please allow me two more questions on this topic.. 1-) @Bruce wrote: For straight 802.1x assignment of a VLAN when a user first connects to the network, CoA isn’t required. what is the reason from technical perspective - the CoA is disabled per default in the dashboard? 2-) @Bruce wrote: Enabling CoA configures the switch to listen for CoA messages from the RADIUS server. This allows some more advanced servers, e.g. Cisco ISE (there are other vendors too), to tell the switch to perform the authorisation of the switch port again, so allowing the VLAN to be changed after initial authentication has been performed. This is useful where the RADIUS server has separate threat feeds, or is performing ongoing posture monitoring and can detect, or be informed, of a change in the client state. maybe you know the current possibilities when using ISE in combination with Meraki MS Switches products? I´m not sure what of the features are supported compared when using the Cisco Enterprise devices e.g. device profiling, posturing, TrustSec, etc. @Bruce wrote: There is also a new feature that you may be interested in too called Group Policy ACL, https://m.youtube.com/watch?v=nekC3_z5SDk. It’s akin to dACLs on the Cisco Catalyst. I can’t find any information on the Meraki site about it, but it was included in the MS14.5 release notes - so you’d need to run the beta code train. thanks for pointing me to that - I´ll have a look and try to understand how this can be used probably in my deployments as well 🙂
... View more