Community Record
2309
Posts
3563
Kudos
204
Solutions
Badges
Sep 23 2020
3:57 AM
@redsector wrote: But what I see is that both MXes are spaking with that WAN IP address. Yes, both have a connection to the dashboard. It is completely different compared to for example an ASA where you can configure it with only one usable public IP.
... View more
Sep 23 2020
3:46 AM
3 Kudos
This is not how MX HA works. Both units need individual connections to the internet, you can not share one IP on both appliances. Two/three solutions come to mind: 1) use a separate IP for the second MX 2) Use a different ISP on the spare MX, that could be e simple LTE-router just for dashboard connectivity, and in case of primary MX failure, you connect the primary ISP to the second MX 3) Use the second MX as a cold spare
... View more
Sep 22 2020
1:39 PM
As a test, can you change the printer from plain SMTP to SUBMISSION (tcp/587 with username/password)?
... View more
Does that mean you are using the roaming-client or the AnyConnect roaming module on the PCs? Are the wireless and wired clients using the same policy and Domain-config? Also, go to Activity search in the Umbrella Dashboard and search for your internal Domain name. If it shows up, the domain-management is configured incorrectly.
... View more
Did you change your Umbrella-Setup recently? And who sends the DNS-requests to Umbrella? The client, the MX, a VA? I would first look at the Umbrella dashboard and/or the MX-Umbrella-config if your domain names (the domains that should be processed by your DNS) are configured correctly.
... View more
- Do the WLAN clients receive the right DNS-server? - Is it only DNS and the rest is working as expected? If nothing works, Did you perhaps forgot to allow the WLAN clients access to local LAN under Wireless -> Firewall?
... View more
Sep 21 2020
5:17 AM
2 Kudos
A default route is always 0.0.0.0/0 and not /24. What is your topology. The other gateway is connected to a LAN-Port and not the WAN port? In general, the Internet should be connected to WAN.
... View more
Sep 18 2020
10:22 AM
Yes, that was a faulty assumption. Content-filtering is not done when the traffic reaches the MX over the VPN-Tunnel. Best solution (IMO): Deploy Cisco Umbrella to the branches and configure Content-filtering there.
... View more
Sep 18 2020
5:44 AM
1 Kudo
I don't think that you can get a good answer here as there is nothing like a backup in the Dashboard. If you want to achieve something a backup is for, like your mentioned getting back to operation after a disaster, there is only one way: Generate a script that builds all your networks via API and document exactly where manual adjustment is needed if the API can't do it.
... View more
Sep 18 2020
5:34 AM
Can you explain what you mean with "and I need to be on this VLAN also"? If your DHCP-server is in VLAN 1 and the client is in VLAN X, then DHCP-relay is the feature to use. If your client is in the same VLAN as the DHCP-server, no DHCP-functionality is needed on the L3 device (the MX) between them as the DHCP-server can directly give the client its config.
... View more
Sep 18 2020
2:48 AM
@Cain wrote: Indeed this is my current work around. I have a webhook that fires off a Python script that modifies the layer 7 rules when the WAN link changes. Do you have a blog? Would be worth publishing your solution.
... View more
Sep 18 2020
2:24 AM
I also have no easy solution and having separate rules per WAN-interface would be really great for this use-case. But how are your Python skills? Based on the availability of the primary link, you could change the L7 firewall rules with the Dashboard-API.
... View more
Sep 17 2020
7:34 AM
2 Kudos
If you have some dollars of the budget left, look at Cisco Umbrella. In my experience, the Blocking of inappropriate content is more powerful than the MX-built-in content filter.
... View more
Sep 16 2020
9:59 AM
2 Kudos
All in all, that should work. If you have a spare public IP, I would put the MX in parallel to the ASA and migrate the branches. This way you don't have to change the MX when done and you can also directly use the security-features of the MX for your outgoing traffic.
... View more
Sep 15 2020
1:06 PM
1 Kudo
Never used them myself, but have heard good things about http://www.acceltex.com/skins/
... View more
Sep 10 2020
1:35 PM
Sounds good, I would also expect that it will work. When adding the route to the router/firewall, make sure that this device is able to "hairpin" the traffic. For example, a Cisco ASA would not do that without dirty config.
... View more
Sep 9 2020
7:12 AM
1 Kudo
The approach of configuring a 192.168.0.0 network on Site B can not work. That would be L2 bridging which is not available on the MX and in most cases not a good solution. There should be no difference in the VPN connectivity of dual-armed vs. one-armed. Is it only the VPN-connection that is failing or also the connection to the VPN registry? Have you done any changes at the site1 MX? Is there any config for the 192.168.10.0 in MX1? That could be a problem.
... View more
Sep 9 2020
5:52 AM
First, this should work and it is pretty much what I am running in my office (MX in routed mode) and home-office (Z3 in concentrator mode in a DMZ of a Firepower Appliance). If it does not work I would first look at the internet-connection of the spoke-MX. Is the access-control and NAT ready to support the MX? But I would also evaluate if you can replace the current firewall with the MX or add the MX to the given setup in routed mode with a direct connection to the internet. That could make everything a little easier.
... View more
Sep 8 2020
9:03 AM
But if two systems are synchronized or one replicates to the other, then we can not call this a backup. If the dashboard config gets screwed up, the switch will be screwed up seconds later automatically.
... View more
Sep 5 2020
2:55 AM
1 Kudo
Ok, there is more than the splash-page. Make sure that a single user can not saturate your internet-link. Could be done by a per-client bandwidth limit. Make sure that bulk traffic like online-backup is shaped to a reasonable amount. Filter traffic to the internet that can be harmful to others. I generally do not allow guests tcp/25 and snmp. Also think about L7 filters for things like P2P applications. Configure Layer 2 LAN isolation so that one guest can not attack another. This is automatically done if you use Meraki DHCP.
... View more
Sep 5 2020
2:49 AM
I do not think that there are general best practices. But there are different goals that a hotel could have. Some want to make money with the WLAN, some want to provide best guest experience. As a traveler, I of course prefer the second goal. If your local rights allow this, I would go for the "click through" splash page. The guest has to accept an "acceptable use policy" and is connected to the internet. That is very convenient for the guest.
... View more
Sep 5 2020
2:29 AM
1 Kudo
As always: "it depends". Best you go through all the possibilities that you have with Meraki-Splash-pages and pick the one that fits your need. Here are some documents to start: https://documentation.meraki.com/zGeneral_Administration/Cross-Platform_Content/Splash_Page https://documentation.meraki.com/zGeneral_Administration/Cross-Platform_Content/Customizing_the_Splash_Page https://documentation.meraki.com/MR/MR_Splash_Page/Splash_Page_Details_for_Meraki_MR
... View more
I am not sure if I get you right, but have you looked at the Organization Summary Report? There you can: Restrict to a time range select a network select an SSID And there you see the Clients per day:
... View more
Sep 2 2020
12:00 PM
Not the way that you have an FMC and FTP managed by the Meraki-Cloud. For having *one* cloud-managed solution, the Cisco Defense Orchestrator (CDO) is the Cisco solution. But it is likely that it does not fit your needs (yet). But you still can manage the FTD/ASA locally. Yes, I also do not really like that, but for now, it is IMO the only usable way.
... View more
Sep 2 2020
11:38 AM
Actually, the possibilities are highly limited here. The traffic from VPN-clients is subject to the L3 firewall, but for your use-case, you would need differentiated access. And as we can not apply group-policies via RADIUS for VPN-users as it is possible with wireless users, all clients are treated the same. I really hope for more possibilities with the coming AnyConnect support. How do I solve this problem? Nearly all my Meraki implementations have an additional ASA for all Client- and external S2S VPNs. A cheap Firepower 1010 is very often enough here.
... View more
- « Previous
- Next »
My Accepted Solutions
Subject | Views | Posted |
---|---|---|
950 | 2 weeks ago | |
477 | 3 weeks ago | |
1309 | Mar 6 2025 4:14 AM | |
1022 | Feb 14 2025 4:30 AM | |
374 | Feb 12 2025 10:54 PM | |
468 | Jan 31 2025 2:18 PM | |
434 | Jan 21 2025 1:30 AM | |
636 | Jan 2 2025 8:53 AM | |
1162 | Dec 13 2024 10:41 AM | |
1001 | Nov 18 2024 1:38 AM |
My Top Kudoed Posts
Subject | Kudos | Views |
---|---|---|
19 | 6573 | |
18 | 30650 | |
18 | 41209 | |
13 | 7732 | |
13 | 9733 |