We recently moved all the company's perimeter devices to Meraki MX. All of our locations currently have one ISP into one of the MX's WAN ports, then one of the MX's LAN ports into a Cisco, non-Meraki, switch inside our perimeter. Example;
![2024-12-27 Meraki HV O.png 2024-12-27 Meraki HV O.png](https://community.meraki.com/t5/image/serverpage/image-id/41215i7AB639272D029781/image-dimensions/447x469?v=v2)
We are looking into adding a second "backup" ISP circuit and a second Meraki MX at each location for; warm spare, high availability, failover, or whatever it is called, and could use some help with the architecture.
This is the architecture we initially came up with based on various articles, forums, ext... we found online.
![2024-12-27 Meraki HV 1.png 2024-12-27 Meraki HV 1.png](https://community.meraki.com/t5/image/serverpage/image-id/41213iFBD093F6B5C71BA0/image-size/large?v=v2&px=999)
As a starting point, is this architecture correct? If not, what do we need to change?
Assuming the first architecture is correct, we also came up with this architecture, which removes the MS hardware outside the perimeter. If this architecture is functionally correct, is it a secure risk to have the switch stack inside and outside the perimeter at the same time?
![2024-12-27 Meraki HV 2.png 2024-12-27 Meraki HV 2.png](https://community.meraki.com/t5/image/serverpage/image-id/41214i3A4A3F97BFEF2F55/image-size/large?v=v2&px=999)
Thanks everyone in advance for your input and assistance.