQ / Data Center (500+ users) | MX250, MX450, MX95 | AnyConnect + HA |
Summary: Select MX models according to user count and required VPN features. Check Router-switch for in-stock inventory and genuine products.
Part 4: Conclusion & Next Steps
VPN deployment success depends on careful planning of authentication, network stability, and hardware sizing. AnyConnect profiles and group policies enhance user experience. Leverage partners like Router-switch for global inventory, multi-brand procurement, and technical guidance.
FAQ
How to configure a Meraki Site-to-Site VPN?
Navigate to Security & SD-WAN > Site-to-site VPN, choose Hub mode, configure peer details and shared secret for non-Meraki peers, and enable Tunnel Monitoring.
How to set up Meraki Client VPN?
L2TP/IPsec: Configure under Client VPN with a shared secret. AnyConnect: Enable Cisco Secure Client, configure TLS/DTLS, server address, routing, and certificates.
What is the difference between Client VPN and Site-to-Site VPN?
Site-to-Site connects entire networks; Client VPN connects individual users to the corporate network.
Which MX model supports how many VPN connections?
Session limits vary: MX64/65 = 50, MX100 = 250, MX450 = 1,500 concurrent sessions.
How to integrate RADIUS/MFA with Meraki VPN?
Configure VPN to use RADIUS. For MFA, increase the RADIUS timeout to allow the second-factor authentication.
How to troubleshoot Meraki VPN connection issues?
Check RADIUS timeout, certificate chains, client protocol settings, and monitor event logs under Network-wide > Monitor > Event Log.
Can Meraki VPN connect to non-Meraki devices?
Yes, using standard IPsec protocols. MX can act as Non-Meraki VPN peer with IKEv2 and HA health checks.

Expertise Builds Trust
20+ Years • 200+ Countries • 21500+ Customers/Projects
CCIE · JNCIE · NSE7 · ACDX · HPE Master ASE · Dell Server/AI Expert


















































































































