The Meraki Community
Register or Sign in
cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Show  only  | Search instead for 
Did you mean: 
  • About Gordon
Gordon

Gordon

Getting noticed

Member since Jan 12, 2018

‎08-18-2020
Kudos from
User Count
phelpsa06
phelpsa06
1
cmr
Kind of a big deal cmr
1
CptnCrnch
Kind of a big deal CptnCrnch
1
MarcosD
MarcosD
1
PhilipDAth
Kind of a big deal PhilipDAth
3
View All
Kudos given to
User Count
ww
Kind of a big deal ww
1
PhilipDAth
Kind of a big deal PhilipDAth
2
MerakiDave
Meraki Employee MerakiDave
1
jdsilva
jdsilva
1
View All

Community Record

49
Posts
10
Kudos
0
Solutions

Badges

1st Birthday
25 Posts
First 5 Posts
First 10 Kudos
Lift-Off View All
Topics Gordon has Participated In
  • Topics Gordon has Participated In
  • Latest Contributions by Gordon

Re: Verifying Firewall Rules

by phelpsa06 in Security / SD-WAN
‎02-19-2021 12:48 PM
‎02-19-2021 12:48 PM
This is by far my biggest drawback with Meraki, otherwise I use these where I can.   I've learned to utilize the syslog functions (we use Rapid7.)  It would do so much for Meraki to be able to show a live monitor (like Palo, Fireppower and others...) With over 45 Meraki sites, it log fills up quick!     Not sure if it would ever be in the cards... But maybe, just maybe. lol   -my 2 cents. ... View more

Re: Meraki - not impressed

by Kind of a big deal PhilipDAth in Off the Stack
‎07-28-2020 02:23 PM
1 Kudo
‎07-28-2020 02:23 PM
1 Kudo
>- When a failover occurs a GARP is not sent for the 1:1 NATs therefore in the case of a failover anything that uses our 1:1's stop working   I haven't run into this issue before.  I'm guessing whatever upstream device you are using is requiring this.   >- The hit counters on the firewall rules don't work.  I have verified this and also have confirmation from tech support.   Agreed.   >Client VPN.  There isn't a way to apply different rules to users since you can't assign a static IP to a VPN client and the MAC address is not registered on the firewall so you can't apply a group policy to it.   Negative.  I do this all the time.  You get the user to VPN in once (I typically do it myself the first time to test everything is working and they are getting the correct access), and then apply the group policy to that connection.  The group policy is applied against the user, not any MAC address in this case.  Then you use group policy firewall rules to control what they can access.   >No way to positively verify that firewalls rules are working as intended.   Agreed.  I wish this was better.   >Failover order doesn't make sense.  At least not to me.    I guess this is a matter of perception.  The idea is that the warm spare does not kick in unless the primary unit has failed.  That can either occur because the physical unit has failed, or it has lost all connectivity to the Internet. Typically you connect your primary circuit to both MX units, but this does require a routed /29. In your case, you should plug your two best circuits into your primary MX, and your backup circuit into the warm spare.   Ageed - they are difficult to use a DC style environment.  They have a particular vertical feature set, and they work great in that vertical.  Once you start going outside of that things get tough or you have to make compromises. ... View more

Re: Warm Failover

by Gordon in Security / SD-WAN
‎07-28-2020 05:50 AM
‎07-28-2020 05:50 AM
So I ran a test on the weekend using the following   Primary WAN1 - ISP1 Primary WAN2 - ISP2 Secondary WAN1 - ISP1 Secondary WAN2 - not used.   This did work.  There is an issue though.  When I tried to force a failover from the Secondary to the Primary using the dashboard I got a message stating that I needed to configure the WAN2 port and it would not let me switch.  I had to go in and unplug the cell device, force the failover and plug it back in.   Next I have to try Primary WAN1 - ISP1 Primary WAN2 - ISP1 Secondary WAN1 - ISP1 Secondary WAN2 - ISP2 - we want this as a last resort ... View more

Re: VPN and Security

by Gordon in Security / SD-WAN
‎07-28-2020 05:43 AM
‎07-28-2020 05:43 AM
That does not work properly.  I tried that.  What ends up happening since the group policy can not attach to a MAC address the group policy over time gets randomly assigned to different systems.  I have a policy for IT staff.  There are only three of us.  When I go in and look at the client list that policy is currently assigned to 10 different systems. ... View more

Re: Failover issues with WAN subnet

by Gordon in Security / SD-WAN
‎07-13-2020 06:02 AM
‎07-13-2020 06:02 AM
So I now know what the issue is.   When a failover occurs Meraki does not do a GARP for the 1:1 NAT addresses.  Therefore the upstream device does not get updated.  This is from the Meraki documents.  Their solution is tell you to reboot the upstream device.   So as far as I am concerned this is a major major flaw in the Meraki failover routine.   It can take hours for the upstream device to refresh its ARP table meaning any services you are offering through those NATs will be down for hours.  Defeats the whole purpose of having a failover. ... View more

Re: MG21 and MX dynamic DNS

by jdsilva in Wireless WAN
‎06-19-2020 01:49 PM
4 Kudos
‎06-19-2020 01:49 PM
4 Kudos
Hi @Gordon.    The MX DDNS feature will use the public IP associated with the given WAN interface. If you have an MX WAN port behind a NAT the DDNS will resolve to the NAT, not to the actual IP of the MX.   I've done what you're proposing many, many times. It works quite well in my experience. ... View more

Re: Group Policies and Firewall Rules

by WD in Security / SD-WAN
‎06-10-2020 07:08 PM
‎06-10-2020 07:08 PM
The default has to permit any remaining traffic to to traverse after all the higher preceding policies have been applied, this permits blocking of restricted packets from policies at higher levels and the remainder to flow. ... View more

Re: Layer 7 - country rules

by Gordon in Security / SD-WAN
‎07-23-2019 05:20 AM
‎07-23-2019 05:20 AM
I don't want to block by country.     The rule states "Deny - countries - Traffic not to/from - list of countries   So that to me means that traffic to a country not on the list is denied and traffic from a country not on the list is denied.   This is much easier than having about 180 countries on a deny list, much easier to manage. ... View more

Re: Webinars

by Gordon in Off the Stack
‎05-15-2018 10:52 AM
1 Kudo
‎05-15-2018 10:52 AM
1 Kudo
I emailed the person who emailed my but I don't think I tried that one.  I will do so.   Thanks ... View more

Re: MX Warm Spare Issue

by Gordon in Security / SD-WAN
‎05-04-2018 11:56 AM
1 Kudo
‎05-04-2018 11:56 AM
1 Kudo
I think I may have a solution that will work for you.  I was able to get full redundancy using this configuration across multiple switches.   ... View more

Re: HA Configuration

by Gordon in Security / SD-WAN
‎04-26-2018 05:33 AM
‎04-26-2018 05:33 AM
jdizzle, yes.  That is what we discussed and have to figure out.   The engineer I am working with did have a working setup similar to what I am trying to do in his lab except he was using Meraki switches instead of Catalyst but that is minor.  I have his notes on the setup so that should help. ... View more

Re: Disable firewall/NAT rule

by Uberseehandel in Security / SD-WAN
‎03-22-2018 05:21 AM
‎03-22-2018 05:21 AM
The MX beta firmware 15.3/15.4 allows NO-NAT configuration. I debated using it and opted to run with turning off NAT on the port on the device ahead of the MX, so there is not a double NATting issue. Optionally, I can turn the NATting back on to test what occurs . . . ... View more

Re: vMX 100 multiple subnets

by Gordon in Security / SD-WAN
‎03-22-2018 05:13 AM
‎03-22-2018 05:13 AM
OK.  So the answer is no, that there is not a way to have multiple subnets.  I have looked at group policy and it is not going to work in our case for a number of reasons.   Thanks for the replies ... View more

Re: MX84 and HA

by Kind of a big deal PhilipDAth in Security / SD-WAN
‎03-02-2018 08:58 AM
1 Kudo
‎03-02-2018 08:58 AM
1 Kudo
That is correct Gordon. ... View more

Re: Website blocking

by jbhehoman in Security / SD-WAN
‎02-26-2018 12:59 PM
1 Kudo
‎02-26-2018 12:59 PM
1 Kudo
One option that may work is would be to use a Group Policy (network wide > configure > group policies) for the special users that should be able to access the site. Put website.com/login in the whitelisted URL section for that group policy, but also include website.com/login in the blocked URLs under the regular content filtering page. The whitelisted pattern in their group policy should take precedence over the blocked pattern. ... View more

Re: Site to Site VPN

by Kind of a big deal PhilipDAth in Security / SD-WAN
‎01-30-2018 12:07 PM
3 Kudos
‎01-30-2018 12:07 PM
3 Kudos
Once you have the shipping email from Cisco you can add your devices to the dashboard.  From this point on you can configure the devices.  There is no need to wait for the devices to arrive. ... View more

Re: MX84 Ports

by jdsilva in Security / SD-WAN
‎01-12-2018 07:54 AM
2 Kudos
‎01-12-2018 07:54 AM
2 Kudos
Hi Gordon,   Just as a point of clarification, the MX84 only has SFP ports, not SFP+. They are only 1Gbps capable and not 10Gbps.    I'd hate for you to order the wrong SFP modules if you thought they were SFP+.   Jason ... View more
Kudos from
User Count
phelpsa06
phelpsa06
1
cmr
Kind of a big deal cmr
1
CptnCrnch
Kind of a big deal CptnCrnch
1
MarcosD
MarcosD
1
PhilipDAth
Kind of a big deal PhilipDAth
3
View All
Kudos given to
User Count
ww
Kind of a big deal ww
1
PhilipDAth
Kind of a big deal PhilipDAth
2
MerakiDave
Meraki Employee MerakiDave
1
jdsilva
jdsilva
1
View All
My Top Kudoed Posts
Subject Kudos Views

Meraki - not impressed

Off the Stack
2 2854

Re: Verifying Firewall Rules

Security / SD-WAN
2 4367

Re: Meraki - not impressed

Off the Stack
1 2580

Verifying Firewall Rules

Security / SD-WAN
1 4850

Layer 7 - country rules

Security / SD-WAN
1 1555
View All
Powered by Khoros
custom.footer.
  • Community Guidelines
  • Cisco Privacy
  • Khoros Privacy
  • Privacy Settings
  • Terms of Use
© 2023 Meraki