Community Record
6658
Posts
3944
Kudos
522
Solutions
Badges
3 weeks ago
It's a complicated situation, unless you have another admin in the organization who can access it for you, there's nothing you can do. Unfortunately, not even support will be able to help you. That's why it's recommended to always have more than one admin in the organization.
... View more
3 weeks ago
1 Kudo
They are the same for 5GHz, but MR44 has half the streams for 2.4GHz. MR44 2x2:2 for 2.4GHz, but 4x4:4 for 5GHz MR46 4x4:4 for both So there is not much benefit.
... View more
3 weeks ago
@PhilipDAth , from what I understand she is not using Sponsored guest login but rather an open SSID with Sign-on with Meraki Cloud Authentication, which allows guests to create their own account.
... View more
3 weeks ago
5 Kudos
Not IPs, because Meraki provides a /8. The thing is that the number of connected clients will certainly influence the user experience. Technically speaking, the maximum number of recommended clients is 30 per access point. Of course, there are many other factors that can influence the user experience, such as the type of traffic passing through the Wi-Fi, signal quality, interference, etc.
... View more
3 weeks ago
There is no specific date yet. But taking into account other models, it can be said that it has a useful life of 5 years.
... View more
3 weeks ago
It won't be an easy task, it will involve knowledge in programming and APIs. Basically you will need to use two APIs, one to GET users and another to update them. https://developer.cisco.com/meraki/api-v1/get-network-meraki-auth-users/ https://developer.cisco.com/meraki/api-v1/update-network-meraki-auth-user/ But of course you still have to develop all the logic according to your needs.
... View more
3 weeks ago
1 Kudo
802.11ac Wave 2 and older products will only upgrade to the backup version (MR 30.7.1) if they are in networks configured for MR 31.x.x versions, and thus, the new features will not be available. The bug fixes listed below will also not apply to Wi-Fi 5 Wave 2 and older MRs. (https://documentation.meraki.com/MR/Other_Topics/Cisco_Meraki_MR_Firmware_Restrictions_Overview_and_FAQ) Bug fixes General stability and performance improvements MR56 ethernet port flaps occur when connected to C9300-48UN(V04) at 5Gbps speeds MR57 ethernet port flaps occur when connected to MS355 at 5Gbps speeds MR46 not responding to Probe Requests from clients Channel & power not configurable via LSP on CW9163E APs Wildcard NAS-IPv6-Address AVP sent on config change (Wi-Fi 6, Wi-Fi 6E APs) NAS-IP-Address discarded (Wi-Fi 6, Wi-Fi 6E APs) RADSec authentication failures (Wi-Fi 6, Wi-Fi 6E APs) Sporadic packet loss & instability on Layer 3 roaming & Teleworker VPN SSID's (Wi-Fi 6, Wi-Fi 6E APs) DHCP offer is not forwarded if broadcast flag is set (Wi-Fi 7 APs) mDNS traffic blocked (Wi-Fi 7 APs) SSIDs broadcast on 6Ghz despite being disabled when using WPA3 transition mode (Wi-Fi 7 APs)
... View more
3 weeks ago
4 Kudos
Take a look at this: Signal-to-Noise Ratio (SNR) and Wireless Signal Strength - Cisco Meraki Documentation
... View more
3 weeks ago
3 Kudos
Unfortunately, the Meraki Display App does not support granular access control by tags for users created under Organization > Administrators. This means that users will see all VideoWalls and cameras they have access to, without the ability to restrict views based on tags. You can try creating local camera and sensor admins at the network level and assign them specific camera permissions. Under the Camera and Sensor Only admins section, create a new user and assign the appropriate permissions. Maybe it will work for you.
... View more
3 weeks ago
3 Kudos
Studying the tools, doing practical labs, reading the official materials. But the best way, in my opinion, is through practice, experiencing projects, facing difficulties and finding solutions. In other words, there is nothing better than acquiring experience.
... View more
3 weeks ago
I see two options for your case, use an email-to-SMS gateway as informed by Ryan, create an alert on the dashboard and associate it with a camera profile, or create a Webhooks and send alerts through a service like Twilio via API.
... View more
3 weeks ago
You can remove user from dashboard manually and that will delete the user from the org, but using API i think that is not possible because API just unauthorizes the user in the network , does not delete it from org level. Managing User Accounts using Meraki Cloud Authentication - Cisco Meraki Delete Network Meraki Auth User - Meraki Dashboard API v1 - Cisco Meraki Developer Hub Documentation
... View more
3 weeks ago
1 Kudo
Do you have an MX on your network? It’s not clear, we need more information. Here are a few things you can try. Make sure your split tunnel configuration is set up correctly. Verify that SIP signaling traffic is routed through the VPN and media traffic is routed through the local network. Make sure your firewall is not blocking RTP traffic. Disable any inspection of voice protocols such as SIP, SCCP, or H323. Perform detailed packet capture analysis to identify any anomalies or dropped packets. Try whitelisting the client to see if that improves the situation.
... View more
3 weeks ago
It's not possible, what you can do is open a support case to see if they can help you.
... View more
3 weeks ago
As informed, you need to add the second HUB in the Site to Site VPN settings.
... View more
3 weeks ago
Just one more information. Netflow is also supported on a subset of MS series switches. MS NetFlow and Encrypted Traffic Analytics - Cisco Meraki Documentation
... View more
3 weeks ago
3 Kudos
The MS-250 switches do not support NetFlow. NetFlow export is only available on Meraki MX and Z-Series devices.
... View more
3 weeks ago
Unless I misunderstood the request, but I did check that there is a case study, see page 36. https://www.ciscolive.com/c/dam/r/ciscolive/emea/docs/2024/pdf/BRKMER-1691.pdf
... View more
3 weeks ago
1 Kudo
Your main concern should be whether the connection is successful. It is common these days for someone to try to exploit a vulnerability. But it is a good idea to keep an eye out for any suspicious activity.
... View more
3 weeks ago
3 Kudos
There is another discussion about this. https://community.meraki.com/t5/Dashboard-Administration/Integrate-Meraki-Dashboard-with-Catalyst-Center-DNAC/m-p/261018
... View more
3 weeks ago
3 Kudos
The connection was rejected by the Radius server, that is, someone tried to connect but as the credential is probably not valid, it was not possible to establish the connection.
... View more
3 weeks ago
4 Kudos
Yes, the end server must support VLAN tagging if it is connected to a trunk port on the switch. Refer to the server's NIC documentation for specific configuration steps and troubleshooting tips.
... View more
My Accepted Solutions
Subject | Views | Posted |
---|---|---|
66 | yesterday | |
392 | Wednesday | |
145 | Tuesday | |
165 | Tuesday | |
95 | Tuesday | |
215 | Tuesday | |
227 | Monday | |
229 | a week ago | |
505 | 2 weeks ago | |
355 | 2 weeks ago |
My Top Kudoed Posts
Subject | Kudos | Views |
---|---|---|
9 | 1481 | |
8 | 3243 | |
8 | 4836 | |
7 | 4190 | |
7 | 2008 |