The Meraki Community
Register or Sign in
cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Show  only  | Search instead for 
Did you mean: 
  • About AaronKennedy
AaronKennedy

AaronKennedy

Getting noticed

Member since Sep 13, 2018

‎07-31-2020
Kudos from
User Count
redsector
redsector
1
NateM1
NateM1
1
Marc_Abaya
Marc_Abaya
2
PhilipDAth
Kind of a big deal PhilipDAth
5
CptnCrnch
Kind of a big deal CptnCrnch
1
View All

Community Record

21
Posts
10
Kudos
2
Solutions

Badges

First 5 Posts
First 10 Kudos
First Solution View All
Latest Contributions by AaronKennedy
  • Topics AaronKennedy has Participated In
  • Latest Contributions by AaronKennedy

Re: Wi-Fi constantly dropping in only one portion of a single physical netw...

by AaronKennedy in Wireless LAN
‎07-24-2020 04:35 PM
1 Kudo
‎07-24-2020 04:35 PM
1 Kudo
Although all of my staff laptops are members of an Active Directory domain and are managed by Group Policy, I do not manage wireless profiles on those devices using a group policy. The staff member who uses each laptop actually signs into the device using a local account, not a domain account. This means I can use a local administrator account on the affected machines to delete the faulty profile and then import an "all user" profile for the same SSID.   School laptops that are used by students do have wi-fi managed through group policy (primarily to prevent them from connecting to cell phone hotspots as a way to bypass the school firewall). However, I have never experienced this issue on those laptops.   After doing some experimenting over the last few weeks, I think the issue can be avoided if I join the device to wi-fi at the right time during setup.      1. Install a (non-domain) image onto the device over ethernet using MDT.      2. Connect to wi-fi using the local administrator account.      3. Join the laptop to the domain (over wi-fi).      4. Create the local account for the end-user.   If the device is domain-joined with MDT as part of sysprep or domain-joined over ethernet after setup has finished and THEN connected to wi-fi, the resulting wireless profile will be "per user", but will not exhibit any issues.   If the local user account is created and that account is used to join wi-fi, then not only will the wireless profile be "per user", but the wi-fi connection will drop whenever a running task owned by 'SYSTEM', 'LOCAL SERVICE', or 'NETWORK SERVICE' attempts to access something over the network.   ... View more

Phantom devices with locally administered MAC addresses keep appearing

by AaronKennedy in Wireless LAN
‎06-25-2020 08:22 AM
‎06-25-2020 08:22 AM
I have recently begun to see MANY devices with randomized MAC addresses show up as connecting to the SSIDs that I broadcast on my network, including one whose SSID is kept hidden. The timing of these appearances leads me to believe that it is likely from the mobile phones of workers on a construction site adjacent to our buildings who have set their phone Wi-Fi to rotate MAC address. But that isn't why I am confused.  This is the issue...   Those rotating MAC addresses are showing up as randomly connecting to ALL of the MR access points on my network, even the ones where there is no possible way that the device could be in the broadcast range of the MR that registers the connection.   And to make things worse, the same MAC address will show up as moving from one MR access point to another in an amount of time that would be impossible to physically travel.    I have even tried to chase down some of these phantom devices. When one appears as connected to an isolated MR, I will run to that location only to find nobody in or around the building with the MR that is reporting the connected device.   I could understand if these devices were constantly showing up as connected to the MR access points that are within range of the construction site, but why are these unknown devices showing up as connecting through MR access points that are too far away to be within range of the construction site? Why are devices showing up as connected when there is nothing physically present within range of the access point? And why do the devices seem to move across my campus faster than a human can run? ... View more

Re: Wi-Fi constantly dropping in only one portion of a single physical netw...

by AaronKennedy in Wireless LAN
‎06-23-2020 06:09 AM
2 Kudos
‎06-23-2020 06:09 AM
2 Kudos
Sorry to resurrect a dead thread, but after two years I finally found what seems to be both the source and the solution to this problem...   ISSUE: Some (random) laptops were constantly dropping their Wi-Fi connections while in one of the buildings on campus, but were perfectly fine when in other buildings (entire campus on the same 100% Meraki network).   WORKAROUND: Most laptops resolved the problem spontaneously after about 2 weeks. For those that did not, using a USB thumb wireless adapter seemed to solve the problem.   SOLUTION: It turns out the SSID Wi-Fi profile that was using the internal NIC on the affected laptops was set to 'current user' instead of 'all users'. As soon as I used netsh wlan commands to set the wireless profile to 'all users', the machines with the persistent problem were fixed.  ... View more

Re: Splash page authentication problem with macos and ios

by AaronKennedy in Wireless LAN
‎02-19-2020 03:26 PM
2 Kudos
‎02-19-2020 03:26 PM
2 Kudos
It turns out I had 27 devices that this happened to yesterday (90% Apple devices). They would...      a) connect to the SSID      b) be served the splash page      c) enter their credentials      d) be told that they were connected and could now close the splash page But if they closed the splash page, their connection was dropped and they had to repeat the process all over again.   Things I tried that did NOT work: I rebooted the affected devices I whitelisted the 'check for internet' URLs in the walled garden [captive.apple.com, msfttestconnect.net, *.gstatic.com] to prevent the splash page from being served automatically and forced the splash page to appear manually by doing an http GET request from a web browser.  I revoked device authorization in the Dashboard and de-authorized the user on the 'splash login' page, waited 10 minutes and had the user try to sign in again I Changed the policy on each affected device to "blocked", waited 10 minutes for that change to propagate to all of the MRs, and then changed the device policy to "normal", waited another 10 minutes and had the user try again I had the user connect to an SSID that used a "click-through" splash page instead of Active Directory authentication I turned off "mandatory DHCP" on the SSID access control page, and set a static IP on the device using the appropriate gateway and DNS addresses.   Things I neglected to try that might have worked: Clear any stale session cookies from the browser cache of affected devices Spoof the MAC address on an affected device so the MR believes it to be a 'new' device    What ended up working for me... I created a new open SSID with no splash page (direct access). I had the affected devices connect to that SSID and browse to a couple of different websites. Then I told those devices to 'forget' the open SSID and connect once again to the SSID with the Active Directory splash page. This time, the sign-in process completed and users could click "done" or close the splash page without losing their connection.   I have no idea why just under 10% of the devices on my wireless network suddenly had problems with the splash page, nor do I know why the 'solution' I discovered actually works. I just thought I would document my process just in case anyone ever discovers this thread while searching for solutions to a similar problem.   ... View more

Re: Splash page authentication problem with macos and ios

by AaronKennedy in Wireless LAN
‎02-18-2020 04:11 PM
‎02-18-2020 04:11 PM
I had time to play around with one user's Macbook Pro (2018) and another's iPhone (4s). The Mac is running Mojave (10.14.6) and the iPhone is running iOS (9.3.5). I can understand if the iPhone 4s has issues due to an outdated OS, but I have had other Macs successfully authenticate today with different macOS all the way back to 10.10.   When I examine the affected Mac in more detail, the client is being tagged with a VLAN by the SSID and issued an IP address in the VLAN's subnet with the appropriate router and DNS server addresses. Then the splash page pops up.  Credentials are provided, and the splash page returns that the authentication was successful.  But the splash page seems to hang at that point without providing the user an option to click "done" or close otherwise the splash page.   On the Mac, I tried the built-in splash page dialog window (uses Safari), but I also tried by bringing up the splash page in Chrome after going to http://captive.apple.com. The same behavior happened using both browsers.   When I do a packet capture with Wireshark, I see a never ending stream of broadcast and probe response entries that only cease when the user presses "cancel" on the splash page.   I'm stumped.  I had 102 different BYOD Macs connect to this particular SSID today and this happened with 9 of them. ... View more

Splash page authentication problem with macos and ios

by AaronKennedy in Wireless LAN
‎02-18-2020 11:30 AM
‎02-18-2020 11:30 AM
I am encountering a weird problem with =some= Mac laptops and iPhones. One of my SSIDs uses Active Directory authentication on a splash page. These devices CAN get the splash page to show up, and they CAN enter their credentials on the splash page. After doing so, the page tells the user that the device is now authenticated.   BUT... the splash page does not show the "Done" button. Instead, it continues to show a "Cancel" button. The user can wait forever, but the "Done" button never appears. If the user clicks on cancel or closes the splash page, then the device does not gain access to the network [Captive portal is set to block access until authentication is complete]   When I navigate to "Splash Logins" on the dashboard, I see that the user has successfully authenticated the device, but if I go to the client page on the dashboard, I am told the device is 'not authorized.'   Can anyone tell me what is going on and why is it only happening on a few Apple devices? ... View more

Re: Do multiple Group Policies stack ??

by AaronKennedy in Security / SD-WAN
‎02-17-2020 01:38 PM
‎02-17-2020 01:38 PM
This is not a scenario that I tested, as I could only get the filter-id attribute to pass a group policy to a device if it authenticated using 802.1X. The majority of devices in my network are BYOD, so 802.1X authentication is not a viable option.   However, if you are using NPS on a Windows server to handle RADIUS authentication, you should be able to set time-based restrictions there and have customized network policies in NPS for passing different group policies depending on day of week and time of day. ... View more

Re: Do multiple Group Policies stack ??

by AaronKennedy in Security / SD-WAN
‎02-14-2020 06:00 AM
2 Kudos
‎02-14-2020 06:00 AM
2 Kudos
I spent a week testing group policies in multiple scenarios and learned this about policy priority (sorry for the length)...   SSID Rules These are the first rules to be applied to traffic, and therefore have the lowest priority. There are a limited number of globally applied elements that will be effective if set at this level.   Layer 3:  These rules are restricted to IP addresses (in CIDR format) with port targeting. Best used for controlling access to the local network, but can be used to block IP addresses on the internet as well.          THESE RULES CANNOT BE OVERRIDDEN BY HIGHER PRIORITY GROUP POLICIES   Layer 7:  These rules can be used to block (Meraki’s) layer 7 categories, but can also block specific URLs, public IP addresses (in CIDR blocks), or individual TCP/UDP ports.          THESE RULES WILL BE IGNORED IF A POLICY IS ASSIGNED MANUALLY (even if that policy has no layer 7 rules)   Bandwidth:  These rules can be used to set global bandwidth limits for the entire SSID and individual bandwidth limits for clients.        THE *SSID* BANDWIDTH LIMIT CANNOT BE CHANGED BY HIGHER PRIORITY POLICIES        THE *DEVICE* BANDWIDTH LIMIT CAN BE LOWERED BY HIGHER PRIORITY POLICIES   VLAN Tagging:  If the SSID tags the device with a VLAN managed by a device downstream of the MX, then no policy will be applied (only ‘network default’ settings and the rules listed above) If the SSID tags the device with a VLAN that is managed by the MX but there is NO group policy assigned to that VLAN, then only ‘network default’ settings will be applied If the SSID uses NAT mode, then a policy will only be applied if a splash page is configured to do so If the SSID tags the device with a VLAN that is managed by the MX AND there is a group policy assigned to that VLAN, then the VLAN policy will be assigned to the device and it will have higher priority than any policy assigned by a splash page   Splash Page Group Policy (using Active Directory) These policies have the second lowest priority. They can override some of the SSID rules, and they can override ‘network default’ content filtering that has been set on the MX.   Bandwidth:  Lower bandwidth device limits set here will supersede a higher limit set in the SSID rules, but a higher device bandwidth cannot be set.         THESE DEVICE BANDWIDTH RULES CAN BE LOWERED BY HIGHER PRIORITY POLICIES   Layer 3:  These rules can be set to block specific URL patterns, IP addresses (in CIDR format), and even all traffic to specific ports.          A “DENY” RULE WILL REMAIN ACTIVE AND CANNOT BE OVERRIDDEN BY HIGHER PRIORITY POLICIES   Layer 7:  These rules can be used to block (Meraki’s) layer 7 categories, but can also block specific URLs, public IP addresses (in CIDR format), or individual TCP/UDP ports.         THESE RULES WILL BE IGNORED IF A POLICY IS ASSIGNED MANUALLY (even if that policy has no layer 7 rules)   Traffic Shaping:  Layer 7 traffic shaping rules set by this policy will only be applied if this is the highest priority policy that has been assigned to a device.         THESE RULES WILL BE IGNORED IF A POLICY IS ASSIGNED MANUALLY (even if that policy has no traffic shaping rules)   Security Appliance:  Rules set here will be effective and can be used to customize or even override the ‘network default’ content filtering set on the MX.          THESE RULES CAN ONLY BE SUPERSEDED BY A POLICY APPLIED MANUALLY TO DEVICES IN AN MX-MANAGED VLAN   VLAN Tagging:  VLAN tagging in this policy will NOT override any settings that were made at the SSID level         THIS SETTING HAS NO EFFECT IF A SPLASH PAGE ASSIGNS THE POLICY   VLAN Group Policy If a group policy is assigned to a VLAN on the MX and a device is in that VLAN, then then the VLAN-specific policy will be given a higher priority than a policy assigned as a result of splash page authentication. However, it will function in exactly the same manner as a group policy assigned by a splash page. Only a manually assigned group policy will be given a higher priority.   Manually Applied Group Policy This is the highest priority policy that can be assigned. Even if this policy tags a device with an MX-managed VLAN that has been given its own group policy, the manually assigned policy will still have the highest priority.   Bandwidth:  A limit set here will supersede ANY limit set elsewhere (up to the maximum device bandwidth defined in the SSID rules)         THIS RULE CANNOT BE SUPERSEDED   Layer 3:  These rules are effective and enforced. Any rule set here will be enforced unless a Layer 3 DENY rule from any other policy overrides it.        A “DENY” RULE WILL ALWAYS SUPERSEDE AN "ALLOW" RULE FROM A LOWER PRIORITY POLICY   Layer 7:  These rules can be used to block (one of Meraki’s) layer 7 categories, but can also block specific URLs, public IP addresses (in CIDR format), or individual TCP/UDP ports.        ANY RULES APPLIED HERE WILL BE APPLIED   Traffic Shaping:  These rules will be applied, but the upper bandwidth limit is capped at the lowest applied bandwidth restriction that is currently in place.         THESE RULES WILL BE APPLIED TO MATCHING TRAFFIC   VLAN Tagging:  If a manually assigned policy tags a device with a VLAN that is configured as a subnet on the MX AND the VLAN uses the same group policy, then all features of the group policy will function. If the manually assigned policy tags the device with a VLAN managed by a device that is downstream from the MX, then all features of the policy will function ECXEPT the ‘Security Appliance’ settings.     Security Appliance:  Depends on whether or not the device is in a VLAN managed by the MX.         THESE RULES ARE ENFORCED IF THE DEVICE IS IN AN MX-MANAGED VLAN         THESE RULES ARE NOT ENFORCED IF THE DEVICE IS IN A DOWNSTREAM-MANAGED VLAN       Splash Page Group Policy (using RADIUS) Meraki documentation indicates that splash-based RADIUS authentication will honor the filter-id attribute and apply a group policy to devices during authentication. Unfortunately, I cannot get it to work... but I can confirm that it does work if RADIUS is authenticating via 802.1X. (but that method is not feasible in my environment, so it was not extensively tested) ... View more

Re: Do multiple Group Policies stack ??

by AaronKennedy in Security / SD-WAN
‎02-10-2020 06:07 PM
1 Kudo
‎02-10-2020 06:07 PM
1 Kudo
Thanks for the suggestion to open a support case.  If I ever need to tunnel down and find out where different things are happening, I will be sure to do so.   It never occurred to me that different devices (MX vs. MR) could be applying different policies. I just assumed the MR was a 'dumb' WAP and all group policy was applied by the MX at the MX. But I understand why you would want to apply rules at the AP instead of having the traffic traverse the internal network first. It just makes sense.   However, right now I am just trying to teach myself the ins and outs of group policy. The policies I have created in my production network are working just fine, but the method I have devised for applying them involves a lot of monitoring and manual changes. I am looking for a way to make the process more automatic and 'hands-free', so I am experimenting with things like... AD integrated splash page to set different policies for different clients Using the RADIUS splash page and the filter-id attribute to push different clients into different policies Setting VLAN-based policies on the MX Manually assigning custom policies using the client page in Dashboard (this is what I want to avoid)   At the moment, I am just exploring and trying to understand the behaviors I am seeing. If I understand why something happens the way it does, then I am closer to my goal of knowing how to set things up the way I want. ... View more

Re: Do multiple Group Policies stack ??

by AaronKennedy in Security / SD-WAN
‎02-10-2020 01:18 PM
‎02-10-2020 01:18 PM
OK... here is a scenario with using different group policies   Group Policy #1 has 'append' set for Blocked URL patterns and the list contains roblox.com. As long as Policy #1 is being applied to a device, then roblox.com will be blocked on that device. I then apply Group Policy #2 to the device. Policy #2 has 'Use network default' set for Blocked URL patterns. However, because Policy #2 does not specifically overwrite any existing blocked URL patterns, roblox.com is still blocked because Policy #1 had previously appended it to the blocked URL list. But if I apply Group Policy #3 to the device and this third policy says to 'override' the Blocked URL patterns with youtube.com, I should find that roblox.com now works on that device, but youtube.com no longer works. This would be consistent with the behavior I have witnessed.   But let me change the order of things a bit. A device has Group Policy #1 applied to it and roblox.com is blocked as a result I then apply the 'normal' template to the device. Finally I apply Group Policy #2 to the device. Now roblox.com should work on the device because the intervening application of the 'normal' template wiped out any customization that had been applied by Group Policy #1. I will have to attempt this and see if the resulting behavior is actually as I have described. ... View more

Do multiple Group Policies stack ??

by AaronKennedy in Security / SD-WAN
‎02-10-2020 07:40 AM
1 Kudo
‎02-10-2020 07:40 AM
1 Kudo
I have an SSID that is set up with an Active directory splash page. When a user connects to that wireless network and is prompted for credentials, a group policy will be applied based on their AD group membership. This works exactly as expected.   However, some devices within a particular group require different settings, so after the user has connected that device and signed on through the splash page, I go to the client page in Dashboard and manually apply a different group policy. This policy also works as expected.   But... elements from the original group policy that was assigned based on AD group membership seem to still be in effect (especially appended URL blacklists and DNS/IP based layer-3 firewall rules). It is as if the policy that was applied manually in the Dashboard is simply being applied ON TOP of the policy that was assigned during sign-in to the wireless network.   Is this the expected behavior? Do manually applied policies stack on top of automatically applied policies, or should a manually applied policy completely override any policy that was assigned automatically based on AD group membership (or VLAN membership)? ... View more

Re: Am I understanding group policy application correctly???

by AaronKennedy in Security / SD-WAN
‎02-09-2020 11:57 AM
1 Kudo
‎02-09-2020 11:57 AM
1 Kudo
Thanks.   I think I just needed someone to 'listen' as I talked through the whole situation. I have a much better understanding now of how to accomplish what I want with VLANs & Group Policy.   Of course I now have some questions about high-bandwidth flows over the internal network, but that is a topic for a different thread. ... View more

Re: Am I understanding group policy application correctly???

by AaronKennedy in Security / SD-WAN
‎02-09-2020 10:07 AM
‎02-09-2020 10:07 AM
Ahh... so it isn't what device is handling DHCP that determines policy application, but what the client is using as its gateway that determines policy application.  That means...   If my Windows AD domain uses the MX IP as its default gateway, then group policy should get applied as expected to all domain workstations. If I set up an SSID that uses "NAT Mode: Use Meraki DHCP" for IP assignment, then the MX will act as the gateway for those devices and group policy will be applied as expected to all connected devices. If I set up an SSID that uses "Bridge Mode: Make clients part of the LAN" for IP assignment but have my MS320 supply IP addresses, then the 'interface IP' for the relevant VLAN on the MS acts as the gateway for those devices. But group policy should still be applied, because the traffic arrives at the MX from the SVI IP of the MS320, and the MX will apply group policy to all traffic from that IP.   Scenario 1 is exactly the behavior I have witnessed on my network with my domain-joined devices.   Scenario 2 seems to be working as well, but here is where I still have a question... Users connect through an AD splash page and I have different group policies that get applied in this scenario depending on the AD group membership of the user. Those work as expected. However, if I subsequently manually assign a device a different group policy, then BOTH the new custom group policy and the AD group policy seem to be applied simultaneously. Is this expected behavior, or should the manually applied policy be completely overriding the policy assigned during sign-in?   Scenario 3 does not seem to be working in the manner described above. When I set up an SSID in this manner, neither the automatically assigned AD group policy or a manually applied custom policy seem to work as expected. Bandwidth restrictions are still applied, but only port-based Layer-3 firewall rules work. URL/IP-based Layer-3 rules do not work, nor do any Layer-7 firewall rules. Any customization made to the network defaults on the security appliance are also not applied.   I originally had my wireless network set up as described in Scenario 3 so I could VLAN-tag and partition different user groups, but struggled with getting group policy to work properly, so switched to Scenario 2. I got working group policies as a result, but lost the ability to separate different user groups into different VLANs.   Does my problem stem from the fact that my VLANs are set up as interfaces on the MS320 switch?  If I configured my VLANs as subnets on my MX100 instead would that allow me to still partition users into different VLANs but have working group policies get applied to them?   And one last (sort of related) question. I work at a 750 student K-12 school and we have an MX100 (advanced security), an MS320, multiple MS2xx and many MR34/42. Is my network over-designed? Do I actually need the Layer-3 switch? How can I leverage the added functionality of the Layer-3 switch if I have to use the MX for all of my routing in order to properly apply group policies?   Sorry for an even longer reply 🙂 ... View more

Am I understanding group policy application correctly???

by AaronKennedy in Security / SD-WAN
‎02-08-2020 04:34 PM
‎02-08-2020 04:34 PM
I have a complete Meraki ecosystem from end-to-end (MX, MS, MR) and I have been experimenting with applying Group Policies to wireless devices connecting through a single SSID. This is the behavior I have noticed, and I just need some confirmation that my observations match how things are "supposed to" happen.   If my SSID uses a splash page that authenticates with Active Directory, I use Nat Mode for IP assignment, and in Security & SD-WAN --> Configure --> Active Directory I set things up so different AD groups have different policies applied to their devices, then... After a device connects and the user signs in, the Dashboard client page for that device will show its policy as "normal", but the group policy based on AD membership appears to have actually been applied to the device and the rules in the AD policy are being followed correctly. On the Network-wide --> Configure --> Group Policies page, it always states that there are zero affected clients in the policies based on AD membership regardless of how many devices may actually be connected. If I subsequently manually apply a different group policy to one of these devices via its client page in the Dashboard, rules from this new policy are followed, but the rules in the policy assigned based on AD membership are also ALSO still being followed. It is as if the device is now affected by TWO group policies.   Now, let's switch things up. If I change the SSID to use a WPA-2 password instead of a splash page, set the IP assignment method to Bridge Mode, tag the devices with a VLAN, and have a server on that VLAN handle DHCP, then the behavior of group policies changes. If a user on a domain-joined workstation logs into that device, then the appropriate AD assigned group policy is applied during that user's session. If a different user subsequently signs in, then the AD assigned policy for the new user gets applied instead. But the group policy seems to be only partially applied. Layer 3 and Layer 7 rules are inconsistently applied, and none of the overrides or appends in the 'Security Appliance' section of the group policy seem to have any effect whatsoever. However, if a user signs into the device with a local account, then no custom group policy is applied and the device is given a "normal" status. If I create a new group policy and tag it with the correct VLAN, then this policy gets applied to the non-domain computer instead. But like before, only some of the policy seems to be applied. Layer 3 & 7 rules are inconsistent and the 'security appliance' customization is ignored.   Finally, if I tweak things so the Layer-3 MS switch handles DHCP for the VLAN, domain workstations are out of luck entirely, but things get a little bit better for the non-domain computers...  Now if I set a custom policy and tag it with the appropriate VLAN, then it will be applied to the devices that connect and the Layer-3 rules will work properly. Layer-7 is still spotty, and any security appliance customization is still ignored.   My assessment of these observations is that if I want a group policy to be completely and reliably applied to a device, then I need to let the MX handle DHCP. If I let the MS Layer-3 switch handle DHCP, I lose the ability to customize content filtering and threat protection on the MX. If I let my WIndows domain controller handle DHCP then all I am left with is the ability to regulate bandwidth and scheduling.   Thanks for taking the time to read my lengthy post.  Am I understanding group policy behavior correctly? ... View more

Re: Wi-Fi constantly dropping in only one portion of a single physical netw...

by AaronKennedy in Wireless LAN
‎09-17-2018 06:39 AM
‎09-17-2018 06:39 AM
Well.. just in case someone stumbles upon this thread in the future and wants to know if there was any resolution...   For about 10 days I had close to a dozen different laptops (all different makes, models & wi-fi chipset) that would spontaneously drop and reconnect their Wi-Fi connections all day long, regardless of which SSID they were connecting to. The network ecosystem at my school is a single physical network running entirely on Meraki hardware, yet this problem only occurred in one building on campus.   I did pursue all of the avenues of investigation that were suggested by those who responded to this thread. In the end, I made no changes to the network.  Last Thursday afternoon, the problem simply vanished.  I could not explain what caused it, and I cannot explain what made it go away.   There are still some other gremlins inhabiting the network in that building, but that is a topic for a different thread. ... View more

Re: Wi-Fi constantly dropping in only one portion of a single physical netw...

by AaronKennedy in Wireless LAN
‎09-13-2018 02:52 PM
‎09-13-2018 02:52 PM
Hi Blake,   I will definitely run a packet capture the next time this I can confirm the issue is occurring on a laptop.  At this very moment, I am remotely copying a 5GB .iso file from the server to the teacher laptop that has been most affected by the constantly dropping Wi-Fi.  Of course, as soon as I tried this, everything started working normally on that laptop.   I will travel the building in a few minutes after students dismiss for the day and check teacher laptops for a 'victim' to act as a guinea pig.   ... View more

Re: Wi-Fi constantly dropping in only one portion of a single physical netw...

by AaronKennedy in Wireless LAN
‎09-13-2018 02:14 PM
‎09-13-2018 02:14 PM
The Windows server only handles DHCP and DNS for a single SSID.  The only devices that connect to that SSID are school-owned devices that need to communicate with our on-premises servers, printers, and data projectors.  All devices in that subnet have preset IP addresses using DHCP reservations, and IP addresses are not assigned to new devices that connect.   I just examined the DHCP logs on the server from yesterday and scanned for one of the affected laptops. It shows that laptop...    1. Renewing its IP address    2. DNS update request    3. DNS update successful   That pattern repeats over and over every few seconds all day long. The only break in that pattern is when the teacher takes the laptop to another building.  Once there, the laptop connects and that is the last I see of it in the logs until it returns to the affected building. ... View more

Re: Wi-Fi constantly dropping in only one portion of a single physical netw...

by AaronKennedy in Wireless LAN
‎09-13-2018 01:53 PM
‎09-13-2018 01:53 PM
Thanks Blake,   That was a possibility I had not considered.   However, when I examine the two switches in the affected building, both of them have L3 routing disabled, and neither are performing VLAN tagging or serving DHCP addresses. VLAN tagging is managed using group policy, and is based on either the SSID being used by the client device, or is manually set by myself when registering personal devices.   All of the affected devices are issued IP addresses by the Windows DHCP server running on our 2012R2 domain controller, and not by any Meraki hardware.  I have verified in the brief period of connectivity before the laptop disassociates that the correct IP address is being assigned to the client laptops by the DHCP server. ... View more

Re: Wi-Fi constantly dropping in only one portion of a single physical netw...

by AaronKennedy in Wireless LAN
‎09-13-2018 01:37 PM
‎09-13-2018 01:37 PM
Hi Philip,   I agree that the behavior is reminiscent of a prankster sending out poison packets, but there are a couple of arguments against that...      1. This building houses our primary grades (K-3), and those students do not have personal mobile devices or laptops at school.      2. If someone was spoofing de-auth frames, then there would be more affected teachers/devices.  As it is right now, only a small number of teachers in the building have affected laptops, and the behavior persists even in the evening after all students have gone home.   When examining the wireless event log for the affected computers, there is a repeated pattern of    * 802.11 association    * WPA authentication    * 802.11 disassociation This behavior repeats from a maximum of every 15 seconds for some affected laptops, to a minimum of every 3-4 minutes for others (but not at all for most laptops)   Air Marshal only detects the three printers on campus that also broadcast a Wi-Fi Direct signal to enable printing from tablets.  Nothing else unusual shows up there (aside from the hundreds of Wi-Fi broadcasting vehicles that drive past the school each day.   All 54 access points on campus are running 25.12 firmware.  I actually rebooted all APs on campus (not just the ones in the affected building) to no avail. ... View more

Re: Wi-Fi constantly dropping in only one portion of a single physical netw...

by AaronKennedy in Wireless LAN
‎09-13-2018 01:17 PM
‎09-13-2018 01:17 PM
Thanks Rudi,   I added that bit about UNC paths because it seemed a very unusual trigger for this behavior.  To answer your questions...   1. The SSID that these devices connect to is only used by our domain workstations, and they authenticate using Active Directory using the built-in Meraki captive portal.  On that VLAN, DHCP will only issue an IP address to pre-registered devices that have an IP reservation.  There are no RADIUS servers on our network.   2. All the access points on campus have an identical configuration.  That is why the behavior in this one building is perplexing.  It cannot be replicated in any other location on campus (even though all buildings are part of the same physical network).   3. I investigated the possibility that the wireless chipset on the laptops could be the issue. However, of the four different models of laptop that have been affected so far, and although all four use RealTek chipsets, there are three different chipset models between them. ... View more

Wi-Fi constantly dropping in only one portion of a single physical network

by AaronKennedy in Wireless LAN
‎09-13-2018 07:09 AM
‎09-13-2018 07:09 AM
Hi,   I am in charge of IT at a small K-12 school. Recently, some laptops on campus have begun to experience a perplexing issue ONLY when they are in one particular building. These laptops will automatically connect to an SSID broadcast by the MR42 units in that building, stay connected for 5-10 seconds, and then completely drop the wireless connection.  A few seconds later, the entire process repeats itself.  This will continue as long as the laptop is in that one building. If the owner takes the laptop to a different building, the laptop will connect to the same SSID broadcast by the MR34/42 units in that building, but will remain connected without any issues whatsoever. If the laptop owner subsequently returns to the affected building, they have about a 70% chance the issue will recur upon returning.   This behavior only happens with some laptops, and there does not seem to be any rationale for why it might be happening.  It has occurred with Acer (2015), HP (2016), HP (2018), and ASUS (2018) laptops, but only with some laptops from each affected model. Once a laptop has been 'afflicted', it will occur on all SSIDs broadcast by the MR units, regardless of which device on the network is operating as a DHCP server, or whether the client uses a DCHP lease, reservation, or statically assigned IP.   One guaranteed method of making this behavior happen on an otherwise perfectly functioning laptop is to attempt to connect to a UNC path (i.e. \\server\sharedprinter). As soon as a user tries to do this, their Wi-Fi connection will drop and the unusual behavior will begin.   There is no issue with wired devices in the affected building, and not all wireless devices exhibit the problem. Nothing on the dashboard indicates a problem with the Meraki hardware, and I have tested the cable connections from the gateway all the way back to each individual MR unit in that building.   I have tried forcing all devices to connect using only the 5GHz band, thinking there might be some kind of wacky RF interference in the 2.4Ghz band in that building, but it did not help.   It is not an issue of inadequate coverage or limited bandwidth. The building in question has twenty-four MR42 units covering 20,000 square feet (one MR unit per room in the building), and there are currently less than 100 wireless devices in the entire building.   Can anyone suggest what my next troubleshooting option might be? ... View more
Kudos from
User Count
redsector
redsector
1
NateM1
NateM1
1
Marc_Abaya
Marc_Abaya
2
PhilipDAth
Kind of a big deal PhilipDAth
5
CptnCrnch
Kind of a big deal CptnCrnch
1
View All
My Accepted Solutions
Subject Views Posted

Re: Wi-Fi constantly dropping in only one portion of a single physical netw...

Wireless LAN
9262 ‎06-23-2020 06:09 AM

Re: Splash page authentication problem with macos and ios

Wireless LAN
5320 ‎02-19-2020 03:26 PM
View All
My Top Kudoed Posts
Subject Kudos Views

Re: Wi-Fi constantly dropping in only one portion of a single physical netw...

Wireless LAN
2 9262

Re: Splash page authentication problem with macos and ios

Wireless LAN
2 5320

Re: Do multiple Group Policies stack ??

Security / SD-WAN
2 3330

Re: Wi-Fi constantly dropping in only one portion of a single physical netw...

Wireless LAN
1 8908

Re: Do multiple Group Policies stack ??

Security / SD-WAN
1 3359
View All
Powered by Khoros
custom.footer.
  • Community Guidelines
  • Cisco Privacy
  • Khoros Privacy
  • Cookies
  • Terms of Use
© 2023 Meraki