ZPE Nodegrid IPsec Interoperability Guide - Cisco, Palo Alto, and Meraki (IKEv2, Route‑Based / VTI)

ZPE Nodegrid IPsec Interoperability Guide - Cisco, Palo Alto, and Meraki (IKEv2, Route‑Based / VTI)

Purpose

This Knowledge Base documents validated IPsec (IKEv2) interoperability patterns between ZPE Nodegrid appliances and commonly deployed third‑party platforms:

  • Cisco (ISR / ASA / IOS‑XE)
  • Palo Alto Networks
  • Cisco Meraki MX

It is based on:

  • Hands‑on lab validation using Nodegrid 6.0.33+
  • Customer screenshots and production troubleshooting
  • Real‑world escalation involving Meraki + NAT behavior

The goal is to eliminate ambiguity around:

  • Required vs. optional fields
  • Route‑based (VTI) behavior
  • Vendor‑specific requirements not clearly documented elsewhere

Supported Architecture (Required)

ZPE Nodegrid supports route‑based IPsec only, implemented using a Virtual Tunnel Interface (VTI).

Key characteristics:

  • IKEv2 only
  • Traffic selection is routing‑based (not policy‑based ACLs)
  • Dynamic routing (e.g., BGP) is supported over the tunnel
  • Phase‑2 selectors are typically ANY/ANY, unless the peer enforces otherwise

This architecture is supported and recommended for all vendors covered in this document.


Firmware Scope

This guide applies to:

  • Nodegrid firmware 6.0.33 and later

Important note:

  • Older ZPE KBs reference prerequisites that are no longer required
  • Full IPsec configuration can now be completed entirely via WebUI

Common Terminology Mapping

ConceptNodegrid FieldCiscoPalo AltoMeraki
Peer endpointLeft / Right AddressPeer IPPeer IPPeer IP
IKE IdentityLeft / Right IDIKE IDIKE IDIKE ID
Tunnel IPSource IPTunnel Interface IPTunnel Interface IPUsed with subnets
Traffic definitionSubnetAny/AnyNo proxy‑IDRequired

Critical Clarification: Local & Remote Subnets

Older documentation stated that local/remote subnets were optional for route‑based VPNs.

Updated, validated guidance

  • Nodegrid itself does not require subnets for route‑based tunnels
  • ✅ Cisco and Palo Alto generally do not enforce subnets
  • ⚠️ Cisco Meraki MX DOES REQUIRE subnets, even for route‑based VPNs

Why this matters

Meraki uses “local networks” and “remote networks” to:

  • Build Phase‑2 selectors
  • Validate tunnel completeness
  • Maintain tunnel stability

Practical rule

When peering Nodegrid with Meraki, always define local and remote subnets.

These may be:

  • Loopbacks (/32), or
  • Small RFC1918 ranges used only for tunnel validation

Meraki + NAT: Undocumented but Critical Behavior

Summary (Very Important)

In environments where NAT exists between Nodegrid and Meraki, Cisco Meraki enforces stricter IKE identity behavior:

  • IP‑based IKE IDs that work in lab may fail in production
  • FQDN‑based IKE IDs are required when NAT is present

This behavior:

  • Is not documented by Cisco Meraki
  • Was confirmed only after engaging Cisco TAC
  • Explains discrepancies between lab and production results

Required configuration when Meraki + NAT is involved

  • Use FQDNs for:
    • Left ID
    • Right ID
  • Do not rely on IP addresses as IKE identities
  • Ensure IDs match exactly on both peers

Best practice recommendation

For all Meraki deployments—especially production—use FQDN‑based IKE IDs by default.


Validated Nodegrid Configuration Pattern

The following configuration was validated end‑to‑end using customer screenshots and lab testing.

1. Endpoint Preparation

  • Confirm public IP reachability between peers
  • Create a loopback interface on each Nodegrid
  • Verify each Nodegrid can ping its own loopback

2. Nodegrid IPsec Tunnel Settings

Local (Left) Side

  • Left Address: External (WAN) interface IP
  • Left ID:
    • Cisco / Palo Alto: IP or FQDN
    • Meraki + NAT: FQDN required
  • Left Source IP: Local loopback IP
  • Left Subnet:
    • Required for Meraki
    • Optional for others (but safe to define)

Remote (Right) Side

  • Right Address: Remote external IP
  • Right ID:
    • Must match peer expectations
    • Use FQDN for Meraki with NAT
  • Right Source IP: Remote loopback IP
  • Right Subnet: Required for Meraki

3. IKE Profile

  • IKEv2
  • Same profile on both sides
  • Same pre‑shared key

Recommended baseline

  • AES‑256
  • SHA‑256
  • DH Group 14 or higher
  • Lifetime ~28800 seconds

Changing the IKE profile on one side will drop the tunnel; matching it restores the tunnel immediately. This behavior is expected.


Vendor‑Specific Notes

Cisco (ISR / ASA / IOS‑XE)

  • Route‑based VTI supported
  • Subnets typically not enforced
  • Most common failures:
    • Firewall blocking UDP 500 / 4500 or ESP
    • IKE ID mismatch

Palo Alto Networks

  • Route‑based VPN only
  • No proxy‑IDs required
  • Tunnel interface IP must exist
  • Security policy must allow:
    • IKE
    • IPsec / ESP

Cisco Meraki MX (Summary)

  • Local and remote subnets required
  • NAT + IP‑based IDs can cause instability
  • Use FQDN‑based IKE IDs in production
  • Configuration may work in lab but fail in prod without this adjustment

Common Failure Modes (Observed)

SymptomLikely Cause
Tunnel drops immediatelyIKE profiles don’t match
Tunnel up, no trafficMissing subnet or FORWARD rule
Works in lab, fails in prodMeraki + NAT + IP‑based IDs
Phase‑1 never appearsFirewall or ID mismatch

  1. Agree on IKE parameters and IDs
  2. Define loopbacks and (for Meraki) subnets
  3. Bring up tunnel
  4. Verify loopback reachability
  5. Add routing or BGP
  6. Apply firewall tightening if required

Final Summary

Nodegrid IPsec behavior is correct, consistent, and standards‑based.
Most issues encountered in real deployments stem from peer‑specific expectations, not Nodegrid limitations.

Key rules to remember

  • Route‑based IPsec (VTI) is required
  • Meraki always needs subnets
  • Meraki + NAT → FQDN‑based IKE IDs
  • When in doubt, favor explicit configuration over relying on “optional” behavior

This KB replaces older guidance and should be used as the authoritative reference for all Nodegrid IPsec turn‑ups.

Appendix A — Meraki IPsec Pre‑Check (One‑Page)

Purpose

Use this checklist before any Nodegrid ↔ Meraki IPsec turn‑up call to prevent known failure conditions.


✅ Required Inputs (Both Sides)

ItemExampleNotes
Public IP (Nodegrid)203.x.x.xReachable from Meraki
Public IP (Meraki)198.x.x.xReachable from Nodegrid
Pre‑Shared Key********Must match exactly
IKE VersionIKEv2Required
EncryptionAES‑256Keep simple initially
HashSHA‑256
DH Group14+

✅ Critical Configuration Rules (Do NOT skip)

1. Subnets (MANDATORY)

  • Define:
    • Local subnet
    • Remote subnet
  • Acceptable values:
    • Loopback /32 (recommended)
    • Small RFC1918 range

✅ Required for Meraki even in route‑based VPN


2. IKE ID Format (CRITICAL under NAT)

ScenarioRequired ID Type
Lab (no NAT)IP or FQDN
Production (NAT present)FQDN ONLY

Example

  • Nodegrid ID: nodegrid.siteA.local
  • Meraki ID: meraki.siteB.local

❌ Do NOT use IP IDs with NAT
✅ Always match exactly on both sides


3. IKE Profile Consistency

  • Same IKE version
  • Same crypto parameters
  • Same PSK

✅ If changed on one side only → tunnel drops (expected)


4. Firewall Requirements

Allow:

  • UDP 500 (IKE)
  • UDP 4500 (NAT‑T)
  • ESP (IP protocol 50)

✅ Must reach Nodegrid INBOUND


✅ Pre‑Validation Tests

Before creating tunnel:

  • ✔ Ping peer public IP
  • ✔ Verify DNS (if using FQDN IDs)
  • ✔ Confirm NAT exists (or not)
  • ✔ Validate no upstream firewall blocking UDP 500/4500

✅ Expected Behavior

ActionResult
Configure first sideTunnel down (expected)
Configure second sideTunnel comes up immediately
Mismatch IDsPhase‑1 fails
Missing subnetTunnel unstable or drops

🚨 Known Gotchas

  • Works in lab, fails in prod → NAT + IP ID issue
  • Tunnel up, no traffic → subnet missing
  • Tunnel flaps → ID mismatch or NAT inconsistency

✅ Golden Rule

If Meraki + NAT → ALWAYS use FQDN IDs and define subnets


    • Related Articles

    • IPsec tunnel Nodegrid to PaloAlto with IKEv2 only

      IPsec tunnel Nodegrid to PaloAlto with IKEv2 only Setup Overview This documents outlines how a Nodegrid system can establish a IPSec tunnel to a PaloAlto firewall in tunnel mode. This guide was verified with PaloAlto version 8.0 and Nodegrid version ...
    • IPsec tunnel to AWS VPC with Certificates

      IPsec tunnel to AWS VPC with Certificates tested on: 5.2.1, 6.0.5 AWS VPC configuration Create Certificates AWS supports multiple ways to create and manage certificates. This guide utilized AWS Certificate Manager, read AWS documentation on how the ...
    • Role Based Access Administration

      Role Based Access Administration & User Configuration On the Nodegrid, you could give limited access to certain users based on their roles within certain groups. Let's say, you want give the Cisco managers access only the Cisco Routers & Switches, ...
    • Nodegrid ↔ Meraki IPsec NAT-T Issue

      Summary Nodegrid devices implement IPsec using Libreswan with IKEv2. NAT‑Traversal (NAT‑T) is automatic when NAT is detected, per RFC 7296. When NAT is present, traffic transitions from UDP/500 to UDP/4500 without requiring manual configuration. The ...
    • Palo Alto internal VM with Network segmentation

      Introduction: Setting up the Palo Alto VM internal to the Nodegrid to segment the traffics from different virtual networks.  The public IP is passthrough to the internal PA and allows access to all internal Networks that are configured behind the ...