Community Record
150
Posts
178
Kudos
5
Solutions
Badges
2 weeks ago
Has anyone found a solution for this? I have a similar problem, using netbird VPN. It kept wondering me why the copying speed seems to freeze on 355 KB/s; googling that brings up some post where people had wrong subnet setting. no idea where in my case, because there are some (private) hops used to reach my VPN destination. Someone else talks about an IPsec firmware bug: https://community.fortinet.com/t5/Support-Forum/Slow-VPN-speed/m-p/1259/highlight/true
... View more
2 weeks ago
MX firmware is Linux-based, so it's not called a "VTI" on our end, but functionally, it should be mostly the same: it sends traffic to an arbitrarily defined interface that maps to a given VPN peer internally, and it does so based on what route information we've learned from said peer.
... View more
Feb 12 2025
2:11 PM
Hi Dunky, yes, can i have the case number, ive got an issue with p2p traffic
... View more
Dec 12 2024
1:02 AM
We had the same NO-PROPOSAL-CHOSEN error on the remote side of the Site to Site VPN. We have found that with Load Balancing enabled and Active-Active AutoVPN set to Enabled, the Non-Meraki VPN peers can still only be established on whatever interface is set as the Primary uplink on the SD-WAN & Traffic shaping page. We resolved the NO-PROPOSAL-CHOSEN error by using the correct Public IP of the MX on the remote side of the tunnel.
... View more
Nov 28 2024
12:42 AM
I have always found the packet capture a bit flakey, sometimes just not showing any packets at all and then you refresh/come back 5 minutes later and it works!
... View more
Nov 27 2024
2:29 PM
2 Kudos
If you don't want to, or can't implemented pushed MFA, another option is to enable certificate authentication as a second factor (or indeed third factor since it works with pushed MFA as well). To do that, you'd need a local Certificate Authority (which your Domain Controller can serve as), then generate a self-signed root cert, which you'd upload to the MX. It doesn't need to be from a commercial or otherwise publicly trusted, so long as you trust your own organization to serve as a secure root for a chain of trust. From there, you can then just start using that CA to sign certs, and install those onto your client hardware to serve as a means of authenticating your client devices to the MX. It's a bit more work, but I would also highly suggest you find a way to provide certs with unique Subjects/SANs to each of your client devices, that way you're not having to reissue a new one any time you need to terminate someone's VPN access.
... View more
Nov 27 2024
2:20 PM
2 Kudos
Since you have an MX84, it's unfortunately not possible for you to implement what you want owing to firmware limitations. On newer platforms that can run the MX19.1 branch, what you're asking for is possible now with routed-mode VPNs, though that also requires the use of BGP to signal a return route back across the tunnel for any clients on the non-Meraki side of the tunnel
... View more
Jul 8 2024
9:43 PM
Closing off my experience on this. The MX75 I opened a support case for rebooted for a different reason. However support confirmed that a different MX75 had encountered hardware panic reboots and required replacement.
... View more
Jul 2 2024
6:05 AM
No, it remains.
... View more
May 1 2024
8:11 AM
Hey folks, This is a well-known consequence of DTLS negotiations failing: https://www.cisco.com/c/en/us/support/docs/security/anyconnect-secure-mobility-client/116881-technote-anyconnect-00.html If it's not a huge issue to your users, it's relatively harmless to leave it be, but if you want to fix it, make sure your appliances are reachable on UDP 443
... View more
Apr 28 2024
5:54 PM
Hi, For L2TP I had a chat with Meraki SE and he mentioned the group policy will be tied to the VPN client virtual MAC address and not the username and virtual MAC address can change and if it changes then group policy wont get applied?
... View more
Apr 15 2024
11:49 AM
Hello - we have seen this issue across multiple locations. We have a combination of MX68s (approx. 100) and an MX450 across multiple circuits, providers, etc. We had the same L7 country code block list for all locations but not all experience the issue making it harder to troubleshoot. In general, I understand other countries might be involved in Internet traffic but we have not updated these rules in years and the issue seems to have surfaced over the past few months. The fix was to delete the L7 rules from the affected firewalls and I have slowly been adding back countries to the block list. Also, it would be nice to be able to report what rule is blocking traffic but apparently (according to Meraki support) we are not able to get granular detail. The MX68s are generally at MX 18.107.7 and the MX450 is at MX 18.107.9. I should also mention that one of the sites inbiz.in.gov did fully load after about 4 minutes. Once we removed the L7 rule it loaded in about 1-2 seconds. The HAR file did not indicate any sites external to the US that I could find.
... View more
Mar 7 2024
1:20 PM
3 Kudos
You need both, because the preshared key is what authenticates your users' devices and your MX to one another. The username/password is required to authenticate the users themselves
... View more
Mar 5 2024
12:50 PM
Note that the MG21 is having issues (some firmware near future should fix this though).. MTU size is default 1280 on a MG21. Call support for a patch they can run. So the MG21 will start to use MTU1500.
... View more
Jan 27 2024
8:23 AM
2 Kudos
Recently detailed in : https://documentation.meraki.com/General_Administration/Cross-Platform_Content/Behavior_during_Connection_Loss_to_Cisco_Meraki_Cloud
... View more
Dec 5 2023
5:09 AM
1 Kudo
To answer your question simply, no we have not. We changed Intrusion detection and prevention setting from prevention to detection. This was to ensure we weren't asleep at the wheel allowing threats to pass through. Our findings were we were getting little to no benefit from this feature (as evident from the event logs). Thus we've left it as detect only. Anecdotally we also observed that MS Teams meetings became more reliable with less garbled audio and dropped connections.
... View more
Nov 21 2023
3:43 PM
Have you tried change the ip setting in the starlink webpage? change it from default to "Private IP"
... View more
Nov 16 2023
1:58 PM
I appreciate the technical explanation. Thank you for taking the time.
... View more
Oct 21 2023
3:51 PM
Make sure you are allowing all traffic from your sonicwall IP address in the upstream device that is NAting to your MX. I had a though time deploying a Meraki vMX in Azure, since Azure gives you a NATed public IP address. The biggest issue I had was that nowhere in the deployment documentation it's mentioned that you must allow all traffic from the IP address of any none Meraki peer you want to establish a VPN connection to in the Azure Network Security Group assigned to your vMX.
... View more
Oct 13 2023
2:11 PM
2 Kudos
To be explicit here, yes, ECH will pose a problem for some features on MX. Explicitly, Content Filtering relies on being able to see the domain the client is attempting to communicate with, which is contained in the Server Name Information (SNI) field of a TLS header during the initial handshake. This works just fine for TLS 1.2, and TLS1.3 when ECH is NOT in use, but any extensions to TLS1.3 that obfuscate this information will prevent it from functioning.
... View more
Aug 15 2023
2:39 AM
Got links from Support describing requirements for the certificates and have now set up a test with self-signed certificates. Seeing that things work if the certificate has the correct setup. This is anyway client authentication so the client needs private keys, remember to use a template that has client authorization as its use. https://documentation.meraki.com/General_Administration/Other_Topics/Certificate_Requirements_for_TLS https://learn.microsoft.com/en-GB/troubleshoot/windows-server/networking/certificate-requirements-eap-tls-peap
... View more
Jul 25 2023
11:13 AM
4 Kudos
This is not true unfortunately - MX64s, 65s, 84s, 100s, 400s and 600s do not support the use of TLS for management traffic, and there's no way for support to override this (due to reasons I'm not at liberty to disclose)
... View more
Jul 5 2023
3:05 AM
Apologies for delay in responding, I have been on hols. All looks good now, thanks Alex.
... View more
May 19 2023
10:49 AM
The customer replied saying that he would need the IPs for each domain and that they can’t place wildcards in the middle of a multilevel subdomain. This is the documentation from LogMeIn with the * as a way to allow many domains. Is there a solution for this, you think?
... View more
My Accepted Solutions
Subject | Views | Posted |
---|---|---|
3318 | Apr 15 2024 11:07 AM | |
3308 | Nov 16 2023 12:23 PM | |
2438 | Dec 8 2021 2:58 PM | |
4992 | Aug 28 2017 4:01 PM | |
32408 | Aug 25 2017 12:22 PM |
My Top Kudoed Posts
Subject | Kudos | Views |
---|---|---|
16 | 37321 | |
7 | 34219 | |
7 | 34683 | |
6 | 3308 | |
6 | 14312 |