New MR 30.3 beta firmware - APs reporting other in-network APs as spoofs

RaphaelL
Kind of a big deal
Kind of a big deal

New MR 30.3 beta firmware - APs reporting other in-network APs as spoofs

Important note

  • While Meraki APs have traditionally relied on UDP port 7351 for cloud communication, and TCP ports 80 and 443 for backup communications, with MR 28+ we are beginning the transition to using TCP port 443 as the primary means for cloud connectivity. In order to ensure proper connectivity to the Meraki cloud after this upgrade, please ensure that all “Meraki cloud communication” traffic specified in the "Help" > "Firewall Info" page is allowed through any firewalls or security devices that are deployed upstream of your Meraki APs. These requirements have been updated in November of 2022, so it is important that you review them. (Wi-Fi 6 and Wi-Fi 6E APs)
  • WEP deprecation (https://documentation.meraki.com/MR/Encryption_and_Authentication/WEP_Deprecation_on_MRs)

Legacy product notice

  • When configured for this version, MR12, MR16, MR18, MR24, MR26, MR32, MR34, MR62, MR66, and MR72 will run MR 26.8.3

Bug fixes

  • General stability and performance improvements
  • APs reporting other in-network APs as spoofs

Known issues

  • Sporadic packet loss & instability on Layer 3 roaming & Teleworker VPN SSID's (Wi-Fi 5 Wave 2 and Wi-Fi 6 APs)

 

 

 

Was this missed by the firmware update bot ?🤔

2 Replies 2
javalins
Meraki Employee
Meraki Employee

Hi @RaphaelL, you have posted in the Wireless WAN section (intended for our cellular product families like MG).  For better response for MR inquiries, this should be moved into the Wireless LAN community.

RaphaelL
Kind of a big deal
Kind of a big deal

Oops ! 

 

My bad. I can't move that post to the Wireless LAN community. 

This was simply to inform that the firmware Bot has missed that announcement

Get notified when there are additional replies to this discussion.