MS220-8 between broadband and MX100: how?

Solved
cabricharme
Getting noticed

MS220-8 between broadband and MX100: how?

Connecting MX100 directly to a broadband uplink device (e.g. a cable modem) generally works, however placing a switch such as MS220 between MX100 and the broadband uplink is causing issues: the broadband uplink stops working (100% loss, no DHCP) and the switch itself disconnects from the dashboard.

What are the "minimum working" (baseline) settings for the switch to get it to work between MX100 and a broadband connection?

 

Some of the questions that come to mind:

  • What should the switch's VLAN be set to?

  • What VLAN (if any), and what port settings (trunk? access? does it matter?) are recommended for upstream (broadband device) and downstream (MX100) connections on the switch?

  • Given MX100 ports do not appear to have VLAN configuration options, should VLAN be configured at all for the switch and its ports?

 

Thank you!

 

cabricharme_0-1718137838334.png

 

1 Accepted Solution
cabricharme
Getting noticed

Thanks for all the help!

 

After a few back-and-forth with Meraki support, and studying the "MX, MS - WAN Breakout Switch designs" slide deck suggested by ww in this thread (thank you!), the following crystallized:

 

  • Type: in short, all relevant switch ports should be set to "access".
  • VLAN: the ports connecting to the ISP circuit and to MX WAN ports should have their VLAN set to something unique on the network, and specific to the ISP circuit. This way if the switch is used for anything other than connecting one ISP circuit to the MX, the WAN traffic stays isolated to that VLAN.
  • Manageability. It's also recommended to set up a 3rd port (also "Access"), connect it to a LAN port (e.g. on the MX) and set it to the network's management VLAN so that the switch can remain manageable if the ISP circuits goes down. The LAN port should be configured the same way.

 

In more detail:

 

Minimal configuration

(Absolute minimum baseline settings; the switch can still be manageable if properly configured for internet access)

  • 2 ports on the switch are both configured as "access", "VLAN 994" (or some other VLAN unique to the network and specific to the ISP circuit; e.g. for our two circuits we use 991 and 992)
  • one of these ports goes to the ISP circuit, the other - to MX WAN port

 

That's it. Everything else remains the same, i.e. if the internet was working through that uplink when the circuit was connected directly to the MX w/o a switch - this configuration should work as well.

 

Recommended configuration

(a minimum of 3 switch ports are configured)

 

The switch however may become unmanageable in the previous "minimal" configuration and disconnect from Meraki dashboard, unless it can get its own IP from the ISP circuit via DHCP, or be set to a valid static IP.

 

To make it manageable and accessible regardless of whether it's connected to any ISP circuits, set up another port for manageability and connect it to one of the LAN ports - e.g. on the MX appliance itself:

  • Set up another port on the breakout switch for management traffic. Type: "access", VLAN should be set to whatever your local management VLAN is...
  • MX LAN port: "access", same management VLAN.
    • MX's own LAN ports are configured in a special place - not under the "appliance status" where WAN ports are configured, but under "Per-port VLAN Settings" in "Security & SD-WAN" - "Configure" - "Addressing & VLANs". (This took a bit to figure out.)

 

Hope this helps someone in a similar boat, and who needs as much hand-holding as I did.

View solution in original post

9 Replies 9
ww
Kind of a big deal
Kind of a big deal

Mx does support vlans for lan, or vlan config/tag for wan port. Two switch acces ports in any vlan would normally do the trick. However the issue here could be several things.

 

In this topic you can find slides that could help you https://community.meraki.com/t5/Security-SD-WAN/How-to-turn-MS120-into-WAN-breakout-for-2-ISPs-and-2...

 

cabricharme
Getting noticed

Thank you, that deck helped tremendously. I don't have enough networking background to translate everyone's suggestions into actual configuration settings, and that deck more or less did it.

Alejandro_F
Meraki Employee
Meraki Employee

Hi @cabricharme!

 

   A breakout switch between the MX and the ISP should be working as layer 2 only. Please make sure there is not L3 interface configured. The recommended configuration is to have a copule of ports in access mode. If you are using other ports on the switch, is recommended if are trunk interfaces to prune the VLAN. Ex. use ports 1 and 2 for ISP modem and MX100, both in access VLAN 999. In any other trunk port in the switch do not allow VLAN 999.
I hope it makes sense.

If you found this post helpful, please give it kudos. If my answer solved your problem, click "accept as solution" so that others can benefit from it.
cabricharme
Getting noticed


A breakout switch between the MX and the ISP should be working as layer 2 only. Please make sure there is not L3 interface configured.

Thank you.

 

Not sure what this means in terms of where to go in the switch configuration and what to change, to ensure the switch stays in L2 mode. If it means "there is not L3 interface configured" - then what does that mean in terms of Interface (switch port?) configuration?

 


The recommended configuration is to have a copule of ports in access mode.

Assuming (for now) the switch will only have two connections - to the ISP circuit, and to the MX100, does this mean both of those should be in access mode?

 


If you are using other ports on the switch, is recommended if are trunk interfaces to prune the VLAN. Ex. use ports 1 and 2 for ISP modem and MX100, both in access VLAN 999. In any other trunk port in the switch do not allow VLAN 999.
I hope it makes sense.

The switch is dedicated to just being the breakout switch, i.e. no plans to use it for other tasks. This means ports other than the primary ones (one - to the ISP circuit, the other - to MX100's WAN port) can be used for two purposes only:

  • management - connect to MX100's LAN port to ensure the MS220 switch remains manageable even if the ISP circuit drops
  • testing and diagnosis - if there are issues with the ISP circuit, to ensure there can be a direct connection to it that bypasses MX100, yet that does not require disconnecting the MX100

 

With all that in mind - does something like this make sense, and does it look secure enough?

 

Scenario 2: breakout switch MS220-8, 3 connections:
  1. Port 1: to ISP circuit

  2. Port 2: to MX100 WAN port

  3. Port 3: to MX100 LAN port (for management)

 
Configuration:
  • MS220-8 Port 1: to ISP circuit 1
    • Type: Access
    • VLAN: 991 (not present anywhere else on the network)
  • MS220-8 Port 2: to MX100 WAN 1 port
    • Type: Access
    • VLAN: 991
  • MS220-8 Port 3: to MX100 LAN port (for management)
    • Type: Trunk
    • Native VLAN: ?
    • Allowed VLANs: none?
  • MX100 WAN 1:
    • VLAN ID: 991?
    • IP config: (specific to the ISP circuit)
  • MX100 LAN port (e.g. 5): no configuration options available
  • Switch management: via MX100 LAN port

 

Thanks again!

PhilipDAth
Kind of a big deal
Kind of a big deal

The cable modem is using a plain routed address block, like a /29?

 

If it is passing through PPPoE then you may have issues.

cabricharme
Getting noticed


The cable modem is using a plain routed address block, like a /29?

 

If it is passing through PPPoE then you may have issues.


Two ISP circuits in play:

  • a cable modem (Spectrum Business) + 4-port router with DHCP, with static IPs that come with the service
  • a so called "DIA" circuit from Frontier with a RAD ETX-203ax "demarcation" device - with a /29 address block.

 

Either one is working OK when connected directly to the MX100. I'd like to put a "breakout" switch(es) between the circuits and the MX, and configure everything securely.

 

Got a good response from Meraki support:

 

  • The first thing you will need to take care of is the switch configuration.
    • The switch can get its management from the LAN of the MX, unless you want it to always be reachable even if the MX is down, in which case you will need to assign it a public IP from the same pool the MX is getting.
    • The ports that are assigned to the ISP circuit will be configured as access ports on a VLAn that will not be used on the LAN.
    • Depending if you assign a public IP to the switch or not, the management of the switch will be statically configured on that VLAN, otherwise it will get the management from your vlan of choice from the MX.
  • No configuration changes will be needed on the MX and you will need to connect cabling accordingly to the selected ports for the ISP circuit on the switch.

 

... although still have trouble translating it to actual configuration steps.

 

So far my "translation" into configuration steps or options is as follows:

 

Scenario 1: breakout switch MS220-8, only two connections: ISP circuit, MX100
  • MS220-8 Port 1: to ISP circuit 1
    • Type: Access
    • VLAN: 991 (not present anywhere else on the network)
  • MS220-8 Port 2: to MX100 WAN 1 port
    • Type: Trunk
    • Native VLAN: not configured (empty)
    • Allowed VLANs: all
  • MX100 WAN 1:
    • VLAN ID: not configured (empty)
    • IP config: (doesn't matter - whatever works for that specific ISP circuit, including DHCP)
  • Switch management: via static IP configured for the ISP circuit
 
Does the above sound right, and does it comply with best practices in terms of security and manageability? Should port 2 on the switch be configured as "Trunk" and no VLAN configuration?
 
 
Scenario 2: breakout switch MS220-8, 3 connections: ISP circuit, MX100 WAN port, MX100 LAN port (for management)
  • MS220-8 Port 1: to ISP circuit 1
    • Type: Access
    • VLAN: 991 (not present anywhere else on the network)
  • MS220-8 Port 2: to MX100 WAN 1 port
    • Type: Trunk
    • Native VLAN: not configured (empty)
    • Allowed VLANs: all
  • MS220-8 Port 3: to MX100 LAN port (for management)
    • Type: Trunk
    • Native VLAN: not configured (empty)
    • Allowed VLANs: all
  • MX100 WAN 1:
    • VLAN ID: not configured (empty)
    • IP config: specific to the ISP circuit
  • MX100 LAN port (e.g. 5): no configuration options available
  • Switch management: via MX100 LAN port
 
Ditto, does this configuration look OK?
  • Does the LAN port connection from MX100 to switch (and thus, directly to the ISP circuit) make the configuration vulnerable in any way?
 
Lastly, is it possible to connect two different ISP circuits to the switch, and then connect each to a respective WAN port on MX100? (I am assuming the two connections would need to be isolated via VLANs?)

 

cmr
Kind of a big deal
Kind of a big deal

I've often added a switch between the ISP device and the MX (mainly to split the circuit to two MXs as an HA pair), but I always use a dumb unmanaged L2 switch. 

 

Why do you want to manage the WAN switch?  In my opinion it adds a security risk and a reliability risk that I'd rather not have.

If my answer solves your problem please click Accept as Solution so others can benefit from it.
cabricharme
Getting noticed

I hear you on simplicity, security and reliability.

 

One reason to use a switch like that is because we have it... 🙂

 

The other - to counter ISP's assertion of "you have a lot of errors on your side" and get port error stats from a switch that can collect and report them.

 

(Generally, get a little better visibility into WAN traffic.)

 

Yet another: ease of configuration and testing. Configure two ports for one ISP circuit, another two - for the 2nd one, another - for a cellular uplink, isolate them all, see them all...

cabricharme
Getting noticed

Thanks for all the help!

 

After a few back-and-forth with Meraki support, and studying the "MX, MS - WAN Breakout Switch designs" slide deck suggested by ww in this thread (thank you!), the following crystallized:

 

  • Type: in short, all relevant switch ports should be set to "access".
  • VLAN: the ports connecting to the ISP circuit and to MX WAN ports should have their VLAN set to something unique on the network, and specific to the ISP circuit. This way if the switch is used for anything other than connecting one ISP circuit to the MX, the WAN traffic stays isolated to that VLAN.
  • Manageability. It's also recommended to set up a 3rd port (also "Access"), connect it to a LAN port (e.g. on the MX) and set it to the network's management VLAN so that the switch can remain manageable if the ISP circuits goes down. The LAN port should be configured the same way.

 

In more detail:

 

Minimal configuration

(Absolute minimum baseline settings; the switch can still be manageable if properly configured for internet access)

  • 2 ports on the switch are both configured as "access", "VLAN 994" (or some other VLAN unique to the network and specific to the ISP circuit; e.g. for our two circuits we use 991 and 992)
  • one of these ports goes to the ISP circuit, the other - to MX WAN port

 

That's it. Everything else remains the same, i.e. if the internet was working through that uplink when the circuit was connected directly to the MX w/o a switch - this configuration should work as well.

 

Recommended configuration

(a minimum of 3 switch ports are configured)

 

The switch however may become unmanageable in the previous "minimal" configuration and disconnect from Meraki dashboard, unless it can get its own IP from the ISP circuit via DHCP, or be set to a valid static IP.

 

To make it manageable and accessible regardless of whether it's connected to any ISP circuits, set up another port for manageability and connect it to one of the LAN ports - e.g. on the MX appliance itself:

  • Set up another port on the breakout switch for management traffic. Type: "access", VLAN should be set to whatever your local management VLAN is...
  • MX LAN port: "access", same management VLAN.
    • MX's own LAN ports are configured in a special place - not under the "appliance status" where WAN ports are configured, but under "Per-port VLAN Settings" in "Security & SD-WAN" - "Configure" - "Addressing & VLANs". (This took a bit to figure out.)

 

Hope this helps someone in a similar boat, and who needs as much hand-holding as I did.

Get notified when there are additional replies to this discussion.
Welcome to the Meraki Community!
To start contributing, simply sign in with your Cisco account. If you don't yet have a Cisco account, you can sign up.
Labels