Community Record
141
Posts
451
Kudos
4
Solutions
Badges
Apr 12 2020
7:38 PM
4 Kudos
New capabilities and visibility are now available to the Meraki dashboard to help simplify troubleshooting. Users can now pinpoint issues more quickly, and ensure excellent connectivity for clients. These updates are designed to not only provide insights about the health of Wi-Fi clients, but also to provide end-to-end visibility. Enhanced visibility will now allow for immediate identification of whether wireless is problematic, or if, for example, an upstream device is misconfigured.
To learn more, read our blog entry on Network Health.
... View more
Apr 12 2020
7:31 PM
Video wall visibility has been updated to reflect camera-only admin permissions. Camera-only admins will only see video walls if they have access to at least one camera within that layout. All other video walls in which the user does not have access to at least one camera will be hidden.
For more information, see our documentation on Video Walls.
... View more
Labels:
Apr 12 2020
7:28 PM
Users can now add areas of interest to motion-based retention to extend storage duration for motion occurring in important areas. If areas of interested are enabled, motion events that occur outside of the selected regions from being retained for motion-based retention purposes.
For more information, see our documentation on Motion-Based Retention.
... View more
Labels:
Apr 12 2020
7:20 PM
The previously announced Trusted Access feature for Meraki MR and SM deployments is now available for Android devices.
Trusted Access is an easy, secure way to connect Android, iOS, iPadOS, and macOS devices to Meraki MR wireless networks, with Windows support in development. It provides simple, secure certificate-based EAP-TLS authentication, eliminating the need to setup a certificate authority (CA) or RADIUS server for secure Wi-Fi.
Trusted Access provides a solution for customers who want to securely onboard endpoint devices but don’t want or need a heavyweight MDM solution. As an example, it’s a great fit for admins looking to provide secure network access to BYOD devices without the need for MDM.
To learn more about Trusted Access and how to get started with it, please see our documentation on using Trusted Access for secure wireless connectivity.
... View more
Apr 12 2020
7:13 PM
MR36, MR46, and MR56 provide a set of Wi-Fi 6 access point options for indoor high-density wireless environments. MR46 and MR56 have the same form factor and capabilities as MR45 and MR55, such as MU-MIMO and OFDMA, but these new models add MU-MIMO and OFDMA in the uplink direction. UL-MU-MIMO and UL-OFDMA are key features for high-density environments with heavy uplink traffic, such as VoIP-heavy enterprise environments, event spaces, lecture halls, and stadiums. The MR36 is the first 2x2 Wi-Fi 6 model in the Cisco portfolio, providing Wi-Fi 6 for high-volume deployments, at a lower price point.
Read more about the MR36, MR46 and MR56!
... View more
Labels:
Apr 10 2020
7:49 PM
The new MV22X and MV72X offer double the storage capacity of previous models, with the ability to record in higher resolution.
The MV22X and MV72X have all the same general features as the MV22 and MV72, but offer double the sotage capacity with 512GB onboard. This higher capacity storage gives users the option to take advantage of longer storage retention times or higher resolution video recording.
These new models can also record in up to 4MP resolution, which is nearly double the 1080p resolution of the MV22 and MV72.
Read more about both the MV22X and MV72X!
... View more
Labels:
Apr 10 2020
7:23 PM
For iOS13+ devices, we're happy to announce the launch of our beta for iOS User Enrollment. iOS User Enrollment is a multi-persona enrollment option designed for companies implementing BYOD for iOS devices.
This enrollment option provides admins with greater flexibility for enrollment options, and provides better security for end users which, in turn, also encourages enrollment adoption.
Please use this form to sign up for the beta!
... View more
Labels:
Feb 24 2020
12:28 PM
7 Kudos
Hi Community,
Below are the most important changes to our documentation between January 13th and February 24th:
Dynamic DNS (DDNS)
Change: Updated with new screenshots and text formatting.
Calculating Cisco Meraki BSSID MAC Addresses
Change: Added note – “Please use APIs as a primary way to retrieve BSSID information. No new BSSID values will be added to this article moving forward.”
Low Power Mode
Change: Added note – “MR45 and MR55 access points require 802.3at (PoE+) to function properly and do not support low power mode.”
Cisco Meraki and Umbrella Integration - MR Advanced/Upgrade License
Change: Added information about assigning licenses and trials.
Billing for Wireless Access
Change: Added - Support for PHP currency, fixed text formatting and Dashboard references to be up to date with the current UI.
NAT Mode with Meraki DHCP
Change: Added - Due to the implementation of client isolation, clients on a NAT mode SSID cannot talk to clients on a bridge-mode SSID when both clients are connected to the same AP.
Switch Stacks
Change: Model specific physical stacking hardware support information has been added.
Loop and MAC Flap Detection on MS
Change: Minor cosmetic and formatting.
Managing Firmware Upgrades
Change: Cleaned up the wording of the firmware upgrade barriers section to outline the concepts more rather than any specific firmware version
Client Tracking Options
Change: "Cloud Track" has been renamed to "Unique Client Identifier"
Meraki Mobile App Beta - FAQ
Change: New article
Introduction to Cellular Technology on Meraki
MG Troubleshooting
Change: Updated values for RSRP & RSRQ
MR36 Installation Guide
MR46 Installation Guide
MR56 Installation Guide
Change: New articles
MR36 Datasheet
MR46 Datasheet
MR56 Datasheet
Change: New articles
MA-UMNT-MR-A2 Universal Mounting Adapter Installation Guide
Change: New article
Common Wireless Event Log Messages
Change: Added section on iOS devices passing more detailed event log information in MR26.6+
Device Utilization
Change: Updated with additional detail.
Video Walls
Change: Updated to include new fisheye de-warp capabilities
Troubleshooting Client VPN
Change: Updated with additional detail.
Extending the LAN with a Wireless Mesh Link
Change: Updated with specific firmware requirement.
... View more
Labels:
- Labels:
-
Documentation Digest
Feb 14 2020
12:53 PM
New Endpoints
Switch ports
Return the packet counters for all the ports of a switch
Switch settings
Return Multicast settings for a network
Update multicast settings for a network
Monitored media servers
List the monitored media servers for this organization
Add a media server to be monitored for this organization
Return a monitored media server for this organization
Update a monitored media server for this organization
Delete a monitored media server from this organization
... View more
Labels:
Feb 14 2020
12:50 PM
Identity PSK provides the simplicity of PSK with the benefits of 802.1X, and is available today in the Meraki dashboard.
Many IoT devices are not compatible with 802.1X, leaving IT admins no choice but to use WPA2 or a pre-shared key for authentication. Unfortunately, both methods come with well-documented security flaws. Identity PSK provides a way to assign users and devices unique keys, build identity-based groups, and scale them across the network.
When a client associates to a Meraki access point, the AP will send the MAC address of the device to the RADIUS server. The RADIUS server is able to respond with the PSK, which then allows the access point to authenticate the device.
Learn more about how it works in our documentation about IPSK with RADIUS Authentication.
... View more
Labels:
Feb 14 2020
12:43 PM
The troubleshooting page under "Web App Health" on Insight has some updated UI changes as follows:
1. Goodput and Response Time Threshold values are now displayed on the right hand side as a part of the graph legend.
2. When Goodput or Response Time crosses the threshold line, its marked as RED to clearly point out times/durations of possible performance issues.
... View more
Labels:
Feb 14 2020
12:37 PM
Admins can now get visibility into who is accessing video in their network using the Video access log.
Start by navigating to Cameras > Monitor > Video access log. You can filter by camera, event type, user and location.
For more information, see our documentation on Video Access Logs.
... View more
Labels:
Feb 14 2020
11:57 AM
You can now bulk-assign the same quality and retention settings to multiple cameras at once using profiles and APIs.
Start by navigating to Cameras > Configure > Camera profiles and creating a profile with the desired settings.
You can then assign this profile to multiple cameras by using the nodes list page.
You can also do this programmatically by using APIs. Learn more on our API developer portal.
For more information on using the profiles, see our documentation documentation on Bulk Configuring Quality and Retention Settings through Profiles.
... View more
Labels:
Feb 14 2020
11:49 AM
Enhancements
MV Sense
Returns all configured analytic zones for this camera
Response property regionOfInterest value added
Wireless settings
Update the wireless settings for a network
Optional property ledLightsOn added
Devices
List the devices in an organization
Optional property configurationUpdatedAfter added
New Endpoints
Camera quality and retention settings
MG LAN settings
MG port forwarding rules
Switch ports statuses
MX inbound firewall
Camera quality retention profiles
MG connectivity monitoring destinations
MG DHCP settings
MG subnet pool settings
MG uplink settings
Link aggregations
... View more
Labels:
Feb 14 2020
11:41 AM
Meraki Trusted Access is now available to all networks with SM licenses and MR wireless access points.
Trusted Access is a new, easy, secure way to connect iOS, iPadOS, and macOS devices to Meraki MR wireless networks, with Android coming soon and Windows in development. It provides simple, secure certificate-based EAP-TLS authentication, eliminating the need to setup a certificate authority (CA) or RADIUS server for secure Wi-Fi.
Trusted Access provides a solution for customers who want to securely onboard endpoint devices but don’t want or need a heavyweight MDM solution. As an example, it’s a great fit for admins looking to provide secure network access to BYOD devices without the need for MDM.
To learn more about Trusted Access and how to get started with it, please see our documentation on using Trusted Access for secure wireless connectivity and our Trusted Access Positioning Deck.
... View more
Feb 12 2020
5:23 PM
2 Kudos
@RussR Keeping the Dashboard documentation up to date with the releases/changes in hardware What would you say was the most recent/egregious example of us falling short at that?
... View more
Feb 12 2020
5:18 PM
2 Kudos
@LegoGeek Without involving an SM client install we are wanting to choose where and where not certain clients have access to... in essence, they register their MAC address's and devices and we then "tell them" what they have access to This might, again, not be exactly what you're looking for, but have you seen our new Trusted Access feature? Your use case sounds really similar. https://documentation.meraki.com/zGeneral_Administration/Cross-Platform_Content/Trusted_Access_for_Secure_Wireless_Connectivity Meraki Trusted Access is an easy, secure way to connect iOS, iPadOS, and macOS devices to Meraki MR wireless networks without enrolling the device into Systems Manager. It provides simple, secure certificate-based EAP-TLS authentication, eliminating the need to setup a certificate authority (CA) or RADIUS server. Once you have defined which users can have access to your network, they will be able to download the configuration profile needed to join the SSID from a self-service portal using the authentication method you’ve defined for the network. It's an SM/MR feature but it doesn't require the devices to enroll, and it allows you to have secure client connectivity without RADIUS, you manage them as normal dashboard clients. And you can apply it on an SSID-level, which allows you to separate access to your network resources with standard segmentation. I think it's pretty sleek. Might be helpful?
... View more
Feb 12 2020
5:06 PM
2 Kudos
@ChrisGerman I would like to see this page get updated with more information as it doesn't have enough or missing. The Syslog config only has HOST but if you have tons of devices in the same IP range. It's best to use NETMASK instead of HOST which you don't have documented. Noted, we'll try to get that fixed soon. Thanks
... View more
Feb 12 2020
5:02 PM
3 Kudos
@CharlieCrackle My biggest issue with documentation is it is wrong and not up to date. When new features are brought out part of the introduction process should be to update the documentation. Especially true with insight documentation. Features are removed and added but the documentation does not reflect this. Our policy is for public documentation to be a release requirement for public beta for any new features or hardware. I'll be the first to admit that things have been missed before, but we're working hard at keeping that tight. Of any of the products though, I'm a bit surprised Insight is the pain point. Insight VoIP Health, as the most recent example, was documented before release. (https://documentation.meraki.com/MI/MI_VoIP_Health) Web App Health underwent a UI overhaul, and I believe the documentation reflected the changes within a couple days. Insight should be fairly complete right now, but maybe there was a more painful spot a couple months ago? Honestly, if there's anything you feel is missing though, let me know and I'll work that into our agenda. Other common issue is the screens shots in the documentation are of the OLD UI and not the updated UI. (SM documentation suffers from this a lot) Yeah, you're not wrong. There are ~1800 articles, so we do have many outdated screenshots. We perform about 10-30 edits per day, and our documentation is living as much as our UI is, so we're always working to keep up. We do try to prioritize screenshot-updates in articles where the actual workflow has changed, rather than just the appearance, though we'd obviously prefer to update all of them. I understand the pain of it though, and we're working on it. I use this one a lot to send to clients https://documentation.meraki.com/MX/Client_VPN/Client_VPN_OS_Configuration but it is written too technical for end users and misses step that tech people know but end users do not Need a End user version of this That's an interesting idea. Could you possibly give an example of what information is missing for technical users, and what information would be extraneous for end users? More documentation on using DEP with SM the current documentation does not explain well the apple part of the setup (old screens shots) We're in-progress with some major updates to our DEP documentation. Keep an eye on our documentation digests, should be coming in a little while.
... View more
Feb 12 2020
4:40 PM
1 Kudo
@JHoffman I'd like to see more documentation on Group Policies. I found that they are parsed top down, not cumulative so if a policy at the top can override the bottom it will. Wasn't documented anywhere. There's more information on order of priority for group policies in the Troubleshooting Group Policies doc. If that wasn't clear from the main Group Policy doc, it should probably be more obvious/easier to discover, so I'll look into that. Hopefully that's helpful? https://documentation.meraki.com/zGeneral_Administration/Tools_and_Troubleshooting/Troubleshooting_Group_Policies#What_is_the_order_of_priority_for_Group_Policies.3F
... View more
Feb 12 2020
1:45 PM
4 Kudos
@LegoGeek I'd like to see if Meraki could create an external RADIUS service for devices you want to "manage" but not be anywhere near your internal production equipment. Is Meraki Authentication what you're looking for, or not quite the same thing? https://documentation.meraki.com/zGeneral_Administration/Cross-Platform_Content/Managing_User_Accounts_using_Meraki_Authentication
... View more
Feb 12 2020
1:41 PM
3 Kudos
@BAllen 3D model of hardware appliance would be really cool! Interesting idea. That might be feasible but would take a little work. Could you think of a good use case for it? I'd love to see the API documented in a way were it could be used as a CLI for Meraki. Do you think the limitation right now is that the documentation is not clear/simple enough to make that easy to do (which is possible for us to fix), or do you feel it's more a limitation of what the API is capable of right now (which is more a matter of time)?
... View more
Feb 12 2020
1:30 PM
3 Kudos
@NJacobe more documentation about merging networks and organizations That's a good call-out, I'll add that to our backlog. We do have documentation on what we refer to as "combining" networks (https://documentation.meraki.com/zGeneral_Administration/Organizations_and_Networks/Combined_Dashboard_Networks) But I assume you're referring to the general concept of "how do I best go about taking 2 things and making them 1 on a network level and org level", is that correct? I would agree that's an area we could improve. more about MI and their new VoIP features https://documentation.meraki.com/MI/MI_VoIP_Health We just published a new document on MI VoIP Health. Hopefully that's helpful?
... View more
Feb 12 2020
10:30 AM
16 Kudos
UPDATE: This contest has ended. A huge thanks to everyone who submitted their thoughts on documentation, we're excited to go through all of your feedback! Our two randomly selected winners are: @BAllen & @andrewperry, congratulations!
Hi Community!
I'm Cameron, Knowledge Manager here at Meraki and I manage our documentation site.
The Meraki documentation site (documentation.meraki.com) includes hundreds of articles ranging from basic administration guides to deep dive troubleshooting tips for networking issues.
For this month’s challenge, I want to know your thoughts on one of these two questions:
If you had to pick the top 3 must-read articles on documentation.meraki.com, which would you select?
What new content would you love to see added to our documentation?
How to enter
In a comment on this post, either list your top 3 documentation articles or provide your opinion about what new documentation content you’d like to see (or both) and be entered to win swag! Submit your thoughts in a comment on this blog post before 11 a.m. PST on Monday, February 17th (2/17/2020). We’ll then draw two at random to win an induction speaker! Your entries will be public and visible throughout the contest.
The fine print:
Drawing will be held on Tuesday, February 18th at 11am PST
One entry per community member
Full terms, conditions, and eligibility information
... View more
Labels:
Jan 13 2020
12:36 PM
2 Kudos
Hi Community,
Below are the most important changes to our documentation between December 19th and January 12th:
MG Cellular Patch Antenna Datasheet
Change: New article
MG Wireless WAN Dashboard Settings
Change: New article
Sharing Video
Change: Added “Schedule Exports”
Troubleshooting Client VPN
Change: Updated “Windows Error 809” section
Multicast support
Change: Adding a new L3 interface on an MS390 automatically enables an IGMP querier for that VLAN.
Switch ACL Operation
Configuring ACLs
Change: The VLAN qualifier is not supported on the MS390. For the MS390, ACL rules with non-empty VLAN fields will be ignored.
Storm Control for MS
Change: On classic MS switches, if the specified type of traffic exceeds the defined limit, only excess packets will be dropped. On MS390 switches, if the specified type of traffic exceeds the defined limit, all packets will be dropped until the monitored traffic falls below the defined limit.
MS390 Install Guide
Change: On classic MS switches, if the specified type of traffic exceeds the defined limit, only excess packets will be dropped. On MS390 switches, if the specified type of traffic exceeds the defined limit, all packets will be dropped until the monitored traffic falls below the defined limit.
High Density Wi-Fi Deployments
Change: Added clarity around number of recommended SSIDs.
Configuring DHCP Relay
Change: Added a public-facing note stating "The MX is always going to use the subnet from the highest VLAN as the source subnet when it's sending the request to the DHCP server. If the VLAN is not shared across the VPN then the request will be dropped as it is not permitted through the tunnel."
... View more
Labels:
- Labels:
-
Documentation Digest
Kudos from
My Accepted Solutions
Subject | Views | Posted |
---|---|---|
4104 | Jun 13 2019 9:56 AM | |
3304 | Apr 19 2019 8:13 AM | |
4203 | Mar 15 2019 12:09 PM | |
8017 | Feb 21 2018 3:00 PM |
My Top Kudoed Posts
Subject | Kudos | Views |
---|---|---|
19 | 26381 | |
16 | 44053 | |
15 | 1400 | |
13 | 1582 | |
10 | 1303 |