Menu
Setting Up RADIUS, VPN & WAN for Cisco Meraki Posted on April 10, 2015 by Team One Marketing No Comments ↓ In the second to last post from our transcript of a Cisco Meraki webinar, we review setting up your Meraki with RADIUS, VPN, and WAN. Cisco Meraki MX65 is ideal for organizations with large numbers of distributed sites. Filtering, SNORT based intrusion prevention, web caching, Intelligent WAN with multiple uplinks and 4G failover. MX65 Highlights. Stateful firewall throughput: 250 Mbps. Users can authenticate via 802.1X/RADIUS and can roam wirelessly between.
Submitted by3 weeks agó
l are attempting to put into action 802.1x for our WiFi. Particularly, I would like to make use of this for teachers to be able to login to the WiFi on their individual, non-managed gadgets using their AD credentials. I discovered Meraki'h content about this, but I'michael remaining with two questions:
ln terms of incorporating a trusted certification to NPS, it appears like I should obtain a cert from a trusted California, since I wear't possess knowledge with PKI. What type of certification should I become searching to purchase?
I desire to use this SSID for customers' private products. Will they need to download the certificates from someplace, or will they just be able to link with only getting into their AD credentials?
l'michael the just IT person at a small college and really much value your help, actually if this is definitely a little bit basic. Thanks!
22 comments
Published by2 years agó
Hello,
I possess a small army of remote control Cisco ASA 5505'beds and 5510's i9000 at remote control sites. Slowly we are usually replacing all of thém with Meraki. Wé have already replaced the Centre web site with a Méraki MX65.
Most sites possess (2) ISP's, as will the centre web site which hosts the MX65.
I lately started having an problem with the main ISP on á Ciscó ASA. This ASA will be set to auto-faiIover to the secondary ISP link making use of the response time recorder (RTR), route TRACK instructions, and thé SLA probé with icmp. This functions great to obtain all traffic to switch to the back-up lSP.
l cannot find a way to get the 2nd ISP IP deal with into the VPN peer page of the Meraki configuration website.
I attempted creating a different profile, and it informs me that the personal subnet overlaps with the primary ISP connection entry.
I attempted putting (2) IP handles on the PEER IP access place, and this will be not approved.
I attempted contacting Meraki and they informed me that this is certainly not supported with 3rm celebration VPN't, and said that I can just possess the remote device configured tó VPN with the Méraki'h secondary ISP hyperlink, SO that means that this is certainly only supported if the MERAKI furthermore has (2) ISP's i9000. bummer, BUT my Meraki DOES possess 2 ISP's i9000!
Therefore I've set this up, réconfigured my ASA tó only link to the main IP deal with of the Mérkai in crypto-máp that is definitely mapped to interface of ISP-1, and I developed a brand-new crypto-map to hole to the user interface of ISP-2.right now I require to wait for another ISP failure to see if this functions, but the point that worries me most is. right now that the Cisco ASA is set up to link to the 2nm ISP hyperlink on the Méraki with the 2ndeb ISP link of the ASA, I nevertheless do not discover any location to enter the IP tackle of the supplementary ISP link on the Ciscó ASA. Meraki has stated that the Meraki appliance will know how to offer with this immediately.
Can anyone verify if the Meraki will understand how to deal with this without understanding the IP address of the secondary IP of thé ASA?
Thanks!
opinion