Overview
This guide walks you through configuring AutoVPN to connect multiple Meter networks using a hub-and-spoke topology. You’ll learn how to set up both single and multiple spoke configurations with complete examples.Prerequisites
Before configuring AutoVPN, ensure:- You have Partner or Admin access with write permissions
- The hub network has a stable public IP address
- All networks are running a supported NOS version
- You have planned your IP addressing to avoid subnet conflicts
Prepare VLANs for AutoVPN
VLANs must be explicitly marked as shareable before they can participate in AutoVPN.Enable VLAN sharing
- Navigate to Network-wide > VLANs
- Click on the VLAN you want to share
- Click Edit
- Toggle Can be shared via AutoVPN to ON
- Click Save
Example 1: Single spoke configuration
This example demonstrates connecting one branch office (spoke) to a central office (hub).Scenario
- Hub: Main office in San Francisco
- Public IP:
203.0.113.10
- Shareable VLANs:
10.1.0.0/24
(Corporate),10.1.10.0/24
(Servers)
- Public IP:
- Member: Branch office in Austin
- Shareable VLANs:
10.2.0.0/24
(Corporate)
- Shareable VLANs:
Configuration steps
- Navigate to AutoVPN in the Dashboard
- Click Add group
-
Configure the group:
- Name:
SF-Austin VPN
- Member locations: Select both the San Francisco and Austin networks
- Name:
-
Configure the Hub (San Francisco):
- Hub: Select the San Francisco network
- Subnet: Leave default (100.64.0.0/20) or customize if needed
- Bound WAN port: Select the WAN port with the public IP
- Failover Enabled: Toggle ON if you have redundant WAN connections
-
Configure the Member (Austin):
- Permitted VLANs: Select
10.2.0.0/24
(Corporate)
- Permitted VLANs: Select
- Click Save
Verify the connection
- Navigate to AutoVPN in the Dashboard
- Click on the group name (
SF-Austin VPN
)
- Click on the member (Austin) to view handshake information
- Verify both RX and TX handshakes are shown with packet information
Configure firewall rules
AutoVPN does not automatically create firewall rules. You must configure rules to allow traffic: On Austin (Member):- Navigate to Network-wide > VLANs
- Select
10.2.0.0/24
(Corporate) - Go to Firewall Rules
- Add rules to allow traffic to hub subnets:
- Allow
10.2.0.0/24
→10.1.0.0/24
- Allow
10.2.0.0/24
→10.1.10.0/24
- Allow
- Navigate to Network-wide > VLANs
- Select
10.1.0.0/24
(Corporate) - Go to Firewall Rules
- Add rule to allow traffic from member:
- Allow
10.1.0.0/24
→10.2.0.0/24
- Allow
Test connectivity
From a device on the Austin Corporate VLAN (10.2.0.0/24), test connectivity:Example 2: Multiple spoke configuration
This example demonstrates connecting multiple branch offices to a central hub.Scenario
- Hub: Data center in Chicago
- Public IP:
198.51.100.50
- Shareable VLANs:
10.0.0.0/24
(Management),10.0.10.0/24
(Databases),10.0.20.0/24
(File Storage)
- Public IP:
- Member 1: Retail store in Boston
- Shareable VLANs:
10.10.0.0/24
(Store Network),10.10.5.0/24
(POS Systems)
- Shareable VLANs:
- Member 2: Retail store in Seattle
- Shareable VLANs:
10.20.0.0/24
(Store Network),10.20.5.0/24
(POS Systems)
- Shareable VLANs:
- Member 3: Retail store in Miami
- Shareable VLANs:
10.30.0.0/24
(Store Network),10.30.5.0/24
(POS Systems)
- Shareable VLANs:
Configuration steps
- Navigate to AutoVPN in the Dashboard
- Click Add group
-
Configure the group:
- Name:
Retail Stores - Hub and Spoke
- Member locations: Select Chicago (hub) and all three retail locations (Boston, Seattle, Miami)
- Name:
-
Configure the Hub (Chicago):
- Hub: Select the Chicago network
- Subnet: Leave default (100.64.0.0/20)
- Bound WAN port: Select the WAN port with the public IP
- Failover Enabled: Toggle ON for redundancy
-
Configure Member 1 (Boston):
- Permitted VLANs: Select both:
10.10.0.0/24
(Store Network)10.10.5.0/24
(POS Systems)
- Permitted VLANs: Select both:
-
Configure Member 2 (Seattle):
- Permitted VLANs: Select both:
10.20.0.0/24
(Store Network)10.20.5.0/24
(POS Systems)
- Permitted VLANs: Select both:
-
Configure Member 3 (Miami):
- Permitted VLANs: Select both:
10.30.0.0/24
(Store Network)10.30.5.0/24
(POS Systems)
- Permitted VLANs: Select both:
- Click Save
Verify all connections
- Navigate to AutoVPN in the Dashboard
- Click on the group name
- Verify each member shows as connected with active handshakes
Configure firewall rules
On each retail store (Members): Allow store networks to access hub resources:- Navigate to Network-wide > VLANs
- For each permitted VLAN, add firewall rules to allow access to hub VLANs:
- Allow local subnet →
10.0.10.0/24
(Databases) - Allow local subnet →
10.0.20.0/24
(File Storage)
- Allow local subnet →
- Navigate to Network-wide > VLANs
- For the Databases VLAN (
10.0.10.0/24
), add rules to allow POS traffic:- Allow
10.0.10.0/24
→10.10.5.0/24
- Allow
10.0.10.0/24
→10.20.5.0/24
- Allow
10.0.10.0/24
→10.30.5.0/24
- Allow
Store-to-store communication
If Boston needs to communicate with Seattle, traffic will flow: Boston → Hub (Chicago) → Seattle This requires:- Boston has a firewall rule allowing traffic to Seattle’s subnet
- Hub has routing configured (automatically handled by AutoVPN)
- Seattle has a firewall rule allowing traffic from Boston’s subnet
Test connectivity
From a device on Boston’s Store Network (10.10.0.0/24):Monitoring and troubleshooting
Check tunnel status
Navigate to AutoVPN and select your group. For each member:- Established tunnel: Shows both RX and TX handshakes with packet counts
- Tunnel down: Shows only one-way handshake or no packets
Common issues
Tunnel not establishing:- Verify hub has a stable public IP
- Check that at least one VLAN is selected in “Permitted VLANs” for the member
- Ensure WAN firewall allows VPN traffic
- Verify firewall rules are configured on both source and destination VLANs
- Check for overlapping IP addresses across sites
- Confirm VLANs are marked as shareable on both networks
- Verify hub has sufficient bandwidth for aggregate traffic
- Check for network congestion on WAN links
- Consider hub hardware capacity for large deployments
Best practices
- Plan IP addressing carefully: Use non-overlapping subnets across all sites
- Start small: Test with one or two members before adding many sites
- Document your configuration: Keep records of which VLANs are shared and firewall rules
- Monitor tunnel health: Regularly check AutoVPN status in the Dashboard
- Use descriptive names: Name groups and networks clearly for easy identification
- Test failover: If using redundant WAN connections, test failover behavior
Related resources
- AutoVPN design and architecture - Understanding the routing and hub-spoke model
- IPSec site-to-site tunnels - Alternative VPN solution
- VLANs - Configuring VLANs for your network
- Firewall ACLs - Managing firewall rules