Community Record
1807
Posts
2264
Kudos
186
Solutions
Badges
Jun 12 2020
8:40 AM
4 Kudos
What is the goal of this design? My initial answer is simply that you shouldn't do this as it doesn't add any value while greatly increases complexity, but let's hear the use case and go from there.
... View more
All Meraki AP's have support for Air Marshal. https://documentation.meraki.com/MR/Monitoring_and_Reporting/Air_Marshal But the better question is do they have a dedicated scanning radio, or do they have to do opportunistic scanning with their main radios? The datasheet @Adam2104 linked to shows the MR30H's have a dedicated radio, which is by far the better option.
... View more
Jun 10 2020
11:27 AM
3 Kudos
I also wanted to know how on earth you pulled that off. Fun story!
... View more
Jun 4 2020
1:00 PM
1 Kudo
10.0.0.1 does not refer to any interface. In this case it's a virtual IP (VIP). It's not actually assigned anywhere.
... View more
Jun 4 2020
6:27 AM
5 Kudos
Great work everyone!
... View more
Jun 2 2020
7:27 AM
@Terry_Watson wrote: You have highlighted another issue in that if I do not configure all the subnets on the branch MX, how do I tell the branch MX to allow these subnets over the Auto VPN? There must be a way as there would be little point in having a core/distribution layer in the Meraki solution. I'm looking into that now! This is doable, though slightly painful. You are also able have static routes participate in AutoVPN. Since the MX can't learn routes from the MS anyway, you're going to need to add one or more static routes to the MX for subnets downstream of the MS. If you add one route for each subnet (instead of one supernet route) you will then be able to add each static route (subnet) into the AutoVPN individually.
... View more
Jun 2 2020
7:07 AM
2 Kudos
ACLs are available on L2 only switches, so these are not tied to an L3 SVI on a switch. This is a good question and I've never had to dig into the answer before... I've used these ACLs a few times and they do what they are supposed to do. So thinking about it I would hazard a guess that the ACLs are applied somewhere in the ingress side of the switch backplane, before a MAC table lookup is done to determine egress port (egress port being one of the physical ports for L2 forwarding, or an SVI for L3 forwarding). One big thing to remember with these ACLs is that they are stateless.
... View more
Jun 2 2020
7:00 AM
1 Kudo
Hey @Terry_Watson, You said these are two different sites? So is the intention to run AutoVPN between the two MX's at each location? If so then you do not need OSPF to propagate routes between MX's as that is handled by the Cloud. In the Site to Site VPN settings, there's a section to select with local networks participate in the VPN. By selecting a network to participate you are actually configuring a route to be propagated to VPN peers via the Cloud control plane. It's due to this that no OSPF is needed. https://documentation.meraki.com/MX/Site-to-site_VPN/Meraki_Auto_VPN But on the LAN side of an MX appliance @CptnCrnch has it bang on, the MX can advertise routes, but it will not install OSPF learned routes in its routing table. Also, watch out for the VLANs must be disabled requirement to even enable OSPF!
... View more
My experience in the past with this is usually support will run through basic troubleshooting with you, and still try and help out, but if for any reason the problem could be remotely related to the SFP they will stand down and request that you replace it with an official one.
... View more
May 27 2020
3:11 PM
2 Kudos
https://documentation.meraki.com/zGeneral_Administration/Monitoring_and_Reporting/SNMP_Overview_and_Configuration#SNMP_Traps You need to call support and get them to enable it. You configure it globally on the Network-wide > Alerts page (visible after it's been enabled). It cannot be configured per-device.
... View more
May 26 2020
7:11 AM
3 Kudos
Hey @Gabriele, There's a design limit of 128 clients per radio built into the AP's. https://documentation.meraki.com/MR/WiFi_Basics_and_Best_Practices/Approximating_Maximum_Clients_per_Access_Point But, that said, in real world operation you will probably find that acceptable performance levels will require you to design for far less users per radio. I'd say a good rule fo thumb is to keep it under 30, depending on the type of usage.
... View more
May 25 2020
7:30 AM
4 Kudos
Hi @nikmagashi, Firewall rules on the MX are not able to filter traffic that is destined for any interface on the MX. So your example where you say that you can still reach the gateway IP of other VLANs is normal operation, assuming those gateway IP's are all on the MX. This is a quirk of the MX and unfortunately not something you can prevent.
... View more
May 22 2020
12:25 PM
2 Kudos
Sorry, I take that back! I should know better to double check before I answer! It looks like tunnel-group-id is honoured, but it needs to be the VLAN number, not the name. https://documentation.meraki.com/MR/Encryption_and_Authentication/Configuring_RADIUS_Authentication_with_WPA2-Enterprise#Supported_RADIUS_Attributes
... View more
May 22 2020
12:23 PM
3 Kudos
So the answer is no to tunnel-group-id, but I see there is Filter-Id in the response. You can use that to assign a Group Policy to the user/device, which in turn can specify a VLAN. Maybe that approach will work for you? https://documentation.meraki.com/MR/Group_Policies_and_Blacklisting/Using_RADIUS_Attributes_to_Apply_Group_Policies https://documentation.meraki.com/zGeneral_Administration/Cross-Platform_Content/Creating_and_Applying_Group_Policies
... View more
May 13 2020
12:59 PM
@jriordan HAHA ok well I can't win... Might as well turn everything off again 😛
... View more
May 13 2020
12:07 PM
4 Kudos
I'm in!
... View more
May 11 2020
7:17 AM
2 Kudos
Hi @mugrene, To do this you will need to apply the content filtering rules through a Group Policy. https://documentation.meraki.com/zGeneral_Administration/Cross-Platform_Content/Creating_and_Applying_Group_Policies I would think the best way is to create your GP with the schedule and content rules you want, and then apply it to the VLAN you want to enforce those rules on.
... View more
No, you can't do this.
... View more
May 5 2020
6:53 AM
3 Kudos
Well done everyone! Great work all around.
... View more
Apr 30 2020
8:20 AM
1 Kudo
Are you pinging between Widows machines? Turn off Widows FIrewall.
... View more
My Accepted Solutions
Subject | Views | Posted |
---|---|---|
3556 | Jan 27 2021 8:43 AM | |
4070 | Nov 27 2020 11:14 AM | |
2155 | Aug 28 2020 1:39 PM | |
9679 | Aug 28 2020 1:16 PM | |
9728 | Aug 25 2020 8:28 AM | |
2580 | Aug 18 2020 2:38 PM | |
6108 | Jun 23 2020 7:07 AM | |
2516 | Jun 19 2020 1:49 PM | |
3413 | Jun 5 2020 12:39 PM | |
6902 | Jun 2 2020 7:07 AM |
My Top Kudoed Posts
Subject | Kudos | Views |
---|---|---|
42 | 167859 | |
16 | 38105 | |
11 | 55191 | |
11 | 62636 | |
8 | 2215 |