The Meraki Community
Register or Sign in
cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Show  only  | Search instead for 
Did you mean: 
  • About GreenMan
GreenMan

GreenMan

Meraki Employee

Member since Oct 18, 2017

yesterday
Kudos from
User Count
PhilipDAth
Kind of a big deal PhilipDAth
196
Jim_Liang
Meraki Employee Jim_Liang
3
GIdenJoe
Kind of a big deal GIdenJoe
5
Brash
Head in the Cloud Brash
28
MeredithW
Community Manager MeredithW
11
View All
Kudos given to
User Count
Ryan_Miles
Meraki Employee Ryan_Miles
5
PaulF
Meraki Employee PaulF
2
PhilipDAth
Kind of a big deal PhilipDAth
29
ww
Kind of a big deal ww
9
Brash
Head in the Cloud Brash
8
View All

Community Record

573
Posts
603
Kudos
63
Solutions

Badges

Everybody Wins
Year 1 - MVM
1st Birthday
Year 5 - MVM
5th Birthday
500 Posts View All
Latest Contributions by GreenMan
  • Topics GreenMan has Participated In
  • Latest Contributions by GreenMan
  • « Previous
    • 1
    • 2
    • 3
    • 4
    • …
    • 21
  • Next »

Re: Meraki AutoVPN / site-to-site Connectivity Issues

by Meraki Employee GreenMan in New to Meraki
‎11-28-2022 02:45 AM
‎11-28-2022 02:45 AM
Usually disconnects from the VPN registry servers would show with a different event, compared with site-to-site tunnel drops.   Also disconnects from those registries would not usually affect the actual site-to-site tunnels themselves, so I'm a bit surprised this was the single fix for your issue. ... View more

Re: vMX configuration

by Meraki Employee GreenMan in Security / SD-WAN
‎11-25-2022 09:25 AM
3 Kudos
‎11-25-2022 09:25 AM
3 Kudos
The VMX in routed mode does not support firewall function at this time. Did you read this?   :   https://documentation.meraki.com/MX/Other_Topics/vMX_NAT_Mode_Use_Cases_and_FAQ ... View more

Re: Meraki BYOD with Intune Integration

by Meraki Employee GreenMan in Developers & APIs
‎11-25-2022 08:47 AM
‎11-25-2022 08:47 AM
Whilst this covers only PEAP-MSCHAPv2 (which uses username+pwd for client auth, rather than certs) this doc would be a good starting point for understanding Meraki working with NPS.   https://documentation.meraki.com/MR/Encryption_and_Authentication/Configuring_RADIUS_Authentication_with_WPA2-Enterprise You will need to consult NPS documentation for more detail around using cert-based client auth.   Have you considered working with a partner IT company to help you integrate these things?   A good one will have done this before. ... View more

Re: Meraki BYOD with Intune Integration

by Meraki Employee GreenMan in Developers & APIs
‎11-25-2022 08:34 AM
1 Kudo
‎11-25-2022 08:34 AM
1 Kudo
Well - all the cleverest stuff in such deployments is done by either InTune (check Microsoft documentation) or the RADIUS server.   Do you already have a RADIUS setup?   You could consider Cisco ISE, for which this would be a good place to start:   https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/214975-configure-eap-tls-authentication-with-is.html#anc8   Have a read of this to understand the Meraki AP role in the setup:  https://documentation.meraki.com/MR/Encryption_and_Authentication/RADIUS%3A_WPA2-Enterprise_With_EAP-TLS It mainly acts to relay details between the client and RADIUS server and implement the authentication decisions and related stuff arising from the RADIUS server's intervention.   Having separate vendors for the various components of such setups can make it more difficult to implement.    This is why some customers choose to simplify as far as possible;   using Meraki Systems Manager for MDM, with Meraki APs and Cisco ISE for RADIUS.   You still have other vendors for the client OS's + 802.1x supplicants, of course, but it can really help. ... View more

Re: API - Get Route table

by Meraki Employee GreenMan in Developers & APIs
‎11-25-2022 07:06 AM
5 Kudos
‎11-25-2022 07:06 AM
5 Kudos
There is a formal feature request in the system for this - I suggest you contact your Meraki account team to have them add your weight to the ask. ... View more

Re: Meraki BYOD with Intune Integration

by Meraki Employee GreenMan in Developers & APIs
‎11-25-2022 07:03 AM
‎11-25-2022 07:03 AM
I would have thought you could use InTune to push a WiFi profile with digital certs and config for EAP authentication for full 802.1X with a RADIUS server - that way you end up with WiFi encryption too - not just authentication. ... View more

Re: Azure VMX Mikrotik Site to Site VPN

by Meraki Employee GreenMan in Security / SD-WAN
‎11-25-2022 06:26 AM
‎11-25-2022 06:26 AM
You'll need to think about your traffic flows.   It's not clear how many Mikrotik sites are involved here, nor how traffic is required to flow between locations with MX appliances, Azure and Mikrotik equipped sites.  One thing you won't be able to do;   connect your MX appliances and your Mikrotik routers to the same VMX and have traffic flow from edge to edge using that common VMX hub as a hairpinning point.  If you want an MX site to talk to a Mikrotik site, you will need a direct non-Meraki VPN tunnel directly between (each of) them. ... View more

Re: What is the best practice?

by Meraki Employee GreenMan in Security / SD-WAN
‎11-23-2022 07:58 AM
2 Kudos
‎11-23-2022 07:58 AM
2 Kudos
If you have just a single MX, you have no onsite servers and all your SVIs (default gateways) are handled by the MX, then I'd say you were fine to link all your switches direct to the MX, reducing hop count etc - in such a setup, there would be no loops to resolve and no advantage from ASIC-powered routing (in a L3 switch).   If you are using warm spare (dual MXs) I'd definitely go with @KarstenI 's recommendation;   aggregate your switches to a stack of two switches, then put resilient links in as per the Recommended Topologies section of the warm spare document that @alemabrahao linked - and use Spanning Tree to resolve loops as needed and 're-open' blocked links when required upon failure. ... View more

Re: A possible typo in MV sense MQTT documentation

by Meraki Employee GreenMan in Documentation Feedback (Beta)
‎11-22-2022 08:55 AM
2 Kudos
‎11-22-2022 08:55 AM
2 Kudos
Agree they can't both be right.   Using the "Where is it" example as the arbiter, I'm thinking the diagram is right and the test in the table is wrong.    I'm looking into confirming this with the product team. ... View more

Re: MX Site-to-Site VPN with BGP

by Meraki Employee GreenMan in Security / SD-WAN
‎11-21-2022 04:49 AM
3 Kudos
‎11-21-2022 04:49 AM
3 Kudos
Did you see this?   https://documentation.meraki.com/MX/Deployment_Guides/vMX_and_Azure_Route_Server ... View more

Re: MX Site-to-Site VPN with BGP

by Meraki Employee GreenMan in Security / SD-WAN
‎11-21-2022 04:40 AM
2 Kudos
‎11-21-2022 04:40 AM
2 Kudos
There are so many advantages to using VMX (and therefore AutoVPN) over non-Meraki VPN, that it's hard to know where to start.   The most important is likely to be in the resilience offered;   your MXs connect to both VMXs concurrently and you get far better failover capability - particularly if your branches also have dual WAN uplinks.   Given the importance of modern Azure deployments, it really costs in, for most customers. ... View more

Re: Meraki Order details before claiming it

by Meraki Employee GreenMan in Dashboard & Administration
‎11-21-2022 04:23 AM
4 Kudos
‎11-21-2022 04:23 AM
4 Kudos
Did you try starting the order claim process in the Dashboard?   I seem to recall that it gives you details of what's contained, before you actually commit to claiming it?   (I must admit:   it's a while since I claimed an order number, rather than just a license - which definitely does something along those lines.)   The Cisco partner, who you placed your order through, should also be able to give you all the details - or get hold of your Meraki account team - details are under Help > Get help > Still need help? > Contact your Meraki sales representative, in the Dashboard. Is there a reason why you need to know what's in it, before claiming?   You can always rollback a claim, for a period after doing so... ... View more

Re: MX Site-to-Site VPN with BGP

by Meraki Employee GreenMan in Security / SD-WAN
‎11-21-2022 04:16 AM
2 Kudos
‎11-21-2022 04:16 AM
2 Kudos
This isn't possible with non-Meraki VPN.   Did you consider using vMX in Azure instead?   This would allow all the SD-WAN features, in addition to BGP ... View more

Re: Application of a Data Cap on Meraki MX link or MG

by Meraki Employee GreenMan in Security / SD-WAN
‎11-21-2022 02:57 AM
2 Kudos
‎11-21-2022 02:57 AM
2 Kudos
There's no way to do this natively within the Dashboard, that I'm aware of.   You would be able to monitor cellular usage, however, via the API - you could then trigger additional API-based controls, once usage reaches your preferred threshold(s): https://developer.cisco.com/meraki/api-v1/#!get-network-appliance-uplinks-usage-history   Perhaps by progressively stepping up cellular firewall rules, as the limit approaches - maybe ultimately allowing only the most critical / bandwidth thrifty applications?    https://developer.cisco.com/meraki/api-v1/#!update-network-appliance-firewall-cellular-firewall-rules   ... View more

Re: Replacement bracket for MV32

by Meraki Employee GreenMan in Smart Cameras
‎11-17-2022 02:27 AM
5 Kudos
‎11-17-2022 02:27 AM
5 Kudos
You will need this product SKU:   MA-MNT-MV-61 Note it's the same one for MV12 ... View more

Re: Can Meraki create an isolated network suitable for building/facility sy...

by Meraki Employee GreenMan in Full-Stack & Network-Wide
‎11-16-2022 09:46 AM
‎11-16-2022 09:46 AM
OK, so you could continue to use your L3 switching Core and apply Access Control Lists there, for your BMS separation.   Is there a particular reason why you route between VLANs on your switches, rather than the MX?  There are potential performance advanatages doing that (as it's done in ASIC) - but they tend to only accrue if you have servers located onsite and a decent amount of east-west traffic (particularly between servers in different VLANs).   Increasingly servers tend to be away across a WAN link somewhere, where the uplink capacity is the main bottleneck.   https://documentation.meraki.com/MS/Layer_3_Switching/Configuring_ACLs https://documentation.meraki.com/MS/Other_Topics/Switch_ACL_Operation  ... View more

Re: ACLs for Multiple Networks/VLANs

by Meraki Employee GreenMan in Switching
‎11-16-2022 09:35 AM
2 Kudos
‎11-16-2022 09:35 AM
2 Kudos
You don't need to apply an ACL to a specific entity, like a VLAN or SVI, like you do with similar solutions.   Note this from the beginning of the guide: <With Meraki, you only have to define an ACL once in a network and it will be propagated to all switches within that network. Additionally, the default rule for Meraki ACLs is "Permit Any Any">     'Network' in context means a specific Network within the Meraki Dashboard (i.e. it will be applied on all switches, effectively on all ports on those switches.   You therefore just need to get the sources and destinations right, for them to work properly. Note though that it is possible, within any ACL, to choose to specify a source VLAN - but the default is Any   https://documentation.meraki.com/MS/Layer_3_Switching/Configuring_ACLs https://documentation.meraki.com/MS/Other_Topics/Switch_ACL_Operation   ... View more

Re: Can Meraki create an isolated network suitable for building/facility sy...

by Meraki Employee GreenMan in Full-Stack & Network-Wide
‎11-16-2022 09:27 AM
2 Kudos
‎11-16-2022 09:27 AM
2 Kudos
It's not clear quite what Merki gear you have, but personally I'd recommend the following approach, which matches some of the previous replies: Having separate physical networks for this kind of thing is a dying approach, I would say and for good reasons, that I won;t go into. Provision one common reliable, resilient, performant network for all of your traffic, then apply appropriate logical separation and controls (e.g. rate shaping) for the stuff that needs it (that probably includes BMS).   While there are other approaches, simply using VLANs and firewalling between them is a relatively simple and well understood and scalable approach.   Generally you provide one gateway per site that interconnects the VLANs at Layer-3 and this is where you define the (firewall) rules for what can talk to what.  In a Meraki network, you'd probably be best using an MX appliance as that common gateway.  It would also provide the necessary protection between your Internet uplink - particularly if you use the Advanced Security license. ... View more

Re: Monitoring account without screen-saver

by Meraki Employee GreenMan in Dashboard & Administration
‎11-15-2022 03:38 AM
‎11-15-2022 03:38 AM
Try an auto-refresh plug-in for your preferred browser ... View more

Re: MX67c with phone/PC connected to the same LAN port

by Meraki Employee GreenMan in Security / SD-WAN
‎11-14-2022 03:48 AM
‎11-14-2022 03:48 AM
What you won't be able to do is power the phone off the MX;   you'll need a PoE injector ... View more

Re: Setting up Meraki ms320 at home

by Meraki Employee GreenMan in New to Meraki
‎11-14-2022 03:45 AM
3 Kudos
‎11-14-2022 03:45 AM
3 Kudos
You will require a quote from a Cisco authorised partner for your license, the SKU will be in the following form: LIC-MS320-48xx-xYR There are three models;   non-PoE (simpoly remove the xx) Low Power (xx=LP) or Full Power (xx=FP)    Then you have the choice of 1, 3 or 5 years licensing, for the last x   (7 or 10 year licences available, but for a model that's already end of sale, that might not be sensible). You must match the license to the model of switch hardware that you have;   you can't for exampe, use a non-PoE license for a PoE switch. ... View more

Re: Unable to log a case and "Support number not recognized" when calling t...

by Meraki Employee GreenMan in Dashboard & Administration
‎11-11-2022 07:48 AM
2 Kudos
‎11-11-2022 07:48 AM
2 Kudos
Email support@meraki.com ... View more

Re: Manual Channel Assignments Return to Channel 6

by Meraki Employee GreenMan in Wireless LAN
‎11-11-2022 07:48 AM
‎11-11-2022 07:48 AM
If you statically configure a 2.4 GHz channel properly, it won't move away from there.   Are you sure you haven't just chaned the config to amend the channels which can be chosen by the autochannel mechanism?   I would agree with the previous comment to stick with 1, 6 or 11 btw, whether you do this dynamically or via manual assignment.  Personally I'd stick with auto if you can, because this will take account of transient changes to background channel utilization.  Only go with static if you're finding the sheer number of channel changes actually create more disruption than it's worth.   Also;   assuming you have mainly dual-band devices, turn on band steering, if 2.4 GHz is proportionately over-utilised. https://documentation.meraki.com/MR/Radio_Settings/Band_Steering ... View more

Re: Stack Uplinks

by Meraki Employee GreenMan in Switching
‎11-11-2022 07:39 AM
1 Kudo
‎11-11-2022 07:39 AM
1 Kudo
The single uplink would just be for building the stack in the first place.   You'd then create the aggregate link configuration (at both ends), for the addition of your second link.   you don't need an uplink for each individual switch.   https://documentation.meraki.com/MS/Port_and_VLAN_Configuration/Switch_Ports#Link_Aggregation    ... View more

Re: MX100 firmware upgrade broke eigrp

by Meraki Employee GreenMan in Security / SD-WAN
‎11-10-2022 07:36 AM
2 Kudos
‎11-10-2022 07:36 AM
2 Kudos
Something doesn't sound quite right here, if VPNC MXs logically sit between your perimeter firewall and core switches - VPNCs should sit 'off to one side' of one of those two layers  (usually the Core routing, to make things simpler)   If memory serves, EIGRP works layer 2, so I'd expect a VLAN directly between the Core and the firewalls, over which the EIGRP relationship is established.   The VPNC MX might be connected to the same VLAN,  but shouldn't be critical to the flow of that traffic (MX doesn't 'talk EIGRP') Now - I'm not saying the MX and its firmware wasn't directly involved in the issue though - if the problem started when the upgrade happened and was fixed as soon as you rolled back it's hard to argue with that - but I'd maybe look a bit deeper into your architecture.   I'd recommend talking further with Support on that, if needs be - but maybe with your Meraki account TSA too..? ... View more
  • « Previous
    • 1
    • 2
    • 3
    • 4
    • …
    • 21
  • Next »
Kudos from
User Count
PhilipDAth
Kind of a big deal PhilipDAth
196
Jim_Liang
Meraki Employee Jim_Liang
3
GIdenJoe
Kind of a big deal GIdenJoe
5
Brash
Head in the Cloud Brash
28
MeredithW
Community Manager MeredithW
11
View All
Kudos given to
User Count
Ryan_Miles
Meraki Employee Ryan_Miles
5
PaulF
Meraki Employee PaulF
2
PhilipDAth
Kind of a big deal PhilipDAth
29
ww
Kind of a big deal ww
9
Brash
Head in the Cloud Brash
8
View All
My Accepted Solutions
Subject Views Posted

Re: Like to compatability between MX100 and MX250

Security / SD-WAN
175 ‎12-22-2022 02:21 AM

Re: VPN access via SAML with Okta on the Meraki

Security / SD-WAN
194 ‎12-07-2022 02:31 AM

Re: Meraki MX 75 – (HA option)

Security / SD-WAN
203 ‎11-29-2022 07:13 AM

Re: Meraki Order details before claiming it

Dashboard & Administration
358 ‎11-21-2022 04:23 AM

Re: Replacement bracket for MV32

Smart Cameras
484 ‎11-17-2022 02:27 AM

Re: Z3 static route to MX hub

Security / SD-WAN
278 ‎09-15-2022 09:19 AM

Re: Meraki MS with ISE and DACLs

Switching
321 ‎09-15-2022 09:11 AM

Re: Moving Devices between Organizations

New to Meraki
522 ‎08-24-2022 06:48 AM

Re: syslog messages delivered by webhook

Security / SD-WAN
480 ‎07-28-2022 08:12 AM

Re: Cellular Gateway sendig SMS

Developers & APIs
588 ‎07-08-2022 05:05 AM
View All
My Top Kudoed Posts
Subject Kudos Views

Re: Additional SSID's on a single AP on a network.

Wireless LAN
8 295

Re: VPN access via SAML with Okta on the Meraki

Security / SD-WAN
7 194

Re: MR76 antennas included?

Wireless LAN
7 2085

Re: Renew my licensing

Dashboard & Administration
6 753

Re: MT connections

Sensors
6 1693
View All
Powered by Khoros
custom.footer.
  • Community Guidelines
  • Cisco Privacy
  • Khoros Privacy
  • Privacy Settings
  • Terms of Use
© 2023 Meraki