Community Record
1132
Posts
1262
Kudos
159
Solutions
Badges
Sep 23 2021
3:27 PM
1 Kudo
The Meraki devices only support two WAN/internet links, plus failover to either a USB cellular modem (or an inbuilt cellular modem in the case of MX67C and MX68CW). You’ve a couple of options: 1. Use the inbuilt cellular modem instead of the MG21 - then your failover will work WAN1 -> WAN2 -> Cellular. 2. Depending on what your network design is then you maybe able to achieve something using tracked routes on the MX, but your preferred path will need to be on a LAN port. You can then go LAN1 -> WAN1 -> WAN2. You won’t be able to do SD-WAN to the LAN port. Remember the WAN1 port will need a path to the internet too. As I said, depends on your design as to whether this is practical or not.
... View more
Sep 23 2021
3:13 PM
You’re over thinking it, if you want to block those two domains then just add them to the block list that should block them. The documentation you read about whitelist, blocklist and why you can do it one way and not the other is to do with how rules are processed, in your case it’s not relevant if all you’re trying to do is block those two domains. Whitelists are processed first, and if there is a hit then the domain is allowed. If the domain isn’t listed in the whitelist then the blocklist is tested. When a domain is tested the subdomains are iteratively removed, thus if you whitelist a parent domain it will always hit the parent during testing, and never get tested against the child in the blocklist. Hope this makes a bit more sense now.
... View more
Sep 23 2021
2:59 AM
1 Kudo
Yes, the per-port VLAN settings are the settings on each port on the MX105. As you can see all the MX ports are set as trunks (so they carry multiple VLANs), with a Native VLAN of 1, and all VLANs allowed. To get you up and running these are the same settings that you should use on all the connections between MX and MS, MS and MS, and MS and MR.
... View more
Sep 22 2021
2:25 PM
4 Kudos
No, you can only have one MX in a network (two if they are an HA pair). You’ll need to put the others in a separate network. Remember that a Meraki network is only a logical management structure, it doesn’t stop you connecting the devices however you want.
... View more
Sep 22 2021
2:22 PM
2 Kudos
You need trunk ports between all the devices, and to allow the VLANs on the trunk ports - which it sounds as if you’ve already done. Then every VLAN needs a gateway (Layer 3 interface - I.e. an IP address). On the MX, where you created your first VLAN, you’ll also need to create the new one, and that will walk you through creating the Layer 3 interface. The Layer 3 interfaces will then pass the traffic between the VLANs.
... View more
I can't help with the issue, but just as a note the STP change is a consequence of the port flap, not the other way around. You see the port go from 1Gbps Full Duplex to down, and STP responds by moving the port from designated to disabled. If you can fix the port flap the STP change will likely go away. What is causing the flap is just a case of eliminating the variables. Check the cables, reboot the WAP, if you've got a spare port on the switch try that, and if all that fails, as Meraki support said, reset the WAP. Did anything change when this started happening? MS firmware upgrade, MR firmware upgrade? Adding a new MR to the switch? (maybe taking it over the PoE budget).
... View more
Sep 21 2021
1:41 PM
5 Kudos
@jay_b, unless you’re making heavy use of 2.4GHz I’d go with the MR44. As has been said, that’s the only difference, and with most things being 5GHz capable (and with more bands there as well), there is little reason to be using 2.4GHz.
... View more
Sep 21 2021
2:53 AM
Just to echo what @KarstenI said, even if it does work I’d keep things separate just from a troubleshooting standpoint, and if you need to connect to those WAN routers. I can see why it would mostly work - since WAN1 never needs to know about WAN2 and vice-versa - and the upstream path only exists via a default route to the WAN interface, and it’s generally all NATed. But I’d still keep them in separate subnets.
... View more
Sep 20 2021
2:09 PM
Because your public IP is listed as phishing by BrightCloud, have you done a packet capture to see if there is any unusual traffic on your WAN/LAN. Just wondering if there is something going on that is causing traffic that is overloading the MX (since the MX67 is a small box). Also, what’s on Port 1 and Port 3 that keep flapping? (Port 1 is the WAN port) Is this dual-homed to a switch?
... View more
Sep 20 2021
3:44 AM
The messages you are seeing are a timeout request for the lookup of the DNS service record for LDAP. My guess is nothing can authenticate properly, hence the login timing out and you can only authenticate with local accounts. You need to troubleshoot where your DNS server is and why you can’t reach it. As an aside, .local is no longer recommended for internal domains as it’s an IETF reserved domain generally used for mDNS and link-local networking. It’s possible this is having and impact, but I doubt it (unless you’ve introduced other systems to the network at the same time as changing the switches over).
... View more
Hi @whistleblower, here’s my take on your questions based on experience. Happy for others to advise if they’ve had different outcomes. 1. Yes, local configuration overrides network-wide configuration, but I’ve never seen a warning message if the two don’t match. I’ve only seen warning messages if there is a communication issue with the Meraki cloud. 2. There is no automatic tagging for the management VLAN across the network. You have to get the traffic to/from the switch. Based on this I always find it easiest to have the management VLAN set as the native on all trunks that are uplinks. 3. Imagine the management address as an access port on the switch. It doesn’t care which VLAN it is, only if there in a path to a DHCP server on that VLAN. Since it’s an ‘access port’ it’s always untagged, whether it’s tagged or not on another port depends on that port’s configuration. 4. The definition of a safe configuration is a few paragraphs further up in that document, “Safe configuration means that ‘the device has connectivity to cloud and hasn't rebooted for 30 minutes following a configuration change.’ That is, the safe configuration is the last configuration the device received from the cloud that was not followed by a reboot within 30 minutes.” A ‘not safe configuration’ is just the reverse - I.e. one where no connectivity to the cloud has been achieved.
... View more
Sep 17 2021
2:20 PM
1 Kudo
@DHAnderson, out of the box the cellular firewall rules only apply to a USB modem, or the inbuilt modem on one of the MX ‘C’ models. However, if you contact support you can request that they make the Cellular Firewall rules apply to WAN2 - it’s intended for the exact reason you have described, but you have to make the request through support.
... View more
Sep 17 2021
2:10 PM
@ospsms, start with checking the status of the AutoVPN, make sure it is actually up. And check the route table to make sure the subnets of the other site have been learnt by the MX.
... View more
Sep 17 2021
2:04 PM
1 Kudo
@ToryDav, great to hear that it all went well, and that things are looking better! 15mins isn’t bad for a MS390, when they were first released it was closer to an hour - still way longer than the traditional Meraki switches (which are usually only a minute or two tops).
... View more
Sep 17 2021
6:33 AM
4 Kudos
If you’re losing internet access when the AutoVPN comes up it sounds like you’re trying to use full tunnel, which you don’t want to be. Make sure there a no Exit Hubs configured in the AutoVPN settings at each site.
... View more
Sep 17 2021
6:14 AM
1 Kudo
@CharlieCrackle, generally replacements with the standard warranty are Next Business Day, but the official line is they ship within one business day on a best effort basis. It’s those last 5 words which are the gotcha. If you need a more solid replacement agreement then you need to look at Meraki Now, which is somewhat equivalent to Cisco SmartNet. I believe it’s only then do these devices get factored into Cisco’s sparing model to ensure there is adequate supply in local depots.
... View more
Sep 17 2021
6:01 AM
1 Kudo
@ToryDav, I believe everything you’ve described there can be classified as a MS390 thing. Some of those issues are noted in the firmware release notes. Not sure what version you’re running, but if you’re not on the latest MS14 code then it might be worth the upgrade, it should solve some of the Dashboard issues - just give yourself plenty of time for the upgrade.
... View more
Sep 16 2021
1:46 PM
2 Kudos
Not much - literally. The RF charts indicate that there is very little RF on those channels, that’s all you are seeing. So long as you aren’t having problems there is nothing to worry about.
... View more
Sep 15 2021
7:31 PM
Those configurations look about right. Its possible that the media convertor is doing something more than just converting the media. Is it possible to test without the media convertor, maybe temporarily using the SFP that connects to the HP switch?
... View more
Sep 15 2021
2:27 PM
Have you made the link between the MS120 and MS220 a trunk? It needs to be a trunk to carry the multiple VLANs, and make sure the native VLAN is set the same at both ends (probably just keep it as the original VLAN you had). The port you connect your device to only needs to be an access port.
... View more
Sep 15 2021
1:57 PM
@thomasthomsen, I agree with you, the documentation on using the MX as a wireless concentrator isn’t great, but as @ww stated it’s ‘yes’ to both your questions.
... View more
@FelipeTeevo, thanks for the update. Glad to hear you found a way to achieve your desired outcome. That’s a relatively new feature, good to see it’s enabling people to use the Meraki kit in the way they want.
... View more
You can connect a MR36 directly to a MX64W but you’ll either need to power the AP with a power supply, or use a PoE injector (or use a PoE switch). Also note that you won’t get any roaming between the MX and MR, they’re configured separately, and you’re probably best to not have them both configured with the same SSID.
... View more
@Aneeshram, yes the firewall and traffic shaping rules apply to the traffic on the SSID no matter which client IP assignment mode (e.g. NAT mode, bridge mode, or Layer 3 roaming with a concentrator) is chosen for the SSID. The traffic shaping rules are applied to the traffic as it ingresses/egresses the access point.
... View more
My Accepted Solutions
Subject | Views | Posted |
---|---|---|
2012 | Jan 14 2023 6:12 PM | |
6926 | Jan 14 2023 2:21 PM | |
2029 | Jan 9 2023 1:00 PM | |
1941 | May 30 2022 5:43 AM | |
11935 | Mar 22 2022 2:42 AM | |
3062 | Mar 8 2022 7:17 PM | |
2632 | Mar 7 2022 12:22 PM | |
1926 | Oct 24 2021 12:20 AM | |
2434 | Oct 8 2021 12:47 AM | |
3457 | Oct 4 2021 5:03 PM |
My Top Kudoed Posts
Subject | Kudos | Views |
---|---|---|
14 | 5627 | |
11 | 4467 | |
7 | 2149 | |
7 | 1674 | |
7 | 5313 |