Site-to-site VPN or Client? As @ww noted, AutoVPN tends to work fine behind NAT/PAT for the most part. Obviously, if it is Client VPN, you'll need port forwards configured as the traffic will never hit the WAN interface of the MX otherwise. On your query about the smaller ISP, yes, if they obtain a block of routable public IP's and the firewall is able to use one of those, no port forwarding would be necessary.
... View more
Check the logs for "ethernet port carrier change" and see if it is just the WAN interface flapping or other ports too. This is what was happening on an MX84 I manage:
... View more
Yes, that does indeed look disabled. See if the problem goes away with the new unit, if it doesn't, I'd investigate this angle more deeply. The flapping I experienced on an MX84 was all active interfaces and was related to AnyConnect getting hammered and not related to the device.
... View more
The Aruba 2920 family also supports 802.3az, which is what is known to cause the flapping. Your ISP router may as well. See if you can disable it on the port that the MX is connected to.
... View more
No problem. As I posted above, both of those switches you are using definitely support 802.3az (EEE), so that's likely the problem. Anything from the Cisco 2960-S family doesn't: https://www.cisco.com/c/en/us/products/collateral/switches/catalyst-2960-s-series-switches/data_sheet_c78-726680.html If you scroll down to standards, you'll see that 802.3az is not listed. Lots of them out there, I have a pile of them here.
... View more
Do you have access to an older Cisco switch that for sure doesn't have EEE? I'm using a stack of 2960S's at a client and they definitely don't have it and they are rock solid.
... View more
A number of different connection types, one is wireless (cellular) but was previously on wireless P2P, others are cable and DSL. My 150 option is set to the tftp server I have running at the HO in this system which has the handset configs and phone firmware loads on it. One thing you might want to check is to ensure that there's no firewall rules blocking access from the remote subnets to your TFTP server.
... View more
OK, thank you. There are two things that will cause a flap: 1. 100% CPU spikes, but these, in my experience, flap all the active interfaces 2. Energy Efficient Ethernet being enabled on a non-Meraki switch or router. This is a known issue. What is the make/model of the switch you are using between the ISP and the MX?
... View more
When I had an MX84 hitting 100% and flapping the interfaces, it was all the interfaces that were active. If you are only seeing the WAN interface flap, I'd suspect it isn't a crash, as all should flap under a crash as well.
... View more
If there was no route to your new IP, you'd have no internet on that device. Are these straight-up modems or is it possible that the device got reset and is now in modem/gateway mode? Even if the external routable IP didn't change in that scenario (Appliance Status -> WAN1 would still show the correct external IP) of course the MX would be unreachable, but could still get to the internet. What do you see under Appliance Status -> Uplink -> WAN1 ?
... View more
I had to get the CPU utilization figure from support. In my case, I had all active ports flapping, not just the WAN links, so if you are only seeing it on the WAN side I'd assume the issue isn't the same. Just figured I'd mention it.
... View more
May not be germane to your issue but I figure I'd mention it: On a client's MX84 I was seeing frequent flaps of not only both uplinks but also the active LAN ports. Turns out the AnyConnect service was getting hammered by malicious actors and spiking the CPU to 100%, which caused the flap. Moving AnyConnect to a different port solved the problem.
... View more
This would be something to bring up with Cisco directly, not Meraki, as the AnyConnect client is really more ported to Meraki rather than it being a development platform. If you have an AnyConnect license, you can submit a ticket through the conventional Cisco TAC support channel.
... View more
Not the final photo, but started colour coding with the proper length cables the links at a client's site (everything was blue, EVERYTHING). Orange are uplinks, purple is voice, red is a managed service. The trendnet is no longer there. Not shown is the stack of 2960S's also colour coded.
... View more
As long as you have access to both pieces of equipment, it's pretty easy to setup. I've got a couple different pieces of hardware with a VPN tunnel landing on an MX84, one is a Sonicwall, the other is an ISR and the setup was very straight-forward.
... View more
Should definitely not be causing drops. How frequent are we talking here? It sounds like it is frequent enough that you've considered site-to-site, what's securing those other sites presently?
... View more