<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: NAT Mode in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/nat-mode/m-p/5506953#M303167</link>
    <description>&lt;P&gt;How do we migrate wireless clients from Meraki DHCP(NAT Mode) to an internal DHCP server(Bridge Mode) seamlessly? Any Suggestions.&lt;/P&gt;</description>
    <pubDate>Wed, 08 Jun 2022 06:02:40 GMT</pubDate>
    <dc:creator>SMANNE1</dc:creator>
    <dc:date>2022-06-08T06:02:40Z</dc:date>
    <item>
      <title>NAT Mode</title>
      <link>https://community.cisco.com/t5/wireless/nat-mode/m-p/5506941#M303155</link>
      <description>&lt;P&gt;I have a simple question:&lt;/P&gt;&lt;P&gt;What VLAN does traffic from a SSID set to NAT mode traverse?&lt;/P&gt;</description>
      <pubDate>Wed, 15 Apr 2020 11:24:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/nat-mode/m-p/5506941#M303155</guid>
      <dc:creator>rbmclean</dc:creator>
      <dc:date>2020-04-15T11:24:12Z</dc:date>
    </item>
    <item>
      <title>Re: NAT Mode</title>
      <link>https://community.cisco.com/t5/wireless/nat-mode/m-p/5506942#M303156</link>
      <description>&lt;P class="_mce_tagged_br"&gt;The implications of enabling NAT mode are as follows:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Devices outside of the wireless network cannot initiate a connection to a wireless client.&lt;/LI&gt;&lt;LI&gt;Wireless clients cannot use Layer 2 discovery protocols to find other devices on either the wired or wireless network.&lt;/LI&gt;&lt;LI&gt;Legacy VPN clients (i.e., those that do not support NAT Traversal) may not be able to establish IPSec tunnels over the wireless network. (One workaround is to upgrade the VPN client or configure the VPN client to establish an IPSec tunnel over TCP, e.g. SSL.) &lt;/LI&gt;&lt;LI&gt;&lt;A title="VLAN Tagging" href="https://documentation.meraki.com/MR/Client_Addressing_and_Bridging/VLAN_Tagging" target="_blank" rel="internal noopener nofollow noreferrer"&gt;VLAN Tagging&lt;/A&gt; wireless traffic is not supported in NAT mode.  &lt;/LI&gt;&lt;/UL&gt;&lt;DIV class="note-warning style-wrap"&gt;&lt;P&gt;Please note that each AP will NAT to its own management IP address. As a result, LAN flows will be interrupted when the client roams between APs.&lt;/P&gt;&lt;/DIV&gt;&lt;DIV class="note-info style-wrap"&gt;&lt;P&gt;The DHCP service for NAT mode will only hand out addresses in the 10.0.0.0/8 subnet. SSIDs in NAT mode can still be used on wired networks already using a 10.x.x.x address space, however clients on the NAT SSID may be unable to communicate with these networks.&lt;/P&gt;&lt;/DIV&gt;&lt;DIV class="mt-section"&gt;&lt;H3 id="toc-hId-1160724897"&gt;Use Cases&lt;/H3&gt;&lt;P&gt;NAT mode works well for providing a wireless guest network, since it puts clients on a private wireless network with automatic addressing. Layer 3 firewall rules can also be used to quickly limit or block access to network resources.&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Wed, 15 Apr 2020 12:26:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/nat-mode/m-p/5506942#M303156</guid>
      <dc:creator>kYutobi</dc:creator>
      <dc:date>2020-04-15T12:26:33Z</dc:date>
    </item>
    <item>
      <title>Re: NAT Mode</title>
      <link>https://community.cisco.com/t5/wireless/nat-mode/m-p/5506943#M303157</link>
      <description>&lt;P&gt;I saw that article, but it doesn't answer the question.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;A title="VLAN Tagging" href="https://documentation.meraki.com/MR/Client_Addressing_and_Bridging/VLAN_Tagging" target="_blank" rel="internal noopener nofollow noreferrer"&gt;VLAN Tagging&lt;/A&gt;&lt;SPAN&gt; wireless traffic is not supported in NAT mode. &lt;/SPAN&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN&gt;Does this mean is it untagged traffic?&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;Does traffic traverse the native VLAN since it is "untagged?"&lt;/LI&gt;&lt;LI&gt;Or since it is NATing the management IP does it traverse the management VLAN?&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;</description>
      <pubDate>Wed, 15 Apr 2020 12:42:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/nat-mode/m-p/5506943#M303157</guid>
      <dc:creator>rbmclean</dc:creator>
      <dc:date>2020-04-15T12:42:41Z</dc:date>
    </item>
    <item>
      <title>Re: NAT Mode</title>
      <link>https://community.cisco.com/t5/wireless/nat-mode/m-p/5506944#M303158</link>
      <description>Since NAT is performed directly on the AP, traffic will traverse on the same VLAN as the AP has it's IP address.&lt;BR /&gt;&lt;BR /&gt;So if the AP has an IP address 192.168.5.0/24 on vlan 5, traffic traverses on vlan 5.</description>
      <pubDate>Wed, 15 Apr 2020 12:59:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/nat-mode/m-p/5506944#M303158</guid>
      <dc:creator>Rasmus Hoffmann Birkelund</dc:creator>
      <dc:date>2020-04-15T12:59:18Z</dc:date>
    </item>
    <item>
      <title>Re: NAT Mode</title>
      <link>https://community.cisco.com/t5/wireless/nat-mode/m-p/5506945#M303159</link>
      <description>Interesting, but doesn't this contradict the practice of completely segmenting management traffic from all user traffic?</description>
      <pubDate>Wed, 15 Apr 2020 13:07:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/nat-mode/m-p/5506945#M303159</guid>
      <dc:creator>rbmclean</dc:creator>
      <dc:date>2020-04-15T13:07:43Z</dc:date>
    </item>
    <item>
      <title>Re: NAT Mode</title>
      <link>https://community.cisco.com/t5/wireless/nat-mode/m-p/5506946#M303160</link>
      <description>&lt;P&gt;I suppose it is, but then again, I'd normally only use Meraki DHCP on deployments that quickly need guest WiFi, and only able to use single vlans.&lt;/P&gt;&lt;P&gt;Then again, all clients are isolated from eachother. No client can talk to eachother in NAT mode. Internet access only.&lt;/P&gt;</description>
      <pubDate>Wed, 15 Apr 2020 13:15:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/nat-mode/m-p/5506946#M303160</guid>
      <dc:creator>Rasmus Hoffmann Birkelund</dc:creator>
      <dc:date>2020-04-15T13:15:05Z</dc:date>
    </item>
    <item>
      <title>Re: NAT Mode</title>
      <link>https://community.cisco.com/t5/wireless/nat-mode/m-p/5506947#M303161</link>
      <description>&lt;P&gt;I'm wondering which is more secure, NAT mode or Bridge mode with a L3 rule blocking access to the local LAN?&lt;/P&gt;</description>
      <pubDate>Wed, 15 Apr 2020 13:22:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/nat-mode/m-p/5506947#M303161</guid>
      <dc:creator>rbmclean</dc:creator>
      <dc:date>2020-04-15T13:22:46Z</dc:date>
    </item>
    <item>
      <title>Re: NAT Mode</title>
      <link>https://community.cisco.com/t5/wireless/nat-mode/m-p/5506948#M303162</link>
      <description>&lt;P&gt;&lt;A href="https://community.meraki.com/t5/user/viewprofilepage/user-id/40638"&gt;@rbmclean&lt;/A&gt; NAT mode by default blocks access to the LAN unless you change L3 rules. Just letting you know. &lt;SPAN class="lia-unicode-emoji" title=":smirking_face:"&gt;&lt;span class="lia-unicode-emoji" title=":smirking_face:"&gt;😏&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Apr 2020 13:27:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/nat-mode/m-p/5506948#M303162</guid>
      <dc:creator>kYutobi</dc:creator>
      <dc:date>2020-04-15T13:27:00Z</dc:date>
    </item>
    <item>
      <title>Re: NAT Mode</title>
      <link>https://community.cisco.com/t5/wireless/nat-mode/m-p/5506949#M303163</link>
      <description>Plus, the first SSID on any network by default will block L3 Wireless &amp;gt; LAN traffic, create a new network and you'll see it &lt;SPAN class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;&lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/SPAN&gt;</description>
      <pubDate>Wed, 15 Apr 2020 13:29:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/nat-mode/m-p/5506949#M303163</guid>
      <dc:creator>ConnorL1</dc:creator>
      <dc:date>2020-04-15T13:29:29Z</dc:date>
    </item>
    <item>
      <title>Re: NAT Mode</title>
      <link>https://community.cisco.com/t5/wireless/nat-mode/m-p/5506950#M303164</link>
      <description>&lt;P&gt;Thanks for all the replies.&lt;/P&gt;&lt;P&gt;I think I am going to go back to a bridge mode guest network , if for nothing else than a more seamless roaming, but I do want my management traffic completely separate.&lt;/P&gt;&lt;P&gt;Perhaps if the alternate management IP feature comes out of beta, there will be a way to keep them separate.&lt;/P&gt;</description>
      <pubDate>Wed, 15 Apr 2020 13:36:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/nat-mode/m-p/5506950#M303164</guid>
      <dc:creator>rbmclean</dc:creator>
      <dc:date>2020-04-15T13:36:24Z</dc:date>
    </item>
    <item>
      <title>Re: NAT Mode</title>
      <link>https://community.cisco.com/t5/wireless/nat-mode/m-p/5506951#M303165</link>
      <description>My home guest network is in bridge mode too, just on its own VLAN. This means guests that roam between APs keep the same IP address, unlike NAT mode. Was causing issues for iPhone VoWiFi for example</description>
      <pubDate>Wed, 15 Apr 2020 13:39:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/nat-mode/m-p/5506951#M303165</guid>
      <dc:creator>ConnorL1</dc:creator>
      <dc:date>2020-04-15T13:39:53Z</dc:date>
    </item>
    <item>
      <title>Re: NAT Mode</title>
      <link>https://community.cisco.com/t5/wireless/nat-mode/m-p/5506952#M303166</link>
      <description>If you only have a single AP, and want to make things 'easy' then NAT mode should be fine. Otherwise I never recommend it. Always use bridge-mode, gives you far more control over things in the future when you didn't know you would need to, and the roaming issue that NAT introduces is a true killer.</description>
      <pubDate>Wed, 15 Apr 2020 16:11:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/nat-mode/m-p/5506952#M303166</guid>
      <dc:creator>Nolan H.</dc:creator>
      <dc:date>2020-04-15T16:11:12Z</dc:date>
    </item>
    <item>
      <title>Re: NAT Mode</title>
      <link>https://community.cisco.com/t5/wireless/nat-mode/m-p/5506953#M303167</link>
      <description>&lt;P&gt;How do we migrate wireless clients from Meraki DHCP(NAT Mode) to an internal DHCP server(Bridge Mode) seamlessly? Any Suggestions.&lt;/P&gt;</description>
      <pubDate>Wed, 08 Jun 2022 06:02:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/nat-mode/m-p/5506953#M303167</guid>
      <dc:creator>SMANNE1</dc:creator>
      <dc:date>2022-06-08T06:02:40Z</dc:date>
    </item>
  </channel>
</rss>

