Abc of Meraki
Abc of Meraki
Abc of Meraki
Features include:
• Centralized cloud management: Securely manage all your phones
from anywhere through the dashboard.
• IVR and call groups: Deliver simplified voice menus setup, letting
users load files, assign actions as needed, and initiate responses
without complicated instructions.
• Wideband audio: Have clear conversations with Hi-Fi quality during
phone calls.
• Contact and phone integration: Import your group’s contacts into
the dashboard smoothly, making it easier to assign phones and
numbers to group members.
• Easy onboarding: Start without delay when adding more phone
numbers as needed. You’re ready to start using the new numbers
in minutes, not weeks.
Additional lines: You can make and receive calls on up to eight lines.
Cisco Meraki Dashboard
Cisco Meraki Dashboard
MX Setup | How to Create VLANs
Monitor > Appliance Status
By default, MX’s name will appear as its MAC address – look for and
click on the pencil icon , to edit this. MX[n] n is your station number.
In a Similar fashion, proceed to add/edit a physical address. This
can be your actual address.
To setup VLAN go to Configure > Address & VLANs
Name: Corp ; VLAN ID 10 ; subnet :10.20.10.0/24
Name: Voice: VLAN ID 30 : subnet : 10.20.11.0/24
Create this to all MX Appliance .
Addressing and VLANs
Appliance settings are accessible through the Security Appliance >
Configure > Addressing & VLANs page and include Network name,
passthrough or NAT mode, client tracking methods, subnet and VLAN
configuration, Static LAN routes, and Dynamic DNS settings.
Name
This field allows you to set or modify the name of the Dashboard network
that contains the security appliance.
Deployment Mode
The MX appliance can be deployed in two possible modes:
•Passthrough or VPN concentrator mode
•NAT mode
Passthrough or VPN concentrator mode
As a Layer 2 passthrough device
Choose this option if you simply want to deploy the MX device:
•In bridge mode for traffic shaping and additional network visibility.
•As a one-armed VPN concentrator.
In this mode, the MX device does not provide any address translation
and operates as a passthrough device between the Internet and the
LAN ports (sometimes referred to as a Layer 2 bridge).
Client traffic to the Internet will have its source IP rewritten to match the
WAN IP of the appliance. In this mode, the MX appliance is generally also
the default gateway for devices on the LAN.
•Track client by MAC address: This is the default selection. Use this option if
all client devices are within the VLANs/subnets configured on the
appliance, and there is no Layer 3 device between the appliance and the
clients.
Routes
The appliance has multiple LAN IPs, each of which is the default
gateway address on its particular VLAN.
To add a new VLAN, click "Add a local VLAN" at the bottom of the
routes table. To modify an existing VLAN, click on that VLAN in the
Routes table. The following fields can be set for a local VLAN:
VLANS
•Name: The name of the VLAN.
•Subnet: Use this option to enter the IP subnet for the VLAN. Note that as
with Single LAN mode, you need to provide this information in CIDR
notation.
•MX IP: The IP address of the MX appliance in this particular VLAN/subnet.
This is the default gateway IP address on that VLAN.
•VLAN ID: The numerical identifier that is assigned to the VLAN.
•Group Policy: The Group Policy you wish to apply to this VLAN.
•In VPN: Determines whether the MX advertises this VLAN to site-to-site VPN
peers.
To delete a VLAN, click on the X next to that VLAN on the far right side of
the Routes table.
Static LAN routes
Static LAN routes are used to reach a subnet that is behind a layer-3 switch or
otherwise not directly connected to or configured on the appliance.
To add a new static LAN route, click "Add a static route" at the bottom of the
routes table. To modify an existing static route, click on it in the Routes table. The
following fields can be set for a static LAN route:
•Enabled: Whether the MX should use the route or not. Use this setting if you wish to
temporarily remove a route from the MX without having to manually recreate it
later.
•Name: The name of the static route.
•Subnet: Use this option to enter the remote subnet that is reached via this static
route (in CIDR notation).
•Next hop IP: IP address of the device (such as a router or layer 3 switch) that
connects the MX appliance to the static route subnet. This is also sometimes
referred to as the 'route gateway IP'.
Static LAN routes
•Active: Conditions that control when this route will be used. A static route can be
set to one of three modes:
• Always: Route is always used.
• While next hop responds to ping: Route is used only if the MX can successfully
ping the next hop IP configured for the route.
• While host responds to ping: Route is used only if the MX can ping a specified
host IP using the route.
•Host IP to ping: Only appears if While host responds to ping is selected above. This is
the IP that the MX will ping via the static route to determine whether the route is
working properly. This device must be in the subnet specified in the static route, and
should always be a device with a static IP or a DHCP reservation (such as a server).
•In VPN: Determines whether the MX advertises this static route to site-to-site VPN
peers.
To delete a static LAN route, click on the X next to that route on the far right side of
the Routes table.
Per-port VLAN configuration
Here you can view and modify the VLAN settings for your MX appliance on a per-
port basis. To modify the per-port VLAN settings, select the port or ports you wish to
reconfigure and click Edit. You will be presented with a menu that allows you to set
the following parameters:
•Enabled: Enable or disable the port. If the port is set to Disabled, no other options will
be available.
•Type: Set the port to either trunk or access mode. A port configured in trunk mode
can pass traffic on multiple VLANs, while an access mode port passes traffic for only
one VLAN.
•Native VLAN (trunk mode only): Sets the Native VLAN for the port. All untagged
traffic that comes in on this port will be treated as if it belonged to this VLAN. This can
also be set to 'Drop untagged traffic'.
•Allowed VLANs (trunk mode only): The VLANs for which this port will accept and
pass traffic. This must include the Native VLAN if one is set.
•VLAN (access mode only): The VLAN for which this port will accept and pass traffic.
All untagged traffic will automatically be treated as if it belonged to this VLAN.
Dynamic DNS
Dynamic DNS allows you to reach a public-facing MX appliance over
the internet even if the public IP address changes.
This public DNS record will be updated if the public IP address of the
appliance changes due to DHCP lease renewal or uplink failover.
Custom FQDN name:
Creating a custom DNS name for your appliance is simple. Let's assume that
you have an MX90 that you've named "myMX90" and you want to name it
"myMX90.example.com". Meraki will auto-generate a unique FQDN, for
example: myMX90-wmktpbbzt.dynamic-m.com.
Using a type of DNS record called a CNAME record, you can map arbitrary
DNS names to other DNS names. If you register a domain (e.g., example.com),
your registrar should be able to help you set up a CNAME from your new
domain (or a subdomain) to myMX90-wmktpbbzt.dynamic-m.com.
At this point your custom DNS name would resolve to the public IP of the
appliance the same way that the original, auto-generated FQDN would.
Warm spare
Here you can add a second MX appliance as a warm spare unit to create a
high availability (HA) pair. To do so, click the Add a warm spare button and
enter the serial number of the spare, along with virtual IPs for any uplinks that
are being used.
•Remove the spare from the network to be used elsewhere by clicking the
Remove spare button. The spare will return to default configuration, so it is highly
recommended that it be removed from the network or taken offline before this
action is taken.
Setting up Security Policy on MX: Task
Uplink configuration
This section allows you to configure bandwidth settings, list update
frequency, primary uplink, load balancing, and layer 3 uplink
preferences.
Uplink bandwidth settings
This option allows you to configure the upload and download bandwidth
of the uplinks. This information is needed for traffic load balancing
between the active WAN / Internet ports as well as for limiting upload
and download traffic through the WAN ports.
You can configure Uplink 1, Uplink 2, and the cellular uplink individually.
To configure different upload and download bandwidths for a particular
uplink, click the details button next to that uplink's bandwidth slider.
Primary uplink
This option determines which uplink should be the primary connection.
VPN traffic and management traffic to the Meraki Dashboard use the
primary uplink. If load balancing is disabled, all traffic will use the primary
uplink unless an uplink preference is configured specifying otherwise.
Load balancing
When enabled, Load balancing spreads Internet traffic across both uplinks
proportional to the Internet1 and Internet2 bandwidths specified above.
You can also use this mode to create more-precise per-client limits
than in simple mode.
Enable SpeedBurst:
To provide a better user experience in bandwidth-limited
environments, an administrator can enable SpeedBurst by selecting
the Enable Speedburst checkbox.
Users are allowed up to four times their allotted bandwidth limit for a
period of up to five seconds.
Add a new traffic shaping rule for Netflix and Pandora – Choose a
limit of 1 Mbps down, 500 Kbps up on this rule with “low priority”
Create another traffic shaping rule for all VoIP & Video
conferencing traffic – ignore network bandwidth restrictions for this
rule and ensure the applications are treated as “High” priority .
There are two main components to each rule: the type of traffic to be
limited or shaped (rule definition), and how that traffic should be limited or
shaped (rule actions).
Rule Definition
Rules can be defined in two ways:
• You can select from various predefined application categories
such as Video & Music, Peer-to-Peer, or Email.
• You can create rules by specifying HTTP hostnames (for example,
salesforce.com), port numbers (such as 80), IP ranges (such as
192.168.0.0/16), or IP address range and port combinations (such
as 192.168.0.0/16:80).
• Bandwidth limits can be specified to ignore any limits specified for the
whole network, to obey the specified limits, or to apply more-restrictive
limits than the network limits.
Use the bandwidth slider control to choose the appropriate limit for each
type of traffic. To specify asymmetric limits on uploads and downloads,
click details next to the bandwidth slider control.
This also affects the Wi-Fi Multimedia (WMM) priority of the traffic.
HTTP content caching
When this setting is enabled, the MX will cache web content on its
local hard drive. This can improve end-user experience by reducing
page load times and file download times for frequently accessed web
content. This option is not available on the MX60, MX60W, MX64,
MX64W, MX65, or MX65W.
Traffic Shaping
Over VPN Traffic shaping rules will apply to traffic sent over an AutoVPN
tunnel between Meraki devices. Please note that traffic shaping rules
do not apply to traffic that passes over a non-Meraki VPN tunnel.
Create a Layer7 firewall rule to
completely block Bit Torrent
The firewall settings page in the Meraki Dashboard is accessible via
Security Appliance/Teleworker Gateway > Configure > Firewall.
On this page you can configure Layer 3 and Layer 7 outbound firewall
rules, publicly available appliance services, port forwarding, 1:1 NAT
mappings, and 1:Many NAT mappings
Outbound rules
Outbound rules Here you can configure permit or deny Access Control
List (ACL) statements to determine what traffic is allowed between VLANs
or out from the LAN to the Internet.
• The Src Port andDst Port fields support port numbers or port
ranges. Multiple ports can be entered comma separated.
There are several important considerations for utilizing and testing this
configuration:
1. The MX must see the client's DNS request and the server's response in order
to learn the proper IP mapping. The communication between the client and
DNS server cannot be intra-VLAN (this DNS traffic is not snooped).
2. In some cases a client device may already have IP information
about the web resource it is attempting to access. This could be due to
the client having cached a previous DNS response, or a local statically
configured DNS entry on the device.
This can be useful for limiting cellular traffic to only business-critical uses
in order to prevent unnecessary cellular overages.
Appliance services
• ICMP Ping: Use this setting to allow the MX to reply to inbound ICMP ping
requests coming from the specified address(es). Supported values for the
remote IP address field include None, Any, or a specific IP range (using
CIDR notation).
You can also enter multiple IP ranges separated by commas. To add
specific IP addresses rather than ranges, use the format X.X.X.X/32.
• Web (local status & configuration): Use this setting to allow or disable
access to the local management page (wired.meraki.com) via the WAN IP
of the MX. Supported values for the remote IPs field are the same as for
ICMP Ping.
• SNMP: Use this setting to allow SNMP polling of the appliance from the
WAN. Supported values for the remote IPs field are the same as for ICMP
Ping.
Layer 7 Firewall Rules
Using Meraki's unique layer 7 traffic analysis technology, it is possible to
create firewall rules to block specific webbased services, websites, or types
of websites without having to specify IP addresses or port ranges.
This can be particularly useful when applications or websites use more than
one IP address, or when their IP addresses or port ranges are subject to
change.
It is possible to block applications by category (e.g. 'All video & music sites')
or for a specific type of application within a category (e.g. only iTunes within
the 'Video & music' category).
The figure below illustrates a set of layer 7 firewall rules that includes both
blocking entire categories and blocking specific applications within a
category:
It is also possible to block traffic based on HTTP hostname, destination
port, remote IP range, and destination IP/port combinations
Geo-IP Based Firewalling
The Layer 7 Firewall can also be used to block traffic based on the
source country of inbound traffic or the destination country of
outbound traffic.
To do so, create a new Layer 7 Firewall rule and select Countries... from
the Application drop-down.
You have the option of blocking all traffic to or from a specified set of
countries or blocking any traffic that is not to or from a specified set of
countries.
AMP is a robust anti-malware technology integrated into the proposed
Meraki MX Cloud Managed Security Appliances. There are two important
concepts with AMP: Disposition and Retrospection.
A file's disposition is a categorization from the AMP cloud that determines what
actions are taken on the file download. There are three file dispositions: (1)
Clean—the file is known to be good, (2) Malicious—the file is known to be
harmful, and (3) Unknown—there is insufficient data to classify the file as clean or
malicious.
Sometimes files will change disposition, based on new threat
intelligence gained by the AMP cloud. This re-classification can also
generate retrospective alerts and notifications.
The proposed Meraki MX Cloud Managed Security Appliances will
block HTTP-based file downloads based on the disposition received
from the AMP cloud.
If the proposed appliance receives a disposition of malicious for the file
download, it will be blocked. If it receives a disposition of clean or
unknown, the file download will be allowed to complete.
Task:
Turn on (enable) Advanced Malware Protection within the threat
protection mechanisms available for your MX . Also proceed to enable
Intrusion Prevention and enforce a “Balanced” ruleset.
Forwarding rules
Use this area to configure port forwarding rules and 1:1 NAT
mappings as desired.
Port forwarding
Use this option to forward traffic destined for the WAN IP of the MX on a
specific port to any IP address within a local subnet or VLAN.
Click Add a port forwarding rule to create a new port forward. You need
to provide the following:
Under Actions you can move a configured rule up or down in the list.
Click the X to remove it entirely.
Creating a 1:1 NAT rule does not automatically allow inbound traffic to
the public IP listed in the NAT mapping. By default all inbound
connections are denied.
• Public IP: The IP address that will be used to access the internal resource
from the WAN.
• Uplink: The physical WAN interface on which the traffic will arrive.
A 1:Many NAT entry will be created with one associated forwarding rule. To
add additional rules, click Add a port forwarding rule under the existing
rule or rules for a particular 1:Many entry.
• Description: A description of the rule.
• Protocol: TCP or UDP.
• Public port: Destination port of the traffic that is arriving on the
WAN.
• LAN IP: Local IP address to which traffic will be forwarded.
• Local port: Destination port of the forwarded traffic that will be sent
from the MX to the specified host on the LAN. If you simply wish to
forward the traffic without translating the port, this should be the
same as the Public port.
As a result of our initial discovery, we are confident that the Meraki SD-
WAN solution is an excellent fit for your company.
SD-WAN Technologies
The Meraki SD-WAN implementation is comprised of several key
features, built over our AutoVPN technology.
The ability to form and send traffic over VPN tunnels on both interfaces
significantly increases the flexibility of traffic path and routing decisions in
AutoVPN deployments.
MX appliances track the rate of successful responses and the time that
elapses before receiving a response. This data allows the MX to determine
the packet loss, latency, and jitter over each VPN tunnel in order to make
the necessary performance based decisions.