As someone who primarily uses the out of band management interfaces for our switch management, especially for our fabric deployments, we would like the ability to utilize the Mgmt-vrf interface for Cloud Monitoring. The limitation with this as I understand is that a secure tunnel must be built for Meraki management and obviously we cannot have more than one interface in the Mgmt-vrf (so no room for the Loopback and Tunnel interfaces), and you are not currently supporting any non-default / Global VRFs. The issue for some of our devices, like fabric-deployed leaf switches, is that even if we do allow communication via the underlay / Global VRF to the Meraki cloud (which we don't really want to do), the TLS tunnel and the provisioning script doesn't seem to play well with ECMP, which is heavily used for leaf-to-spine; so the tunnel is always tied to just one upstream interface (can't just rely on current routing table) and the tunnel fails to establish correctly at all when ECMP is happening anyways. With the planned changes to the monitoring architecture and move to native NETCONF interaction with IOS-XE, could we instead get an VM/container based solution that is deployed on-prem and can communicate with the managed devices directly over any interface via NETCONF, while the VM acts as a satellite for proxying communication between the devices and the Cloud via secure tunnel terminated on the VM instead? I've seen that Meraki-managed BGP-EVPN fabrics are planned / on the roadmap, but not sure how we plan to architect the solution if still relying on the TLS tunnel with the same limitations for Cloud connectivity establishment.
... View more