Community Record
13
Posts
21
Kudos
1
Solution
Badges
Feb 4 2020
6:15 AM
Batch Imaging and deploying 75 computers caused pool to fill up. Count me as one more vote for a method to manually clear inactive DHCP leases. T-800
... View more
Jun 20 2018
9:52 AM
1 Kudo
If each WAN port is getting its own public IP, I don't see why this wouldn't work. Its not truly redundant, but it should work for aggregation. I have a an MX84 that is ultimately doing something theoretically similar, but not for the purpose of aggregation. The MX can do "private IP" routing on the LAN ports (like to an MPLS router for example), so if you don't need inspection and NAT, that could possibly be an option too. To my knowledge the default 0.0.0.0 has to go through the WAN ports though. T-800
... View more
Jun 20 2018
9:22 AM
1 Kudo
I believe the ASA's were true L3 gateways, but they may not have been as picky about ARP, or basically may have just played nicely with each other. There are certainly other options as to why, but I wouldn't worry about trying to figure out why it was actually working. Move on and just fix it. *It would be a good idea to make sure the switches are indeed operating in L2 mode with just a management interface and are not doing any routing. For incoming services from both ISP's you would look under the "port forwarding" section of the firewall configuration page. Each of the options let you choose the up-link (Internet 1 or Internet 2), so you should be able to use both connections for different services inbound. You'll need to figure out if you which method you were/are doing for inbound connections. For true DMZ, you'll need to define in the firewall that the "DMZ VLAN" can't talk to the internal "Data VLAN" as the "default" rule. Then make individual rules to allow communication as necessary. Meraki's essentially have all VLANS as same security zone (ASA lets you set security levels so that DMZ can't talk to zone with a higher security level) These articles will be helpful: Port forwarding and NAT rules: https://documentation.meraki.com/MX-Z/NAT_and_Port_Forwarding/Port_Forwarding_and_NAT_Rules_on_the_MX Creating a DMZ on the MX https://documentation.meraki.com/MX-Z/Firewall_and_Traffic_Shaping/Creating_a_DMZ_with_the_MX_Security_Appliance T-800
... View more
Jun 20 2018
8:35 AM
2 Kudos
Yes there is something fundamentally wrong with your setup. You essentially have a "flat" LAN and achieve fail-over by changing the gateway address on the NIC of the PC/device. You don't have 2 LAN's and you don't have separate networks. (This is how I understand your post; correct me if I am wrong) **If you had to plug the cable into a different network jack to achieve fail-over, that would be separate networks as you have described it. What you have is one network with two different L3 gateway addresses. Layer 2 is on a single broadcast domain. ARP is being done by two separate sources and that is your issue (which could lead to IP conflicts and other weird things) Minimum best practice would be: --WAN MX84#1 Internet 1 = ISP1 Internet 2 = ISP2 --LAN (use 3 separate ports to the switches or a trunk por to switches) Data VLAN Phone VLAN DMZ VLAN ** Switches would be setup with voice VLAN's if computer plugs into phone. *** MX84#2 should be used a warm spare so that ARP table is synced between devices. This would solve your issues and let you achieve fail-over without changing the computer IP address. It would also let you make load balancing rules on the 2 WAN connections. Assuming your switches support VLAN's/Voice VLAN's this could easily be changed overnight, depending on number of switches/clients/floors/how well things are organized. -T-800
... View more
Jun 6 2018
7:34 AM
Meraki uses "lifetime-kb-unlimited" and there is no way to change this. We had an issue where we were doing MX VPN's to Cisco ASA and this is what was recommended bu Meraki support. I believe this is also why Azure tunnels won't stay connected. You need an ASA running 9.1(2) or higher I believe to use this command. On Cisco ASA you have to specify this in crypto-map: crypto map <map-name> <seq-num> set security-association lifetime kilobytes unlimited T-800
... View more
May 3 2018
9:07 AM
1 Kudo
I had this happen last two weeks ago with MX84's on firmware 13.28. It happened to me on Apr 20th and Apr 23rd. This was with an "affected" Meraki MX84 that was scheduled to be swapped on Apr 26th. I opened a ticket with Meraki also, but didn't press the matter since there was already a replacement on hand. Meraki Case # 02602009 Our MX84 was in a datacenter cage and nothing else on that PDU rebooted/power cycled either time. This Meraki had been in use for just over 18 months at the time of the issue.
... View more
May 3 2018
8:53 AM
7 Kudos
I want to have a Meraki PDU that integrates with combined networks or as standalone network. It needs to do a few things: 1. Monitor usage and devices and log for 30 days. 2. Monitor at least two connections (via wired ethernet) and power cycle ports on loss. 3. Optional - Have ports for temperature probes with alerting / actions based on those too. 4. Optional 2 - Have out-of-band port for cellular (like on MX devices) While there are a lot of products that do this, none have the Meraki Dashboard. I'd pay $100 - 200 for 2 power ports and two ethernet ports and would pay $25/50 a year in licensing. I would absolutely buy one for every network I deploy that is not in driving distance. This could also be VERY a good "gateway/promotional product," like the AP's for webinars. How many signatures do I have to have to make this happen?
... View more
My Accepted Solutions
Subject | Views | Posted |
---|---|---|
18035 | Jun 20 2018 8:35 AM |
My Top Kudoed Posts
Subject | Kudos | Views |
---|---|---|
7 | 2676 | |
2 | 18035 | |
1 | 10428 | |
1 | 17751 | |
1 | 8482 |