Hi, Is it normal that Air Marshall detects Meraki APs as spoofers or sending malicious broadcasts? I'm seeing hundreds of these messages seen by different Meraki APs. At this case, the offending MAC is the main MAC address of the same AP, however we should see the BSSID here, shouldn't we?: Broadcast deauthorization Dec 18 20:43 02:8D:DB:DB:DD:7B MR XX (15 dB) AP spoof Dec 18 18:57 Dec 18 18:57 0E:8D:CB:C3:E5:4F MR YY (16 dB) Well, this is causing a lot disassociation issues. As a side information, these (7) MR33 have a deprecated (stable) firmware and upgrading to the latest one (beta) increases the problems. Any help is much appreciated. thanks!!
... View more
All information I've got regarding Azure and vMX100 is configuring it as a VPN concentrator. However, is it possible to protect servers in Azure? I know that Azure has a service to protect against DoS attacks and that the vMX100 cannot enable the enhanced security features available in physical MXs, but would it be possible to have a simple layer 3 security in addition to the VPN concentrator feature? I mean, If I managed to redirect all traffic coming and going from/to my servers in azure through the vMX100 (0.0.0.0/0, not just my internal networks) would it be possible to effectively protect them with the firewall options available in the dashboard. Have anyone made this in Azure? Thanks!!
... View more