When troubleshooting problems on the network, it is important to try and isolate any hardware that is not handling traffic appropriately. Dashboard's built-in packet capture tool can be used to observe multiple interfaces of a device and see if traffic is flowing through as expected. This article explains how to capture traffic simultaneously on multiple interfaces of a Meraki device, and how to analyze that traffic to detect potential issues.
The Google Maps embedded in Dashboard can be used to locate devices or networks within the same Dashboard Organization. Network or Client maps can be used to locate devices specific to the current network. For example, placing APs on Maps in Dashboard can assist with physical AP placement for wireless planning and also enables device location services for client devices. This article discusses common issues that may arise when using Google Maps embedded in Dashboard.
When Sign-on Splash-page is used with a RADIUS server, Dashboard must be able to communicate with the RADIUS server. Dashboard, which acts as the RADIUS client, sends authentication requests (RADIUS Access Requests) to the public IP address of the configured RADIUS server.
If a Meraki device is already claimed in another user's network, it will not be claimable in another organization. If you attempt to claim a device that is already in a network, you will receive an error message reading "Some of the devices you tried claiming are in use"
Virtual Local Area Networks, or VLANs, segregate traffic within a network. VLANs keep traffic from different networks separated when traversing shared links and devices within a topology. This process, also known as VLAN tagging, is invaluable to limiting broadcast network traffic, and securing network segments.
Link Aggregation is a nebulous term used to describe various implementations and underlying technologies. In general, link aggregation looks to combine (aggregate) multiple network connections in parallel to increase throughput and provide redundancy. While there are many approaches, this article aims to highlight the differences in terminology.
Cisco Meraki uses IPSec for Site-to-site and Client VPN. IPSec is a framework for securing the IP layer. In this suite, modes and protocols are combined to tailor fit the security methods to the intended use. Cisco Meraki VPNs use the following mode+protocol for Site-to-Site VPN communication:
Voice over IP (VoIP) is a common technology used in enterprise networks, allowing users on a network to make internal and outbound phone calls over the network. This article outlines a number of frequently asked questions regarding VoIP systems and technologies on Cisco Meraki networks, as well as some general troubleshooting tips and tricks.
No articles with the article type topic could be found.