Software Secure Access
Activity Manage

Branch-to-Branch through Secure Access

One of the following options is required to enable Secure Access policy enforcement to apply to branch-to-branch communication. Otherwise, all traffic will traverse Meraki AutoVPN between Meraki networks directly.

  1. Each network hosting applications is in a separate org; or
  2. All networks are in a single org. Note: If this is the case, contact Support to have hub-to-hub communication turned off.