Community Record
81
Posts
50
Kudos
3
Solutions
Badges
2 weeks ago
Due to an MX 19.1 regression, traffic will fail to route over AutoVPN when the only active uplink is a cellular connection. (MX-35703) Thats still a no for us...
... View more
Feb 5 2025
5:22 AM
Hi everyone, we are thinking about implementing radsec, but I don't want to have to change the certificated manually, so I'm wondering if I could simply add an AWS application load balancer between our access points and the radius server. Then we could automatically change the certificates and we don't have to change anything on the radius server... Your thoughts?
... View more
Feb 4 2025
2:30 AM
Unfortunately I'm also wondering what the impact would be. I would guess that if you have anything connected to WAN1 (must be active), you'll be fine, but if the WAN1 goes down physically, AutoVPN doesn't work too. So for us, because we have some MX with LTE only, we are not able to update to this version... I'm waiting to get this bug fixed
... View more
Jan 30 2025
10:39 PM
2 Kudos
Due to an MX 19.1 regression, traffic will fail to route over AutoVPN when the only active uplink is a cellular connection. (MX-35703) This is a problem for some of our networks... I hope this will be fixed as soon as possible
... View more
Jan 30 2025
10:37 PM
6 Kudos
Security appliance firmware versions MX 19.1.7 changelog Important notice As of MX 19.1, Cisco Meraki will no longer support USB-based Cellular Failover on the MX and Z platforms. Executive summary This is a maintenance release for MX 19.1 containing primarily bug fixes. There are fixes in a variety of areas, including changes that address known issues on MX75, MX85, MX95, MX105, MX250, and MX450 appliances. Additional fixes are also present, so please read through the full details below. With this release, we are piloting the inclusion of bug identification numbers for known issues. There will also be changes made to the previous MX 19.1 versions to include this information as well. Legacy products notice When configured for this version, Z1 devices will run MX 14.56. When configured for this version, MX400 and MX600 devices will run MX 16.16.9. When configured for this version, MX64(W), MX65(W), MX84, MX100, and vMX100 devices will run MX 18.107.12. Bug fixes - general fixes Fixed a rare issue that could result in MX appliances encountering an unexpected reboot when servicing many clients with a large number of network flows. This was more likely to occur on MX450 appliances supporting 10,000 or more active clients and 500,000 or more concurrent flows. This resolves known issue MX-35210. Corrected an issue that could result in non-Meraki VPN traffic being routed incorrectly when 1) IPsec VPN failover was configured and 2) VPN configuration changes were made. MX appliances will now more gracefully apply firewall rule configuration changes. This will resolve several instances where updating large sets of L3 or site-to-site VPN firewall rules could impact packet processing and network control traffic. This resolves known issue MX-35524. Bug fixes - limited platform fixes Fixed an additional issue that could result in MX75, MX85, MX95, MX105, MX250, and MX450 appliances reporting an erroneous spike in network traffic usage. This resolves known issue MX-32538. Fixed a rare issue that could result in AMP incorrectly blocking traffic on MX75, MX85, MX95, MX105, MX250, and MX450 appliances. This resolves known issue MX-34038. Resolved an issue that could prevent AutoVPN tunnels from forming over cellular interfaces when the Cellular Active Uplink configurations are changed. Corrected an issue that resulted in MX appliances failing to establish PPPoE connectivity on the WAN3 interface. Fixed an issue that resulted in Z4(C) appliances failing to properly forward STP frames received on its LAN interfaces. This resolves known issue MX-34639. Fixed a rare issue that could result in VMX appliances going offline 11 months after first upgrading to an MX 19.1 release. Known issues status This list is being reviewed and updated. Many existing issue reports have not been confirmed to affect MX 19.1 firmware versions. Known issues During the upgrade process, MX appliances upgrading from version prior to MX 19 may experience a failure to properly classify traffic. This issue will be resolved once the appliance has completed the upgrade to MX 19. (MX-36307) Due to an issue under investigation, MX appliances may incorrectly route traffic destined to subnets learned through eBGP over a Non-Meraki VPN connection. (MX-34803) Duplicate retrospective “malware download detected” emails may be erroneously sent. (MX-30111) Due to an issue under investigation, making certain configuration changes to WAN interfaces (such as disabling or enabling an interface) can cause the IDPS process to fail. This issue may also cause high device utilization. The issue can be worked around by rebooting the MX appliance or disabling and then re-enabling IDPS. (MX-34504) Due to an MX 19.1.5 regression, Z4(C) appliances may fail to provide PoE power to connected devices. (MX-34938) Due to an MX 19.1 regression, traffic will fail to route over AutoVPN when the only active uplink is a cellular connection. (MX-35703) Due to an issue under investigation, MX75, MX85, MX95, MX105, MX250, and MX450 appliances may experience an unexpected device reboot when VPN NAT is configured. (MX-36180) When failover is configured between non-Meraki VPN tunnels, the Route Table page on Dashboard may incorrectly show the route for the primary VPN tunnel is inactive. (MX-36316) During the upgrade process, MX appliances upgrading from versions prior to MX 19 will experience a failure to connect to non-Meraki VPN peers if any VPN peer names contain a space. This issue will be resolved once the appliance has completed the upgrade to MX 19. (MX-36312) Other When upgrading to MX 19.1.7 or higher, Z4C appliances will perform an upgrade of the integrated cellular modem. This may result in Z4Cs taking a longer time to complete the upgrade process. Improved the consistency of syslog output for firewall rule decisions. All log messages should now say “allow” or “deny.” Previously, an inconsistent mix of deny/allow and 0/1 were used.
... View more
Jan 28 2025
5:08 AM
I often create new networks with API calls, even if there are no devices inside the network, the configuration will be build correctly. As soon as you add your devices in the new network, you can see that the settings are correctly set... You should get your new network configuration via api too
... View more
Jan 15 2025
6:13 AM
1 Kudo
Could be an alternative to MS210, if you don't need redundant power. Thanks for letting us know
... View more
Jan 6 2025
1:40 AM
2 Kudos
This is great stuff, so we can get rid of the script that does the health check and switch to a backup tunnel directly within the Meraki dashboard. Hopefully MX 19 will be stable as soon as possible, so we can roll out the update and can use this feature.
... View more
Jan 6 2025
12:12 AM
4 Kudos
Hi everyone, it looks like, you don't have to work with tagging scripts for a second non Meraki VPN tunnel anymore, you can simply add a second peer to the first. Might be old for some of you, I just saw that in our dashboard. Is there any documentation to this new setup? Is this a backup tunnel or a real second peer? I thing this is a big step forward if you want to add services to your SDWAN networks via VPN
... View more
Labels:
- Labels:
-
3rd Party VPN
Hello again, in one of our networks we have configured an ssid with WPN access on all floors. All devices are using the same VLAN, because they are all part of the same group policy. Now I want that on one floor, all devices in the same ssid are in a different subnet (different VLAN), because on that floor there are media network devices in our LAN which they need to have access to. Is it possible to say, if you are connected to an access point xyz, you will connect to a different VLAN than on the other access points? Then you will have access to these media devices in the same vlan? Best
... View more
Labels:
- Labels:
-
SSID
Jul 30 2024
11:57 PM
We have problems with network shared folders, that sometimes users don't have access to their folders anymore and a message comes "The Local Device Name Is Already In Use" Most of the other stuff looks good, but this is getting annoying...
... View more
Jul 30 2024
1:03 AM
Hi everyone, on our new site, we have two 1Gbit uplinks that I configured in a load balancing with autovpn active active. We have some strange behaviour in our network that some applications need more time than expected to connect so servers over the autovpn tunnel and sometimes they fail completely. Now we deactivated loadbalancing, these applications work again... Does anyone got the same problems or is this something I have to fix with Meraki support? I'm thinking of enabling load balancing again and simply deactivate autovpn active active so that the apps only use one way to aws. Internet traffic is fine, it's only a problem with traffic over the autovpn... Best
... View more
Jun 17 2024
2:43 AM
Answer from support: When MX matches the local internet breakout rule for the traffic, it sends it outbound locally via WAN and not via Site-to-site VPN. This means that the outbound firewall rules will be considered (Security & SD-WAN → Firewall page), not the S2S VPN rules (Security & SD-WAN → Site-to-site VPN page).
... View more
Jun 16 2024
11:51 PM
I did that... My question is, on which firewall I have to do the rules for the traffic to Meraki now, on the site-to-site VPN firewall or the "normal" firewall. It's both on the Meraki MX I'm going to call the support
... View more
Jun 14 2024
5:28 AM
No, I have one MX On that on MX I have configured a default route to a 3rd party vpn. But I don't want the Meraki Cloud traffic (switch, access point behind the mx) being routed to the tunnel, that should go directly to the internet. I configured that under VPN Local Breakout. Now I have to allow that traffic on Site-to-site outbound firewall or/and the layer 3 outbound firewall. Where do I have to configure that?
... View more
Jun 14 2024
4:33 AM
There are two firewalls on the MX, the site-to-site vpn outbout firewall and the firewall under configuration. For vpn traffic, you have to configure the vpn firewall
... View more
Jun 14 2024
2:34 AM
Hi everyone, I'm just wondering what firewall rules (VPN or basic layer 3) are used when you define destinations, that are not going over the 0.0.0.0/0 default 3rd party VPN tunnel. I configured local internet breakout for the Meraki cloud connect and I'm not sure if I still have to add the Meraki ports in the VPN firewall or the firewall for internet traffic, or maybe both... Couldn't find the documentation here... Thank you
... View more
Labels:
- Labels:
-
3rd Party VPN
-
Firewall
Jun 3 2024
12:44 AM
Hi everyone, we are using IPSK without radius and wondering, if there is a possibility to identify which device is using which key. Every user gets unique keys and when they are calling for help, it is sometime not that easy to find the device on dashboard. It would be easier to filter on the psk they are using, to identify the device. Am I missing that feature or is that somewhere hidden? Thank you!
... View more
May 24 2024
4:46 AM
Hi everyone, I can't find the api call to set the cellular active uplink to enable on Meraki MX. Is that hidden somewhere? Thank you
... View more
May 21 2024
2:55 AM
Thank you We are trying this for now, we still have clients with suboptimal roams
... View more
May 7 2024
4:39 AM
I figured out, that it's caused by roaming. Both APs are roaming the clients between each other. Are radio settings a solution here? Or simply disable roaming on all ssids?
... View more
May 7 2024
3:20 AM
Hi everyone, we have an odd issue. We are testing two CW9164I, where we have clients getting 3x "Destination Host Unreachable" than pings are fine, and after a while it comes up again. So Google Meet etc is not working properly, because they have these connection errors sometimes. On dashboard everything looks great, all green, no problems found here. The client also looks great, performance is fine (on dashboard). Same location with MR34 and MR42, no problems at all. Any ideas what could make these losses? Thank you
... View more
Mar 8 2024
4:34 AM
No case We have a 3rd party VPN tunnel to Zscaler with a default route 0.0.0.0/0 and after a short time the tunnel was still up on dashboard but no traffic went over the tunnel We have also routes to MPLS (LAN) and a AutoVPN to AWS/vMX, both were fine With the stable, we do not having these issues
... View more
My Accepted Solutions
Subject | Views | Posted |
---|---|---|
2163 | Jun 17 2024 2:43 AM | |
1599 | Aug 17 2022 11:53 PM | |
3212 | Mar 2 2022 4:58 AM |
My Top Kudoed Posts
Subject | Kudos | Views |
---|---|---|
6 | 2045 | |
5 | 39825 | |
4 | 824 | |
4 | 35000 | |
3 | 1599 |