[login to view URL]
As you can see in the documentation, a linux VPN connection to this Meraki device is possible.
However, all our attempts have failed.
We CAN connect to the VPN just fine with windows machines following that documentation.
Yet, attempts to connect using Strongswan on Centos have failed. The process is not well documented.
We need to connect to the device, ping a local IP on the VPN to confirm, and your job is done!
I cannot provide root access, so I need you to tell me what commands to run on the Centos6 box, what config to apply to files, etc.
Hi i can help you. are you configured ipsec vpn settings on your client? did you use strogswan or another packages? Could you share more about your cisco meraki ipsec config. I have done vpn connection many times before with cisco to ubuntu if you want i can send you ready step by step documentation. if you do not want use strogswan you can use vpnc also
Hi,
As per your requirement, I have expertise in VPN Configuration in Centos. I can help you with that. I have 5 years of experience in this domain and I have done this type of projects many times for my remote and local clients. And I have complete knowledge of Meraki VPN. I can provide your full support on this
Let me handle this`
thanks
waiting for your response
DO THIS
Install network-manager-l2tp: sudo add-apt-repository ppa:nm-l2tp/network-manager-l2tp and sudo apt-get update sudo apt-get install network-manager-l2tp
If using gnome, install the gnome plugin (if using another desktop environment, see if there's a plugin for its network manager): sudo apt-get install network-manager-l2tp-gnome
Reboot
Navigate to Settings > Network > Click the +button > Select "Layer 2 Tunneling Protocol (L2TP)"
Name the new VPN connection something
Put the host name or address in the Gateway field.
Put username in the Username field.
Click the icon in the Password field and select your preference for how to supply the password.
Click IPSec Settings...
Click the box for "Enable IPsec tunnel to L2TP host"
Enter the shared secret into the Pre-shared key field.
Leave the Gateway ID field empty.
Expand the Advanced options area
Enter "3des-sha1-modp1024" into the Phase 1 Algorithms box.
Enter "3des-sha1" into the Phase 2 Algorithms box.
Leave the box checked for "Enforce UDP encapsulation".
Click OK.
Click Save.
Open a terminal and enter the following commands to permanently disable the xl2tpdservice: sudo service xl2tpd stop
Also enter the following: sudo systemctl disable xl2tpd
Open Network Settings and try to turn the VPN on.
1. First, a survey document will be sent.
2. A work plan will be made where it will be seen as a whole.
3. When the work plan is approved, the task will be carried out.
4. Verify that it works correctly.
5. Mail will be sent with blog and screen capture of what was done in detail from the PoW