

I am not even sure what the point is to having a firewall in your access point WHEN YOU have a firewall as your gateway. This makes setting up a trusted network with local restrictions difficult. So in the Meraki world you just assume that your site to site VPN's are in an allow ANY ANY state? Our corporate firewall will remain as it is and at least I can secure the site to site's using that firewall.Ģ) Firewall rules at the access point level - destinations cannot have multiple CIDR's. There apparently is a site to site VPN firewall but it doesn't work. I come from Fortinet and Barracuda Cloudgen background and have recently had Meraki thrust upon me.ġ) Site to Site VPN's - you cannot apply a firewall rule for Branch Office VPN's. Thanks for the headsup on the VPN issue on Windows 10. It's certainly not the lightsaber approach, but it will work and be just fine for your small ammount of road warriors. The way I handled was to write a powershell script that deletes and recreates the VPN with what Meraki wants.

It happens sporadically, but it does happen. They blame MS, MS blames Meraki, nobody does anything and you have to put down your Scotch and take a weekend call from an angry employee. Every time Windows 10 does a major update it changes the default encryption to mschap2 because pap is unencrypted and an issue. Phase two is encapsulating the whole packet so in Meraki's eyes it doesn't matter. The VPN on the Meraki firewalls wants you to use unencrypted pap. However they have a serious issue that as far as I am aware they have not addressed. I had Meraki at the last gig and loved it. If this needs to be permanent bypass you may find this only works so far as the IP Lease for that connection to the Hotspot, and if the IP Lease expires it may break this relation with the Hotspot binding and you will have to delete the and recreate the binding.You mentioned that you have a few weekend remote vpn users. This would also exclude the 'client' from the stats that our systems provide. In that way when the MAC is encountered connecting to the Hotspot it gets a connection to the internet without having to use the Hotspot login process. It should be possible in the future to 'allow' clients based on their MAC via the Portal systems, but for not, on a Mikrotik, you might, on the Hosts tab of the Hotspot, right click on the MAC of the connected device, and select 'Make Binding'Īnd from there select the 'Type' of 'binding' as "bypassed" It is possible, on the IP -> Hotspot menu, on the settings for the Purple WiFi Hotspot that you set up, to allow clients to bypass the Captive Portal (that is our hotspot service).
