<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Meraki Firewall rules for communicating with Meraki Cloud in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/meraki-firewall-rules-for-communicating-with-meraki-cloud/m-p/3941738#M166615</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;/P&gt;&lt;P&gt;Meraki and most people say you need to allow all the rules. But .. you dont need to allow all the IP ranges.&lt;/P&gt;&lt;P&gt;As you can see .. some are backup connection, snmp traps, ntp, and for MX devices. If the customer is only using APs... you can just allow 7351 UDP to the given ranges and it should be fine. UDP 9350 is for VPN registry. If the APs are connecting back to a MX wireless concentrator then you need to allow a range for MX and 9350.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Capture.PNG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/47043iADD6E0FB2DFC94DC/image-size/large?v=v2&amp;amp;px=999" role="button" title="Capture.PNG" alt="Capture.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 16 Oct 2019 15:05:38 GMT</pubDate>
    <dc:creator>omz</dc:creator>
    <dc:date>2019-10-16T15:05:38Z</dc:date>
    <item>
      <title>Meraki Firewall rules for communicating with Meraki Cloud</title>
      <link>https://community.cisco.com/t5/wireless/meraki-firewall-rules-for-communicating-with-meraki-cloud/m-p/2899262#M166612</link>
      <description>&lt;P&gt;HI Team,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Do not know whether this is the right gforum for Meraki. Customer has bought the meraki wireless access points and for implementing the firewall rules he has a problem with allowing too many destination ips outbound. The customer is located in Manchester united kingdom. Can you please clarify whether the customer can use any specific outbound Ip addresses instead of using the following firewall rules as per Meraki Firewall info. Also the customer does not want to allow any for NTP and wants to know which Specific IP he can configure to allow for NTP.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;As of now Meraki firewall info shows the following rules:&lt;/P&gt;
&lt;TABLE width="1292" style="border-collapse: collapse; width: 970pt;"&gt;
&lt;TBODY&gt;
&lt;TR style="height: 58.0pt;"&gt;
&lt;TD width="133" style="height: 58.0pt; width: 100pt;"&gt;Access Points VLAN IP addresses&lt;/TD&gt;
&lt;TD width="302" style="border-left: none; width: 227pt;"&gt;185.92.120.0/25, 185.17.255.128/25, 50.115.86.96/27, 217.89.128.0/24, 199.231.78.0/24, 108.161.147.0/24, 64.62.142.12/32, 54.193.207.248/32&lt;/TD&gt;
&lt;TD width="99" style="border-left: none; width: 74pt;"&gt;7351&lt;/TD&gt;
&lt;TD width="64" style="border-left: none; width: 48pt;"&gt;UDP&lt;/TD&gt;
&lt;TD width="71" style="border-left: none; width: 54pt;"&gt;outbound&lt;/TD&gt;
&lt;TD width="240" style="border-left: none; width: 180pt;"&gt;Meraki cloud communication&lt;/TD&gt;
&lt;TD width="383" style="border-left: none; width: 287pt;"&gt;Access points, MX Security Appliance, Phones, Switches&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR style="height: 43.5pt;"&gt;
&lt;TD width="133" style="height: 43.5pt; border-top: none; width: 100pt;"&gt;Access Points VLAN IP addresses&lt;/TD&gt;
&lt;TD width="302" style="border-top: none; border-left: none; width: 227pt;"&gt;199.231.78.0/24, 64.156.192.245/32, 217.89.128.0/24, 185.17.255.128/25, 50.115.86.96/27, 185.92.120.0/25&lt;/TD&gt;
&lt;TD style="border-top: none; border-left: none;"&gt;9350&lt;/TD&gt;
&lt;TD style="border-top: none; border-left: none;"&gt;UDP&lt;/TD&gt;
&lt;TD style="border-top: none; border-left: none;"&gt;outbound&lt;/TD&gt;
&lt;TD width="240" style="border-top: none; border-left: none; width: 180pt;"&gt;VPN registry&lt;/TD&gt;
&lt;TD width="383" style="border-top: none; border-left: none; width: 287pt;"&gt;Access points, MX Security Appliance&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR style="height: 29.0pt;"&gt;
&lt;TD width="133" style="height: 29.0pt; border-top: none; width: 100pt;"&gt;Access Points VLAN IP addresses&lt;/TD&gt;
&lt;TD style="border-top: none; border-left: none;"&gt;54.193.207.248/32&lt;/TD&gt;
&lt;TD style="border-top: none; border-left: none;"&gt;80&lt;/TD&gt;
&lt;TD style="border-top: none; border-left: none;"&gt;TCP&lt;/TD&gt;
&lt;TD style="border-top: none; border-left: none;"&gt;outbound&lt;/TD&gt;
&lt;TD width="240" style="border-top: none; border-left: none; width: 180pt;"&gt;Backup Meraki cloud communication&lt;/TD&gt;
&lt;TD width="383" style="border-top: none; border-left: none; width: 287pt;"&gt;Access points, MX Security Appliance, Phones, Switches&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR style="height: 58.0pt;"&gt;
&lt;TD width="133" style="height: 58.0pt; border-top: none; width: 100pt;"&gt;Access Points VLAN IP addresses&lt;/TD&gt;
&lt;TD width="302" style="border-top: none; border-left: none; width: 227pt;"&gt;50.115.86.96/27, 64.62.142.2/32, 108.161.147.0/24, 185.17.255.128/25, 185.92.120.0/25, 199.231.78.0/24, 217.89.128.0/24&lt;/TD&gt;
&lt;TD width="99" style="border-top: none; border-left: none; width: 74pt;"&gt;80, 443, 7734, 7752&lt;/TD&gt;
&lt;TD style="border-top: none; border-left: none;"&gt;TCP&lt;/TD&gt;
&lt;TD style="border-top: none; border-left: none;"&gt;outbound&lt;/TD&gt;
&lt;TD width="240" style="border-top: none; border-left: none; width: 180pt;"&gt;Backup configuration downloads, Backup firmware downloads, Splash pages, Throughput tests live tool&lt;/TD&gt;
&lt;TD width="383" style="border-top: none; border-left: none; width: 287pt;"&gt;Access points, MX Security Appliance, Phones, Switches&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR style="height: 29.0pt;"&gt;
&lt;TD width="133" style="height: 29.0pt; border-top: none; width: 100pt;"&gt;Access Points VLAN IP addresses&lt;/TD&gt;
&lt;TD style="border-top: none; border-left: none;"&gt;Any&lt;/TD&gt;
&lt;TD style="border-top: none; border-left: none;"&gt;123&lt;/TD&gt;
&lt;TD style="border-top: none; border-left: none;"&gt;UDP&lt;/TD&gt;
&lt;TD style="border-top: none; border-left: none;"&gt;outbound&lt;/TD&gt;
&lt;TD width="240" style="border-top: none; border-left: none; width: 180pt;"&gt;NTP time synchronization&lt;/TD&gt;
&lt;TD width="383" style="border-top: none; border-left: none; width: 287pt;"&gt;Access points, MX Security Appliance, Switches&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;"Please can you clarify why you have specified such a wide range of subnets for the outboumd.&lt;/P&gt;
&lt;P&gt;We are expecting to limit these to individual IP addresses’s for your management stations.&lt;/P&gt;
&lt;P&gt;We will also not allow ANY rule to NTP time servers you will need to be more specific and specify time sources used.”&lt;/P&gt;</description>
      <pubDate>Mon, 05 Jul 2021 12:22:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/meraki-firewall-rules-for-communicating-with-meraki-cloud/m-p/2899262#M166612</guid>
      <dc:creator>dganta</dc:creator>
      <dc:date>2021-07-05T12:22:45Z</dc:date>
    </item>
    <item>
      <title>If the customer wants a Cisco</title>
      <link>https://community.cisco.com/t5/wireless/meraki-firewall-rules-for-communicating-with-meraki-cloud/m-p/2899263#M166613</link>
      <description>&lt;P&gt;If the customer wants a Cisco Meraki supported platform then the customer has to deploy stated rules. &amp;nbsp;Period.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;If they don't mind that it doesn't work properly then they can do whatever they like.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Jul 2016 09:22:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/meraki-firewall-rules-for-communicating-with-meraki-cloud/m-p/2899263#M166613</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2016-07-11T09:22:37Z</dc:date>
    </item>
    <item>
      <title>Re: If the customer wants a Cisco</title>
      <link>https://community.cisco.com/t5/wireless/meraki-firewall-rules-for-communicating-with-meraki-cloud/m-p/3941062#M166614</link>
      <description>&lt;P&gt;That was a jerk answer&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 15 Oct 2019 16:37:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/meraki-firewall-rules-for-communicating-with-meraki-cloud/m-p/3941062#M166614</guid>
      <dc:creator>jggentry</dc:creator>
      <dc:date>2019-10-15T16:37:22Z</dc:date>
    </item>
    <item>
      <title>Re: Meraki Firewall rules for communicating with Meraki Cloud</title>
      <link>https://community.cisco.com/t5/wireless/meraki-firewall-rules-for-communicating-with-meraki-cloud/m-p/3941738#M166615</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;/P&gt;&lt;P&gt;Meraki and most people say you need to allow all the rules. But .. you dont need to allow all the IP ranges.&lt;/P&gt;&lt;P&gt;As you can see .. some are backup connection, snmp traps, ntp, and for MX devices. If the customer is only using APs... you can just allow 7351 UDP to the given ranges and it should be fine. UDP 9350 is for VPN registry. If the APs are connecting back to a MX wireless concentrator then you need to allow a range for MX and 9350.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Capture.PNG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/47043iADD6E0FB2DFC94DC/image-size/large?v=v2&amp;amp;px=999" role="button" title="Capture.PNG" alt="Capture.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Oct 2019 15:05:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/meraki-firewall-rules-for-communicating-with-meraki-cloud/m-p/3941738#M166615</guid>
      <dc:creator>omz</dc:creator>
      <dc:date>2019-10-16T15:05:38Z</dc:date>
    </item>
  </channel>
</rss>

