How do I set up site-to-site VPN between a QuWAN and Cisco® Meraki® device?


Last modified date: 2025-02-18

Applicable Products

  • QuWAN Orchestrator
  • QuRouter 2.4.0 and later versions
  • Cisco® Meraki® device

Details

This guide details the steps to establish a site-to-site VPN connection between a QuWAN device and a Meraki® MX64 security appliance. While the Cisco® ecosystem offers various devices with site-to-site VPN functionality, this tutorial will specifically focus on the Meraki® MX64 for demonstration purposes.

Important
  • QuWAN site-to-site VPN only supports IKEv2.
  • Both devices (QuWAN and Cisco® devices) must use the same configuration settings for the VPN to function correctly.
  • Your QNAP device must be added to QuWAN Orchestrator before configuring the site-to-site VPN. Refer to the QuWAN and QuWAN Orchestrator Help for adding your device: Configuration | QuWAN and QuWAN Orchestrator Help (qnap.com)
Warning

Implementing a site-to-site VPN introduces additional complexity to your network. Ensure you understand the security implications before enabling it.

Procedure

Site-to-site VPN configuration on the Cisco® Meraki® device

  1. Sign in to the configuration interface of the Meraki® MX64.
  2. Navigate to Security & SD-WAN > Configure > Site-to-site VPN page.
  3. Under Non-Meraki VPN peers, click Add a peer and enter the following information:
    • Enter a descriptive name (e.g., QuWAN Site-to-Site VPN)
    • Select IKEv2 as the IKE version.
  4. Click Default under IPsec policies and configure the following:
    SettingUser ActionExample Value
    Phase 1
    EncryptionSelect an encryption method.AES-128
    AuthenticationSelect the hash function.SHA-256
    Pseudo-random Function (PRF)Select the hash PRF.SHA-256
    Diffie-Hellman groupSpecify the DH group.14
    LifetimeSpecify the connection lifetime (seconds).28800
    Phase 2
    EncryptionSelect the encryption methodAES-128
    AuthenticationSelect the hash functionSHA-256
    PFS groupSpecify the PFS group14
    Lifetime (seconds)Specify the data transfer lifetime (seconds)3600
  5. Enter the following information for the remote gateway:
    • Public IP address or hostname of the remote QuWAN device.
    • Specify the internal subnet(s) of the remote site.
    • Enter a strong pre-shared secret key and configure the same key on the remote gateway.
  6. Click Save.
    MX64 applies the configuration.

Site-to-site VPN configuration in QuWAN Orchestrator

  1. Log in to QuWAN Orchestrator using your QNAP ID credentials.
  2. Select your organization.
  3. Go to QuWAN Topology > Route-Based VPN.
  4. Click Create New Connection.
    The Create New Connection window appears.
  5. Configure the route-based VPN connection settings.
    SettingDescription
    Connection nameAssign a descriptive name (e.g., Meraki Site-to-Site VPN).
    IPsec modeSelect Tunnel Mode.
    HubDesignate the appropriate hub for the connection.
    WAN interfaceEnter the desired WAN interface.
    Remote IP or hostnameSpecify the public IP address or hostname of the remote gateway device.
    Test Connection (Optional)Click the button to ping the IP/hostname to confirm the connection.
    Pre-shared keyEstablish a strong pre-shared key, ensuring identical configuration on the remote gateway.
  6. Configure the advanced route-based VPN connection settings.
    SettingUser ActionExample Value
    Internet Key Exchange (IKE)
    VersionSelect IKEv2.-
    Authentication algorithmSelect a robust authentication algorithm.AES-128
    EncryptionSelect a strong encryption method.AES-128
    DH groupSelect a secure DH group.14
    Security Association (SA) lifetimeDefine the IKE Security Association (SA) duration to reduce cryptographic risks associated with key exposure.480
    Local ID (Optional)In the event that a Dynamic DNS (DDNS) service is to be employed for the route-based VPN connection, the local ID must be provided.-
    Encapsulating Security Payload (ESP)
    Authentication algorithmSelect an authentication algorithm.SHA-256
    EncryptionSelect an encryption method.AES-128
    Enable Perfect Forward Secrecy (PFS)Check the box to generate a new DH key.-
    DH GroupSpecify a secure DH group.14
    Security Association (SA) lifetimeDefine the SA lifetime duration.60 minutes
    Enable Dead Peer Detection (DPD)Check the box to identity and respond to peer device outages.-
    DPD timeoutSpecify the DPD timeout value..10 seconds
  7. Next to Enable NAT mode, select the checkbox to ensure that the VPN connection functions properly even when NAT devices are present in the network.
  8. Specify the local tunnel IP address to facilitate NAT-traversal.
  9. Under Site Subnets, click Add Subnet and define the internal subnet of the remote network you want to access.
  10. Click Save.

If the route-based VPN connection is successful, the Status field displays the Connected status.

Further Reading

Meraki® Site-to-Site VPN Settings

Was this article helpful?

100% of people think it helps.
Thank you for your feedback.

Please tell us how this article can be improved:

If you want to provide additional feedback, please include it below.

Choose specification

      Show more Less

      Choose Your Country or Region

      open menu
      back to top