Skip to main content

 

Cisco Meraki Documentation

Packet Captures to Troubleshoot Offline Devices

Introduction

This document describes how to collect and analyze packet captures to investigate unreachable or offline devices.

Read on if:

  • You have the topology below and want to understand why the offline device, marked with a red cross is offline, and the last known upstream neighbor (marked with the blue arrow/circle) is an online Meraki device.

clipboard_e67785f9ff4b646d4a79b5d6b56f83c22.png

  • Or, the offline device does not have a Meraki neighbor, but the default gateway is a managed MX:

clipboard_e9d1f705be149b638dcb52fec4308520f.png

You can take a packet capture from the upstream neighbor or the MX to investigate why the offline device is having problems. The next section explains how to do it.

How to Collect a Packet Capture to Investigate an Offline Device

Step 1. Identify the upstream neighbor of the offline device.

Note: If the upstream neighbor is also offline, please move the troubleshooting process to that offline device.

If the upstream neighbor is a Meraki switch, we suggest that you take a port mirror capture, as it may provide extra information not visible on a dashboard capture. For details about how to perform a capture using port-mirror, follow the document Packet Captures and Port Mirroring on the MS Switch.

If you are not able to collect a port-mirror capture at this time, continue to step 2.

Note: If your upstream neighbor is a non-Meraki device but your offline device is an MS running MS16+, you can take the capture using the Local Status Page (LSP), for more details please review the document Cisco Meraki Local Status Page: MS Switches.

If your upstream neighbor is a non-Meraki device and the offline device doesn't have the option to collect a capture using th LSP, please review the device vendor's documentation.


Step 2. Prepare to take a packet capture on the upstream neighbor.

Go to Network-wide > Monitor > Packet Capture / Intelligent capture. 

From the drop-down select the upstream neighbor category:

Upstream Neighbor Device Model         Select
MX for security appliances
MS or CS for switches
MR or CW for access points
MG for cellular gateways
CG  for campus gateways
  • From the list of devices, select the identified upstream neighbor. 
  • On the interface, select the device's interface where your offline device is connected to. 
  • For output, if using intelligent capture you can choose Save to cloud and analyze the capture from the dashboard itself. For regular Packet capture, we suggest select Download .pcap file. You'll need to have wireshark to open the file and analyze it.
  • On duration, select 300 seconds.

intelligent capture window image

Step 3. If possible, disconnect the network cable of the offline device from the upstream neighbor. Then start the packet capture for ~5 minutes.

Step 4. Right after you start the packet capture reconnect the offline device cable.

Step 5. Wait for the capture to finish.

For more details about the packet capture feature, check Packet Capture Overview.

How to Review Packet Capture

Step 1. Find and make note of the offline device's MAC address.

You will find it under the device's name. If the offline device is an MX and you are trying to capture traffic coming from one of its WAN interfaces, use Calculating MX WAN MAC Addresses.

clipboard_e9200b3117b7d8a512be613f2fb4587f5.png

Step 2. Open the .pcap file.

For .pcaps downloaded to your computer, you can use Wireshark.

If you used Intelligent capture and saved the output to the cloud, you can find your capture on Network-wide > Monitor > Intelligent Capture > Store captures, and open it directly on the dashboard.

Step 3. Filter the capture to focus on the offline device traffic.

Use this filter:

cdp.deviceid == aaaabbbbcccc or lldp.chassis.id.mac == aaaabbbbcccc or (eth.addr == aaaabbbbcccc and (arp||dhcp||dns||tcp.port == 443))

Where aaaabbbbcccc is your offline device's MAC address, all lower case and no separation between octets. Example:

clipboard_ec6edcbdf5f864b51d6d3b56feee35b00.png

The next sections describe the packets you should see to confirm the offline device is present and trying to establish a connection to the Meraki cloud. 

CDP/LLDP Packets

The presence of CDP (Cisco Discovery Protocol) and/or LLDP (Link Layer Discovery Protocol) packets sent by the offline device confirm the offline device is present, powered on, connected to the expected port and establishing Layer 2 network connection.

This is how a CDP packet sent by a device with MAC address 0c:8d:db:0b:f9:07 looks like:

clipboard_e9387cd678fe3e3b41e90090b5657323d.png

Example of an LLDP Packet:

clipboard_e7d8095c789fca0c6f169d95ece578e0f.png

If you don't even see CDP and/or LLDP packets sent by the offline device, most likely the device is either disconnected, powered off or has some other hardware problem. Please go on-site to do a physical check of the offline device.

DHCP Packets

If your device is configured to use an static IP address you may or may not see DHCP (Dynamic Host Configuration Protocol) packets as the static IP falls back to DHCP when the static IP is not able to reach the dashboard. You can expect to see the full DORA (Discover, Offer, Request, Acknowledge) exchange.

clipboard_ec16b9bfa08928d7edfc80ee50d81da50.png

If you don't see Offers, ensure the port where the offline device is connected to has the right VLAN configuration.

If instead of Offers or Ack packets, you see Nacks or something else, review your DHCP server logs to check why it may be denying an IP address to your offline device.

ARP Packets

Once the device has an IP address, it sends an ARP request for the default gateway's IP address. You expect to see a reply from the gateway's IP address with its MAC address information.

clipboard_ee7e7b453c0717751a92d84f082ed12fc.png

If you see a request but not a reply, ensure the DHCP server is providing the correct default gateway information, and that the default gateway is reachable by the offline device.

DNS Packets

Once the device confirms it can reach the default gateway, it should send a DNS (Domain Name System) to resolve the dashboard server's domain name. You can expect see DNS queries with this format:

<region>[...].meraki.com

Region refers to the region where the offline device's network is hosted. For example, devices that are associated to networks hosted on the United States send DNS requests for us[...].meraki.com

The exact domain name can look different on your capture, but should follow the same <region>[...].meraki.com format. Refer to the Firewall info section for organization-specific domain name / IP addresses.

clipboard_ea9dbccd064940ab29a17af201a1f521d.png

If you don't see DNS responses, ensure your DNS server is reachable and able to resolve meraki.com domains.

TCP Packets

TCP packets may not appear on captures taken from dashboard. If you suspect the problem could be at the TCP stage please collect a port-span capture or contact Meraki Support if they are not available.

TCP Packets - 3-way-Handshake

If the device was able to resolve the dashboard servers, then the device opens a TCP session with the IP address resolved from the DNS response, in this case, 209.206.52.53. The device sends a TCP SYN packet, then you should see a SYN, ACK packet coming the dashboard's IP address, followed by an ACK.

clipboard_e4072a3e6770644bde98086108820d0e2.png

If you only see SYN packets sent by the offline divice and never see an ACK coming from a Meraki public IP most likely there's a intermediate device between your offline device and your ISP (Internet Service Provider) that is blocking the traffic. The traffic could be blocked from the device to the cloud, or from the cloud to your device.

TCP Packets - mTLS Authentication

If the device was able to comple the TCP 3-way-handshake, it moves on to the mTLS (Mutual Transport Layer Security) process. This example shows the expected packet flow.

clipboard_e134d4a74b8f2d909f4fba46514179c8f.png

If you see all these packets and the device is still having problems to communicate with the cloud, ensure there certificate sent by the Meraki cloud was signed by Meraki. To review that, open the certificate packet sent by the cloud (The destination IP should be the offline device):

clipboard_e9c1ddc0dc9918c09553e3dc84df0f96f.png

Open the packet's section Transport Layer Security > TLSv1.2 > Handshake Protocol: Certificate > Certificates. Expand the three certs and confirm the issuer looks similar to this:

clipboard_e47bbd5b3c52e61fbb820a73829413d20.png

If you see something other than Meraki, most likely the offline device traffic is going through SSL inspection, breaking the authentication with the Meraki cloud and preventing the device to go online. Ensure all Meraki device's traffic is excluded from SSL inspection.

Firewall Information Page

The upstream firewall requirements can vary by product, firmware, region, and enabled services. For the most accurate per-organization Firewall information, navigate to the list in Dashboard under Help > Firewall info

Firewall info.png

Note the destination IP addresses and ports for the following entries to be used when reviewing and filtering packet capture(s) to troubleshoot cloud connectivity issues:

  • Meraki cloud communication
  • Backup Meraki cloud communication
  • Backup configuration downloads
  • NTP time synchronization
  • Uplink connection monitor
  • Was this article helpful?