Skip to main content
Cisco Meraki

Creating a Layer 7 Firewall Rule

Cisco Meraki MR Access Points and MX Security Appliances provides the ability to create layer 7 firewall rules to deny certain traffic based on traffic type. Where most firewall rules only inspect headers at layer 3 (IP address), 4 (Transport), and 5 (Port), a layer 7 rule inspects the payload of packets to match against known traffic types. To enable a Layer 7 firewall rule, follow the steps below:

Configuration Steps

  1. Select the Dashboard network where the rule is to be configured.
  2. Navigate to Wireless > Configure > Firewall and traffic shaping (or Security appliance > Configure > Firewall on the MX).
  3. (wireless only) Select the SSID the firewall rule will apply to, through the SSID dropdown.
  4. Under Layer 7 firewall rules, click Add a layer 7 firewall rule.
  5. Select an Application to be blocked, using the second drop-down to be more specific if necessary.
  6. Click Save Changes.

2017-07-25 16_18_43-Traffic Shaping - Meraki Dashboard.png

To remove a Layer 7 firewall rule, click its Delete icon next to the Reorder icon, then click Save Changes.

Layer 3 rules are processed first, followed by layer 7, with the first match taking priority. For more information refer to Layer 3 & 7 Firewall Processing.


  • Unlike Layer 3 stateful firewall rules on the MX series platforms, the configured Layer 7 rules on both the MX and MR series platforms are stateless. 
  • Layer 7 rules not utilizing NBAR content categorization will not show up in the Event Log under the event type "Layer 7 firewall rule". 
  • Some services, such as Amazon Video, may be included in the traffic shaping applications list but not included in the layer 7 firewall application list. When blocked, these services fail over to a content distribution network (CDN) that may be shared by many content services. Meraki makes every effort to identify services from CDNs, however in some cases the traffic is not distinguishable from other services hosted on the CDN. In cases like these, we recommend that the application be limited to extremely minimal bandwidth usage instead of attempting to block the traffic entirely. 
  • When splash page authentication is configured, captive portal strength settings take precedence over configured traffic shaping and firewall rules. This means traffic shaping and firewall rules will only apply after Splash page authentication has occurred successfully. If firewall or traffic shaping rules are configured on an SSID, use the "Block all access until sign-on is complete" captive portal strength setting to apply the principle of least privilege to the SSID. This captive portal strength will ensure all traffic is blocked until the desired firewall and traffic shaping rules can be applied. 
  • Was this article helpful?