Our organization has been in the process of implementing Meraki MX, MR, and MS platforms to our Enterprise remote locations for the past year and a half and has been a very positive experience. Meraki delivers, hands down, in an environment where we can manage our networks more efficiently as we wear a lot of different hats. Hello everyone. One of the challenges I'm facing is a hybrid integration of an MX firewall (SDWAN) and Guest WI-FI using a Cisco 5508 local controller via ISE splash page. I realize the best solution is to replace each site with all Meraki, however budgeting and immediate needs has set the direction. Used to be: iWan ISR4430 > Cisco 3850 switch > 5508 controller > 3702 AP > Guest SSID > ISE Guest Platform (the ISR 4430 handled the NAT's and firewalling to ISE for the Guest VLAN) Now is: MX100 firewall > MS250 switch > 5508 controller > 3702 AP > Guest SSID > ISE Guest Platform (ISE is not responding back) Our Goal: is to standardize the same 192.168.X.X subnet for Guest traffic at all locations, but we're missing something whether it's NAT or if we need to now involve rules for the Enterprise Cisco firewalls. or maybe a Wireless Concentrator? Our ISE for Guest is not accessible publicly. I'm looking for others who have a similar scenario they've faced, thank you.
... View more
Rudi, when i go to 'Network-Wide', 'Users', the only thing I see are the names of the Meraki administrators. Is there any new information on this request? This is most helpful so that we can audit facilities that abuse the wireless Guest network.
... View more