The Meraki Community
Register or Sign in
cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Show  only  | Search instead for 
Did you mean: 
  • About donavon89
donavon89

donavon89

Comes here often

Member since Dec 21, 2017

‎03-18-2019

Community Record

8
Posts
0
Kudos
0
Solutions

Badges

1st Birthday
First 5 Posts View All
Latest Contributions by donavon89
  • Topics donavon89 has Participated In
  • Latest Contributions by donavon89

Re: Block All users from Internal ip device allow some

by donavon89 in Security / SD-WAN
‎03-18-2019 08:46 AM
‎03-18-2019 08:46 AM
The only option i see for blocking is Outbound rules ... View more

Re: Block All users from Internal ip device allow some

by donavon89 in Security / SD-WAN
‎03-18-2019 08:45 AM
‎03-18-2019 08:45 AM
Under firewall where do i add the ip address? ... View more

Block All users from Internal ip device allow some

by donavon89 in Security / SD-WAN
‎03-18-2019 08:15 AM
‎03-18-2019 08:15 AM
I need to be able to block everyone from accessing xx.xx.229.49 (internal ip) but i need a few people to be able to access it internally.    How do i go about doing this?       ... View more

Re: UDP session corrupt meraki

by donavon89 in Security / SD-WAN
‎03-07-2018 06:58 AM
‎03-07-2018 06:58 AM
Yes the packets are leaving the MX as for as i can tell. And no i have no policies in place that mess with UDP the only thing i have set up for that vlan is QOS and its set to the highest level. ... View more

UDP session corrupt meraki

by donavon89 in Security / SD-WAN
‎03-07-2018 06:01 AM
‎03-07-2018 06:01 AM
Good Morning!  I have a problem im trying to understand.  I have Polycom VVX500 Phones the phone server is cloud based (as far as i know its owned and managed by a 3rd party company)  recently my phones stopped being able to call our or receive calls. They could do an over head page and they could receive a page on the phone it self just no calls. I contacted support and they said.... Attempted to reach out to hosted core via this connection and was unable to. Circuit traffic is routing this path to what appears to be a firewall or device that is preventing outside connections to hosted core Attempted to locate an alternate route to use for phone to test connection to boot server Updated Boot URL from HTTP to HTTPS and rebooted one of the phones, Phone did not register. CURRENT STATUS: In order for phones to register an outside connection will need to be provided or connections to our hosted core allowed through firewall. my response    James that does not make much sense. I have 30+ other phones on the same network that are working just fine. The firewall has all the phones at the Chevy store plugged into it and they are working just fine and i hace no problems with he phones at the other stores. We need to relook at this network. There is something else wrong. There reply Assisted James with this. The phones appear to be having issues with reaching as1 for registration. They can reach the boot server just fine. As we do not have eyes on the ISP hand off ultimately I ended up changing the transport from UDP to TCP for one of the phones and it reached our server fine. This tells me that the FW or ISP modem/router has corrupted UDP sessions. Those sessions most likely are not timing out as the phones continue to attempt registration , keeping the sessions alive. With the three phones moved to TCP, they were able to register. I am going to keep the case open and next week will move one of the phones back to UDP to see if it was just a corrupt session on the fw/ ISP gear. Update We have been looking into this issue to investigate what is preventing these phones from registering with our hosted core. I have been working with Teir 2 and we were able to locate what was causing this issue. It appears there is a session for each of these phones that has either timed out or become corrupted for the UDP transport. We have temporarly adjusted these phones to use TCP instead. We are showing these phones are up and registered at this time. Can you test the phones to ensure they are up and working? We are monitoring this case for a few days to go back in and review the sessions. Once they are showing cleared we will move one of the phones back to UDP and test before moving them all back over. Please let us know if there is any further issues. My question is how would the Meraki firewall/switches cause this issue. I have 4 other sites that are using UDP and they are working just fine. We are on a metro Ethernet connection so all sites go to one place and use 1 firewall.  Could some one smarter than me help me shad some light on this one?  ... View more

Re: Fail over over metro e

by donavon89 in Security / SD-WAN
‎12-22-2017 06:57 AM
‎12-22-2017 06:57 AM
Yes there is a vlan just for the metro E of vlan 99 -10.62.214.0/26 ... View more

Re: Fail over over metro e

by donavon89 in Security / SD-WAN
‎12-21-2017 02:32 PM
‎12-21-2017 02:32 PM
Yeah I looked into doing this but like you said you still have a point for failure. I'm thinking I need a soultion that would rerout traffic over a lan port to another IP address.  ... View more

Fail over over metro e

by donavon89 in Security / SD-WAN
‎12-21-2017 02:21 PM
‎12-21-2017 02:21 PM
Greetings everyone! I have a project that im working on.    I have 7 stores (locations) that I manage 100% of the IT stuff for. 1 of the locations has a 100/100 MBPs and all the other sites are connected via a Metro-e or metro ethernet connection. This metro e is managed by Cox cable, they tell me that is a layer 2 switch that connects all my sites together.    I need to bring in a secondary connection (fail over) the only ISP in my area that is not on cox can only get to one of our 6 locations (not the main store).  The problem i have is....How do i redirect all internet traffic from the main store to the store that has the back up ISP connection in the event that the main ISP and the main store goes down over the metro e?  ... View more
Powered by Khoros
custom.footer.
  • Community Guidelines
  • Cisco Privacy
  • Khoros Privacy
  • Cookies
  • Terms of Use
© 2023 Meraki