In the most strict full stack Meraki environment here is an overview of our security. Security Appliance (MX) - Redundant Security Appliance>Content Filtering Make sure to enable Full List Security Appliance>Threat Protection AMP Enabled Intrusion Detection and Prevention set to Prevention/Balanced Security Appliance>Firewall Deny Peer-to-Peer (P2P) All P2P Deny Countries Traffic to/from Firewall rules to deny all traffic from our guest Vlan to other internal networks We maintain a public guest vlan/network and a private internet only vlan/network. One of the lesser considered issue is that if one of your devices fails over to the guest Vlan that could be the very same Vlan that public computers are on. Your protected machine could inadvertently fail 802.1x and end up on the public Vlan due to expired AD password etc. To combat this we have a separate internet only vlan/network for credit card machines, 802.1x failing devices, etc. This helps prevent the co-mingling of public devices with our trusted internal devices. Switches All ports enabled for 802.1x and will failover to guest Vlan Mac Whitelist used for ports with printers Switch>IPv4 ACLs to restrict certain traffic to/from sensitive devices Wireless Private subnet isn't advertised, deployed using Group Policy so machines know what to connect to Pulic Guest Vlan using Meraki DHCP and Deny access to Local LAN Non Meraki AV and Patching OpenDNS Umbrella - This has been one of the biggest tools for helping our users prevent getting malware/crypto. I hope know that Cisco owns this product that it eventually takes the place of Meraki's Content Filter.
... View more