The Meraki Community
Register or Sign in
cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Show  only  | Search instead for 
Did you mean: 
  • About Brash
Brash

Brash

Kind of a big deal

Member since Aug 17, 2021

Online
Kudos from
User Count
SahadSalmiT
SahadSalmiT
1
cmr
Kind of a big deal cmr
68
KiloBravo
KiloBravo
1
CptnCrnch
Kind of a big deal CptnCrnch
56
PhilipDAth
Kind of a big deal PhilipDAth
204
View All
Kudos given to
User Count
PhilipDAth
Kind of a big deal PhilipDAth
88
ConnorL
Meraki Employee ConnorL
2
KRobert
KRobert
6
Rwideman
Rwideman
2
janic
janic
2
View All

Community Record

586
Posts
703
Kudos
77
Solutions

Badges

Community All-Star 2023
Community All-Star 2022
Rising Star
MOTM - Dec 2022
MOTM - May 2022
MOTM - Apr 2022 View All
Latest Contributions by Brash
  • Topics Brash has Participated In
  • Latest Contributions by Brash
  • « Previous
    • 1
    • …
    • 19
    • 20
    • 21
    • 22
  • Next »

Re: Revealing Your 2022 Meraki Community All-Stars!

by Kind of a big deal Brash in Community Announcements
‎01-18-2022 12:28 AM
2 Kudos
‎01-18-2022 12:28 AM
2 Kudos
Congratulations everyone! And thanks for the warm welcome!  🙂 ... View more

Re: Physical or Virtual stack

by Kind of a big deal Brash in Switching
‎01-14-2022 03:00 AM
4 Kudos
‎01-14-2022 03:00 AM
4 Kudos
Virtual stacking is essentially a feature for ease of management from the dashboard. The switches remain separate in terms of physical operation and network topology.   Physical switching on the other hand is where two (or more) switches are physically connected to eachother using the stack ports.They are managed and act as a single switch, providing benefits or redundancy and faster switching of packets between ports on two different stack members.   Physical is only supported on certain switch models so make sure to check the Meraki MS Datasheet or the below linked stacking guide. Stacking Guide for reference: Switch Stacks - Cisco Meraki ... View more

Re: Second attempt failed to upgrade MR52's, packet loss and slowness in sw...

by Kind of a big deal Brash in Wireless LAN
‎01-13-2022 03:57 PM
‎01-13-2022 03:57 PM
Given what you've described, it's quite possibly a firmware. But under the assumption it's not, if you follow the MAC flaps down through the port-channels and switches, which devices and ports to they isolate to? ... View more

Re: Can I enable Anyconnect client while keeping regular Client VPN running...

by Kind of a big deal Brash in Security / SD-WAN
‎01-13-2022 01:42 PM
6 Kudos
‎01-13-2022 01:42 PM
6 Kudos
This might be what you're looking for: "The MX supports L2TP/IPsec Client VPN and AnyConnect VPN simultaneously. "   AnyConnect on the MX Appliance - Cisco Meraki ... View more

Re: Wireless links (Backhaul)

by Kind of a big deal Brash in Wireless LAN
‎12-20-2021 08:05 PM
‎12-20-2021 08:05 PM
Using a repeater will see performance degradation as everything packet is transmitted to the gateway AP, and then re-transmitted onto the LAN. Not to mention the potential of interference. However you can definitely setup repeaters where the performance impact is neglible. Adding additional AP's wouldn't help the performance of the repeater (unless they have a better connection to the repeater than the current AP), as the repeater will only send and receive via one gateway AP.   A directional antenna may help if interference is your main problem.  Are you seeing high latency or poor signal when looking at the AP health/summary information on the dashboard? ... View more

Re: Meraki MX85 / Unifi UAP Pro / US 16 - 150w

by Kind of a big deal Brash in Security / SD-WAN
‎12-20-2021 03:37 PM
2 Kudos
‎12-20-2021 03:37 PM
2 Kudos
In terms of AP management, as long as the Unifi controller (wherever it resides) can reach the Unifi Switch and AP's, there shouldn't be any difference from how you currently manage it.   In terms of networking configuration and design, you might have to make some adjustments for adding in the MX such as adding the appropriate VLANs, setting DHCP etc. ... View more

Re: MAC address on which port

by Kind of a big deal Brash in Security / SD-WAN
‎12-20-2021 01:10 PM
‎12-20-2021 01:10 PM
As @PhilipDAth said, you can't typically see the MAC addresses of devices connected to the MX. However, you can find LLDP/CDP information using the API - View LLDP or CDP information on MX device - The Meraki Community. ... View more

Re: How to see the devices and Ips that are connected to the MX?

by Kind of a big deal Brash in Security / SD-WAN
‎12-20-2021 01:07 PM
‎12-20-2021 01:07 PM
It depends on what you're looking for. If you're looking for clients, you can find them under Network-Wide -> Clients, and sort by "connected to".   If you're looking to find LLDP information about connected devices from the MX's perspective, there's no way to find that in the GUI. However you can pull the information via the API. See the following thread. View LLDP or CDP information on MX device - The Meraki Community   If you know it's connected to a Meraki switch and are just trying to identify which port, you can navigate to Switch -> Switch Ports and look at the table column CDP/LLDP for the MX (you might have to add the column using the spanner in the top right of the table). You can also use the search bar to filter on this. ... View more

Re: SDWAN QoS Policy "All Software Updates & AV Updates" does not match the...

by Kind of a big deal Brash in Security / SD-WAN
‎12-15-2021 01:01 PM
2 Kudos
‎12-15-2021 01:01 PM
2 Kudos
I'd say it's a much better idea to block/manage updates from the Windows side using something like group policy and WSUS. Assuming that L7 rule is applied correctly but is just not capturing Windows Update traffic for whatever reason, you could look at blocking the specific domains instead.   Ajit's comments in the following thread are pretty good at outlining the options. How to block Windows Updates? - The Meraki Community ... View more

Re: MX64 to Aruba 2930F switch vlan issue

by Kind of a big deal Brash in Security / SD-WAN
‎12-14-2021 08:27 PM
‎12-14-2021 08:27 PM
you mean I have to configure vlans on MX and also in Switch? Yes, the Aruba needs to have the VLAN configured to be able to pass traffic on that VLAN. It doesn't need a VLAN gateway/Virtual Interface though as this will be on the MX. What i have done:  Configure 2 Vlans in MX. port 1 of MX is connected to Port 24 on Aruba switch (on MX Native vlan 1 and allowed vlans all) Now on Aruba SW i have configured same 2 vlan. Port 24 is tagged.  When you say Port 24 is tagged, do you mean it's allowing tagged traffic or tagging incoming traffic? Mind you, some of this configuration is dependent on what you're trying to achieve as the end goal. The above assumes that the Aruba will be tagging traffic downstream, and sending tagged traffic to the upstream MX where the VLAN gateway resides.   ... View more

Re: MX64 to Aruba 2930F switch vlan issue

by Kind of a big deal Brash in Security / SD-WAN
‎12-14-2021 08:08 PM
‎12-14-2021 08:08 PM
You will need to ensure that the Aruba is configured to 'know about' the 3 vlans, and that the port connected to the MX is configured to trunk those vlans. Not sure of the exact syntax on Aruba switches but in Cisco world, that invloves: Creating 3 vlans on the switch:      Switch(config)# vlan 1-3 Configuring the port as a trunk       Switch(config)# interface gi1/1       Switch(config-if)# switchport mode trunk   The following link might help with the syntax/process. Configuring VLANs (arubanetworks.com) ... View more

Re: Opening Ports for Static Route

by Kind of a big deal Brash in Security / SD-WAN
‎12-13-2021 01:17 PM
‎12-13-2021 01:17 PM
Chances are you can configure just about all of this in the firewall on the MX250.   Outbound rules can be set with the applicable source/destination subnets & ports to allow/deny. Or you can add an explicit deny all as the last configurable rule. The rest depends on your topology:  - Whether the static route is for a WAN port or LAN port or S2S VPN?  - Is your MX setup for NAT or No-NAT? Is it common practice  to deny all outbound connections in the firewall and only allow wanted outbound connections?  It really depends on your use case, traffic flows and security you're putting in place. For example blocking all outbound except for specific allowed rules is a common firewall technique. However for many SMB's it is too much overhead to implement and maintain the rules. Therefore the trade-off may be that they leave the allow any-any rule for an arguably less secure but easier to manage environment. ... View more

Re: 802.1Qbb and 802.1Qaz

by Kind of a big deal Brash in Switching
‎12-08-2021 09:03 PM
‎12-08-2021 09:03 PM
North-South will definitely require solid switches given all of your Management, VM Network and vMotion traffic will be going through it but the requirements for those should be exactly the same as any other server solution (HCI, traditional SAN etc). I can only see PFC being a requirement if you're using the same switches to push the storage traffic across, or presenting the storage directly to other hosts on the network. In that circumstance though, I'd probably just opt for physically separate switches. That said, these are all assumptions. The only HCI solution I've worked on (albeit very closely) is Cisco Hyperflex. ... View more

Re: 802.1Qbb and 802.1Qaz

by Kind of a big deal Brash in Switching
‎12-08-2021 08:30 PM
1 Kudo
‎12-08-2021 08:30 PM
1 Kudo
I haven't read up on the solution specifics but I'm guessing the PFC requirements is for East-West storage replication/communication between servers. You could use a datacenter switch that only handles this traffic while using Meraki for the host/VM network traffic. Even if it were supported on an enterprise core or access switch, I'd probably avoid it anyway given the need for large buffers and very fast ASIC's. PFC on slow(er) switches or across multiple hops can cause huge performance issues that are just awful to troubleshoot. ... View more

Re: 802.1Qbb and 802.1Qaz

by Kind of a big deal Brash in Switching
‎12-08-2021 07:59 PM
2 Kudos
‎12-08-2021 07:59 PM
2 Kudos
I haven't seen any documentation suggesting that support is present or is planned. I would say it doesn't align with Meraki's typical target market.   PFC is most commonly used for FCOE which you'll primarily find on datacenter switches rather than enterprise core and edge. ... View more

Re: VLAN Number Between MS-250 L3 Switch and Cisco IOS Router

by Kind of a big deal Brash in Switching
‎12-07-2021 02:33 PM
3 Kudos
‎12-07-2021 02:33 PM
3 Kudos
Seems correct. The VLAN number itself shouldn't matter, so long as you're tagging the incoming VPLS traffic onto the right VLAN so it can hit the SVI. ... View more

Re: DMZ without an extra Static IP address.

by Kind of a big deal Brash in Security / SD-WAN
‎12-07-2021 01:08 PM
‎12-07-2021 01:08 PM
Your main issue I can see is that both MX's will use the same external port for Meraki client VPN, so unless you have multiple external IP's, there's no way you can get both VPN's working from the same IP. Is the issue here that you have users who are configured to VPN to Site-A that you don't want to re-configure for Site-B, or are you just trying to avoid changing the IP on the server? ... View more

Re: Need some suggestions for a small reliable switch with SFP+ Ports for m...

by Kind of a big deal Brash in Switching
‎12-06-2021 01:16 PM
4 Kudos
‎12-06-2021 01:16 PM
4 Kudos
From Meraki, the  MS120-8 is a good option if you're just looking at 1G For more than that, you'd be looking at an MS125-24.   Otherwise, you could look at a Cisco C3560CX-8XPD-S for a small mGig switch ... View more

Re: Errors using API for "Update Network Client Policy"

by Kind of a big deal Brash in Security / SD-WAN
‎12-05-2021 06:09 PM
1 Kudo
‎12-05-2021 06:09 PM
1 Kudo
Looks like you've got the parameters correct. Potentially your JSON body is malformed (end of line character or other hidden character causing issues)? I just did a quick test using Postman. PUT: .../v1/networks/<NetworkID</clients/<clientID>/policy Body: {      "devicePolicy" :  "Group policy" ,      "groupPolicyId" :  "100" } Response: {      "mac" :  "<Mac Address>" ,      "groupPolicyId" :  "100" ,      "devicePolicy" :  "Group policy" } ... View more

Re: Errors using API for "Update Network Client Policy"

by Kind of a big deal Brash in Security / SD-WAN
‎12-05-2021 05:18 PM
‎12-05-2021 05:18 PM
It looks like you haven't specified "devicepolicy" in the body.   Device Policy The policy to assign. Can be 'Whitelisted', 'Blocked', 'Normal' or 'Group policy'. Required.   Assumedly for your API call, it should be set to "Group policy" ... View more

Re: Meraki Mx64

by Kind of a big deal Brash in Security / SD-WAN
‎12-05-2021 01:56 PM
‎12-05-2021 01:56 PM
Meraki MX devices are security gateways. Only 1 is allowed in each Meraki network. You won't be able to add a second one unless it is acting simply as a backup to the primary one - (see hot spare).   What are you trying to achieve with the second MX? ... View more

Re: Regular CRC errors for 5-10 minutes for a couple days and then nothing ...

by Kind of a big deal Brash in Switching
‎12-03-2021 04:52 AM
‎12-03-2021 04:52 AM
Good find. Certainly better than having to re-run cables. ... View more

Re: Client VPN Initial Connection Problem

by Kind of a big deal Brash in Security / SD-WAN
‎12-02-2021 07:24 PM
‎12-02-2021 07:24 PM
Where are you testing the client VPN from? Inside your network (across the S2S VPN) or outside of your network? Can you show the S2S VPN settings? ... View more

Re: Client VPN Initial Connection Problem

by Kind of a big deal Brash in Security / SD-WAN
‎12-02-2021 06:59 PM
‎12-02-2021 06:59 PM
The port forwarding needs to be configured on the upstream NAT device (assumedly firewall). UDP 500 and 4500 need to be forwarded to the MX's WAN interface IP address. ... View more

Re: HTTPS Inspection on MX

by Kind of a big deal Brash in Security / SD-WAN
‎12-02-2021 06:23 PM
‎12-02-2021 06:23 PM
I thought that might be the case given MiM for HTTPS inspection is beginning to get steered away from. That said another service means another additional cost 😞   ... View more
  • « Previous
    • 1
    • …
    • 19
    • 20
    • 21
    • 22
  • Next »
Kudos from
User Count
SahadSalmiT
SahadSalmiT
1
cmr
Kind of a big deal cmr
68
KiloBravo
KiloBravo
1
CptnCrnch
Kind of a big deal CptnCrnch
56
PhilipDAth
Kind of a big deal PhilipDAth
204
View All
Kudos given to
User Count
PhilipDAth
Kind of a big deal PhilipDAth
88
ConnorL
Meraki Employee ConnorL
2
KRobert
KRobert
6
Rwideman
Rwideman
2
janic
janic
2
View All
My Accepted Solutions
Subject Views Posted

Re: Removing unrequired network menu items

Dashboard & Administration
95 Tuesday

Re: Best practice to remote into a win11 workstation behind an mx67w

Security / SD-WAN
123 Sunday

Re: DNS services on MX

Security / SD-WAN
260 a week ago

Re: Is there a means to increate MX67 max throughput

Security / SD-WAN
270 a week ago

Re: Network Tags drop down disappeared?

Dashboard & Administration
150 a week ago

Re: Port Scheduling

Switching
142 a month ago

Re: How to connect remotely to a Cisco Meraki Network

Security / SD-WAN
356 ‎02-23-2023 03:30 AM

Re: Does MS120 support cloud dashboard pcaps

Switching
106 ‎02-22-2023 07:25 PM

Re: Different AP models

Wireless LAN
196 ‎01-27-2023 02:51 AM

Re: Using MS120-8 as access switches

Switching
312 ‎01-19-2023 01:23 AM
View All
My Top Kudoed Posts
Subject Kudos Views

Re: It’s that time of year again 🧹🧼🧽 — share your spring cleaning pictur...

Community Announcements
12 4658

Just In Time For Autumn (and Winter)!

Off the Stack
8 86

Re: Sign the Community’s birthday card!

Community Announcements
8 2215

Re: Meshing when wired

Wireless LAN
8 733

Re: using Meraki solution for a public wifi

Wireless LAN
7 367
View All
Powered by Khoros
custom.footer.
  • Community Guidelines
  • Cisco Privacy
  • Khoros Privacy
  • Privacy Settings
  • Terms of Use
© 2023 Meraki