This is probably a better use of an ACL. You can even create an ACL in advance that is a "permit any any", and the procedure will be to change that one "permit" to a "deny". https://documentation.meraki.com/MS/Other_Topics/Switch_ACL_Operation An ACL will also allow you to bring up parts of the network as it gets restored (by adding in additional "permit" entries").
... View more