Best Practices for Configuring SSID Block List in Meraki Air Marshal

jkkarkar
Conversationalist

Best Practices for Configuring SSID Block List in Meraki Air Marshal

My apologies if this question has already been asked but it's unclear to me in any documentation I've come across.

 

Meraki Wireless is implemented in the environment. The SSID's that are configured for example are HOHT_Guest, HOHT_Internal and HOHT_IoT. Air Marshal is configured to block client from connecting to rogue SSID's by default. In the SSID Block list I have applied a match that contains the keyword HOHT. Is this going to cause an issue? I suspect it may because the keyword is a match to the SSIDs that are in play.

 

We've seen a rogue SSID with the name HOHT_SOUTH_Aethernet and have included it in the block list as an exact match but if others are seen with the keyword HOHT would including it as a block if "contains keyword" pose any issue especially with the possibility of spoofed attacks.

0 Replies 0
Get notified when there are additional replies to this discussion.
Welcome to the Meraki Community!
To start contributing, simply sign in with your Cisco account. If you don't yet have a Cisco account, you can sign up.
Labels