The Clients usage page on MR Access Points, MX/Z1 Security Appliances, and MS Switches tracks clients that are connected to your Cisco Meraki network with a customizable interface for filtering specific device types and traffic. To view the Clients usage Network-wide > Monitor > Clients in Dashboard.
Navigating the Clients List
The clients list displays helpful information about client status, network usage, operating system, IP and MAC addressing, and additional statistics that you can choose to display by adding columns. A client will only appear in the list once it has passed Internet traffic. If a device, such as a LAN printer, does not pass any Internet traffic, then it will not appear in the list.
Clients appearing on the Clients usage page will display their current status to indicate if they are currently active, as seen below in Figure 1. The activity threshold for a client is one minute. If a client does not pass traffic for longer than one minute, then the client will no longer be considered active. The status icon for an inactive client will appear grey. Additionally, the Last seen column for a client displays the last time that client was seen on the network. An active client will have a value of "now" in the Last seen column, as seen below:
If you are using the combined Dashboard view, then the client status will also display the type of connection (wired or wireless) that the client is currently connected to. If the client is not currently online, then the type of connection that the client was last connected to will be shown. The connection statuses below show both wired and wireless clients:
Note: On SSIDs using Meraki DHCP, clients are identified by IP address rather than MAC address. This can result in multiple entries for a single client, all with the same MAC address, but different IP addresses. This can cause the Dashboard to display multiple clients associated with different IP address and the same MAC as illustrated below:
Filtering the Clients List
The list of clients can be customized based on time intervals, type of access, and SSID. To change these parameters, use the appropriate drop-down menu at the top of the screen.
Time intervals allow you to view clients that have been active during a specific period of time. The time drop-down menu features common intervals, as seen below:
You can also specify the type of clients that you wish to view, as seen below. This includes filtering clients seen by a specific device type (wireless, switches, etc), clients on a specific SSID (wireless only), or clients with a policy (whitelisted, blocked, or group policy) applied to them.
Searching for Clients
You can search for a client in the current client list by using the search tool. You can search by any term, and the search tool will attempt to match your query across all fields. You can also specify multiple parameters by clicking on the arrow in the Search clients box, as seen below:
The Client usage list can be further customized by adding additional columns to provide more insight into traffic on your network. To add or remove columns, you can click on the + sign and select the columns that you want to appear, as seen below. To move columns, simply drag the column header and drop it into a new location.
Exporting Client Information
List data on the Clients pages can be exported in XML or CSV format, by clicking the Download as button and selecting either format option.
The clients page offers a number of options to manage your clients, individually or in bulk, as outlined below:
Changing the Policies Applied to a client
You can change the policy that is applied to a client or group of clients by using the Apply policy menu. Clients can be given normal, whitelisted, or blocked access. You can also apply Group Policies and apply different policies based on the SSID that the client is connected to. For additional information, please see the Whitelist and Blacklist Clients documentation.
Note: Switches cannot apply group policies to a client, this applies to access point and security appliance clients.
To change the policies applied to a client:
- Check-mark one or more clients in the client list.
- Click the Policy button.
- Select your desired policies, as seen below:
- Click Apply.
Adding a Client
The following steps below explain how to add a client. These steps are only available for wireless and combined networks.
To add a client to the client list:
- Click the Add client button.
- Fill in the client's name, MAC address, and access policy. The image below shows the Add new devices tab:
- Click Add clients.
Please note that:
If the Normal policy has been applied then the client will not appear in the all clients view until it has connected to the network.
If any non-Normal policy has been applied then you can use the all clients with a policy view to see a client that you have manually added but has not yet joined the network.
Only One Client Device Is Listed in The Client Page
If there is a Layer 3 switch or a router on the LAN side of an MX then only 1 device will be seen on the Clients page even though there may be multiple computers or other devices connecting through that device.
The MX security appliance by default tracks client devices based on their MAC addresses, which means that the client devices should be discoverable on a Layer 2 level.
There are various client tracking options to avoid this behavior, please visit the Client Tracking Options document for more information.
The Client Is Offline, Though the Client Page Shows It Active With an Online Status
Clients list data is aggregated over time and is not ‘live’, therefore there will be a slight delay to a client’s online/offline status.
Wired clients that had transferred data in the past 5 minutes should appear online. Verify that the “Last seen” timestamp is within the last 5 minutes to ensure the client reflects the proper status.
Wireless clients' online/offline status will be dependent on their association to a Meraki wireless network.
Client Page Displays Zero Usage for a Client, Though the Client Is Passing Traffic
To ensure useful data usage and traffic analysis, certain types of client traffic are filtered and are not counted toward their network usage. Usage information is recorded differently depending on the network layer the client is operating at. Examples of such traffic are:
Unauthorized clients that are operating behind a splash or captive portal
Note that the above does not apply to switch clients.