<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Confusing documentation for MX HA in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/confusing-documentation-for-mx-ha/m-p/5522706#M308678</link>
    <description>&lt;P&gt;Ah. Yeah i know the issue... pushing back on a lot of bad policies my self... good intentions but bad execution.&lt;/P&gt;&lt;P&gt;It would be interesting to see if you pick up probes on the consentrator MX if you unset the tunnel health check IP. It should still send the probes bit with a destination address of 0.0.0.0.&lt;/P&gt;&lt;P&gt;I cant say that i have tried that feature out in. I avoid L2 tunneling where i can.&lt;/P&gt;</description>
    <pubDate>Sun, 27 Jul 2025 01:35:37 GMT</pubDate>
    <dc:creator>martin-lystad</dc:creator>
    <dc:date>2025-07-27T01:35:37Z</dc:date>
    <item>
      <title>Confusing documentation for MX HA</title>
      <link>https://community.cisco.com/t5/wireless/confusing-documentation-for-mx-ha/m-p/5522683#M308655</link>
      <description>&lt;P&gt;&lt;FONT size="4"&gt;&lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;Disclaimer&lt;/STRONG&gt;&lt;/FONT&gt;: i'm still new to Meraki, so if you are going to flame me for not knowing something, remember that i'm upskilling at the moment.&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;Overview of the Topology for the issue listed below&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="TheDarkKnight_0-1753384899717.png" style="width: 999px;"&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="image.png"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/276972i090B3E3E75D87443/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;We've had an outage (on our Guest wifi) when the inside interface for the firewall at Data center 1 wentdown, because we didn't have a secondary MX set for the APs at our branch network.&lt;BR /&gt;&lt;BR /&gt;-We have 2 MXs, one at each Data center.&lt;BR /&gt;-Each Data center uses it's own DHCP server for Guest Wifi.&lt;BR /&gt;-The DHCP servers are on a Catalyst 9300 switch (we've excluded range of IPs).&lt;BR /&gt;-We've decided to enable the feature in the documentation below, however that turned out to be a disaster. (When we raised this to Meraki TAC, they don't even understand how this feature works, unsurprisingly).&lt;BR /&gt;Meraki TAC is still trying to figure this out and wanted to see if the community has anything to add.&lt;BR /&gt;-We enabled the HA for MX concentrators.&lt;BR /&gt;-DHCP requests has to go through the Inside interface (dedicated for Guest-wifi) to reach the DHCP SVI on the cat9300 switch.&lt;BR /&gt;-The UI is bugged that when you selected "Re-associate" clients and save the page, then the page reloads that it's still marked as "don't re-associate".&lt;BR /&gt;-Once you put an ip in the "tunnel health ip" field, try to delete it and save, the ip will show up again upon refresh of the page. (Clearly a bug).&lt;BR /&gt;-Both DHCP scopes are reachable for the Access points at the branch and we've confirmed that through my personal cell phone wiifi connection and what ip addresss it grabbed. so if DHCP probes are somehow blocked, my cell phone shouldn't be able to get an ip from Guest-wifi.&lt;BR /&gt;-Once we've enabled that feature, the Guest Wifi at a pilot site kept flapping back and forth between the 2 data centers.&lt;BR /&gt;&lt;STRONG&gt;Changed VPN connections (8):&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;• The teleworker VPN connection to XXXXXXXXXX's SSID Guest in network Branch XXXXXXXXX is now down.&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;• The teleworker VPN connection to XXXXXXXXXX's SSID Guest in network Branch XXXXXXXXX is now down.&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;• The teleworker VPN connection to XXXXXXXXXX's SSID Guest in network Branch XXXXXXXXX is now up.&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;• The teleworker VPN connection to XXXXXXXXXX's SSID Guest in network Branch XXXXXXXXX is now down.&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;• The teleworker VPN connection to XXXXXXXXXX's SSID Guest in network Branch XXXXXXXXX is now down.&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;• The teleworker VPN connection to XXXXXXXXXX's SSID Guest in network Branch XXXXXXXXX is now up.&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;• The teleworker VPN connection to XXXXXXXXXX's SSID Guest in network Branch XXXXXXXXX is now down.&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;• The teleworker VPN connection to XXXXXXXXXX's SSID Guest in network Branch XXXXXXXXX is now down.&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;-We've received overnight an alert twice a minute from the logs above.&lt;BR /&gt;-The documentation doesn't mention exactly what is the acceptable use case for this feature.&lt;BR /&gt;-It doesn't show an example of how those DHCP packets look like and what flags are expected that the DHCP server is going to acknowledge.&lt;BR /&gt;-We've pointed the tunnel health IP field to the SVI of the DHCP scope on the Catalyst 9300 switch where the primary MX is. (The documentation doesn't say which DHCP server that this need to be pointed at, again no clear use case is defined here).&lt;BR /&gt;And we changed that to the standby. (The issue persisted)&lt;BR /&gt;-We didn't see any logs on the firewall inside interface that it was blocking anything.&lt;BR /&gt;-I ran packet capture on Cat9300 switch (at both datacenters) but i don't see anything coming as a probe.&lt;BR /&gt;-The ip address that the Tunnel health ip probes are pointing at is excluded from the DHCP scope.&lt;BR /&gt;-The documentation doesn't even say what the source ip of those probes are going to be when you set an ip address in that field.&lt;BR /&gt;&lt;BR /&gt;&lt;FONT color="#0000FF"&gt;&lt;STRONG&gt;What are we doing wrong here? how does this feature work? what DHCP options are included in those DHCP probes?&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;-Documentation for the feature i'm talking about:&lt;/STRONG&gt;&lt;BR /&gt;&lt;A href="https://documentation.meraki.com/MR/Access_Control/Secondary_MX_Concentrator_for_MR_Teleworker_VPN" target="_blank" rel="noopener nofollow noreferrer"&gt;https://documentation.meraki.com/MR/Access_Control/Secondary_MX_Concentrator_for_MR_Teleworker_VPN&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Jul 2025 19:04:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/confusing-documentation-for-mx-ha/m-p/5522683#M308655</guid>
      <dc:creator>NineLine</dc:creator>
      <dc:date>2025-07-24T19:04:48Z</dc:date>
    </item>
    <item>
      <title>Re: Confusing documentation for MX HA</title>
      <link>https://community.cisco.com/t5/wireless/confusing-documentation-for-mx-ha/m-p/5522684#M308656</link>
      <description>&lt;P&gt;Are the MXs at the DCs in VPN Concentrator mode?&lt;/P&gt;&lt;P&gt;Are the remote MRs connecting over a WAN (no NAT involved), or over the Internet to the DC MXs?&lt;/P&gt;&lt;P&gt;What firmware version are you using on the MXs and MRs?&lt;/P&gt;</description>
      <pubDate>Thu, 24 Jul 2025 19:10:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/confusing-documentation-for-mx-ha/m-p/5522684#M308656</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2025-07-24T19:10:45Z</dc:date>
    </item>
    <item>
      <title>Re: Confusing documentation for MX HA</title>
      <link>https://community.cisco.com/t5/wireless/confusing-documentation-for-mx-ha/m-p/5522685#M308657</link>
      <description>&lt;P&gt;the APs tunnel back to the MXs and yes, they are set to concentrator.&lt;BR /&gt;No NAT involved.&lt;BR /&gt;MR44 -&amp;gt; "firmware": "wireless-31-1-5"&lt;BR /&gt;MX100 -&amp;gt; "firmware": "wired-18-1-07"&lt;/P&gt;</description>
      <pubDate>Thu, 24 Jul 2025 19:18:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/confusing-documentation-for-mx-ha/m-p/5522685#M308657</guid>
      <dc:creator>NineLine</dc:creator>
      <dc:date>2025-07-24T19:18:22Z</dc:date>
    </item>
    <item>
      <title>Re: Confusing documentation for MX HA</title>
      <link>https://community.cisco.com/t5/wireless/confusing-documentation-for-mx-ha/m-p/5522686#M308658</link>
      <description>&lt;P&gt;The MX100 is up to 18.107.13.  I would try that version.  I started reading through the release notes - but there have been so many releases since the version you are on, it was taking so long.&lt;/P&gt;&lt;P&gt;The current stable release version for MR is 31.1.7.1.  I would start by moving to a firmware marked as stable.&lt;/P&gt;&lt;P&gt;One thing that comes to mind is that the MR and MX running in VPN concentrator mode typically need to present themselves to the Internet using the same public IP address.  When this happens, they connect using their private IP addresses; otherwise, they attempt to build a tunnel over the Internet using the public IP address of the MX concentrator.&lt;/P&gt;&lt;P&gt;&lt;A href="https://documentation.meraki.com/MX/Site-to-site_VPN/Configuring_Site-to-site_VPN_over_MPLS#Cisco_Meraki_VPN_Registry" target="_blank" rel="nofollow noopener noreferrer"&gt;https://documentation.meraki.com/MX/Site-to-site_VPN/Configuring_Site-to-site_VPN_over_MPLS#Cisco_Meraki_VPN_Registry&lt;/A&gt;&lt;/P&gt;&lt;P&gt;So if your two concentrators present to the Internet using different public IP addresses, then the connection to one MX will be over the WAN, while the connection to the second MX will be to its public IP address, which will be out the Internet circuit of the first DC, over the Internet to the second DC, and then into the MX located there.&lt;/P&gt;</description>
      <pubDate>Thu, 24 Jul 2025 19:41:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/confusing-documentation-for-mx-ha/m-p/5522686#M308658</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2025-07-24T19:41:48Z</dc:date>
    </item>
    <item>
      <title>Re: Confusing documentation for MX HA</title>
      <link>https://community.cisco.com/t5/wireless/confusing-documentation-for-mx-ha/m-p/5522687#M308659</link>
      <description>&lt;P&gt;I will double check on the code releases as i fetched them from a monitoring tool (API call) and im not sure how to navigate the convoluted meraki dashboard to get something as easy as that info.&lt;BR /&gt;&lt;BR /&gt;in regards to the connectivity, the SDWAN tunnel bridge the communication as if both the datacenter and branch are directly connected. so they don't change any ips during the transport.&lt;BR /&gt;SDWAN tunnels are supposed to prevent the need for NAT unless you want to NAT lan side traffic explicitly to go natted inside the tunnel or DIA access for local internet.&lt;BR /&gt;&lt;BR /&gt;The internet connectivity overall is hauled back to the data center for the branches to reach it. so everything must go through the data center to get to the internet.&lt;BR /&gt;So i don't see why would this work.&lt;BR /&gt;Even if the 2 datacenters want to talk to each other they are also connected over the SDWAN tunnels.&lt;/P&gt;</description>
      <pubDate>Thu, 24 Jul 2025 19:47:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/confusing-documentation-for-mx-ha/m-p/5522687#M308659</guid>
      <dc:creator>NineLine</dc:creator>
      <dc:date>2025-07-24T19:47:26Z</dc:date>
    </item>
    <item>
      <title>Re: Confusing documentation for MX HA</title>
      <link>https://community.cisco.com/t5/wireless/confusing-documentation-for-mx-ha/m-p/5522688#M308660</link>
      <description>&lt;P&gt;Im honestly blown away how lackluster the troubleshooting process is on Meraki. you don't have the same tools that IOS-XE has, where you can run Packet trace to see if there are any drops on the dataplane QFP cpu to see if traffic is going through without disruption, EPCs, etc.&lt;BR /&gt;&lt;BR /&gt;This is a simple issue, how do people troubleshoot more complex issue. SMDH&lt;/P&gt;</description>
      <pubDate>Thu, 24 Jul 2025 19:50:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/confusing-documentation-for-mx-ha/m-p/5522688#M308660</guid>
      <dc:creator>NineLine</dc:creator>
      <dc:date>2025-07-24T19:50:42Z</dc:date>
    </item>
    <item>
      <title>Re: Confusing documentation for MX HA</title>
      <link>https://community.cisco.com/t5/wireless/confusing-documentation-for-mx-ha/m-p/5522689#M308661</link>
      <description>&lt;P&gt;Do the two DCs connect to the Internet using different public IP addresses?&lt;/P&gt;&lt;P&gt;The branches - do they connect via a WAN or SD-WAN?  More specifically, does each branch have its own Internet connection with its own public IP address?&lt;/P&gt;</description>
      <pubDate>Thu, 24 Jul 2025 19:52:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/confusing-documentation-for-mx-ha/m-p/5522689#M308661</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2025-07-24T19:52:24Z</dc:date>
    </item>
    <item>
      <title>Re: Confusing documentation for MX HA</title>
      <link>https://community.cisco.com/t5/wireless/confusing-documentation-for-mx-ha/m-p/5522690#M308662</link>
      <description>&lt;P&gt;i've looked through the dashboard again and this is what i see:&lt;BR /&gt;&lt;BR /&gt;MR 31.1.5.1&lt;BR /&gt;MX 18.211&lt;/P&gt;</description>
      <pubDate>Thu, 24 Jul 2025 20:01:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/confusing-documentation-for-mx-ha/m-p/5522690#M308662</guid>
      <dc:creator>NineLine</dc:creator>
      <dc:date>2025-07-24T20:01:10Z</dc:date>
    </item>
    <item>
      <title>Re: Confusing documentation for MX HA</title>
      <link>https://community.cisco.com/t5/wireless/confusing-documentation-for-mx-ha/m-p/5522691#M308663</link>
      <description>&lt;P&gt;Is there a good reason that could explain why you choose to configure the guest SSID in "tunneled mode" ?&lt;/P&gt;&lt;P&gt;I know we are drifting away from your issues , but I'm trying to understand the use case&lt;/P&gt;</description>
      <pubDate>Thu, 24 Jul 2025 20:21:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/confusing-documentation-for-mx-ha/m-p/5522691#M308663</guid>
      <dc:creator>Raphael_L</dc:creator>
      <dc:date>2025-07-24T20:21:08Z</dc:date>
    </item>
    <item>
      <title>Re: Confusing documentation for MX HA</title>
      <link>https://community.cisco.com/t5/wireless/confusing-documentation-for-mx-ha/m-p/5522692#M308664</link>
      <description>&lt;P&gt;As &lt;A href="https://community.meraki.com/t5/user/viewprofilepage/user-id/340"&gt;@Philip D'Ath&lt;/A&gt; said, they are all quite a few versions behind, so could do with updating.&lt;/P&gt;&lt;P&gt;You show SD-WAN linking the sites, but no MXs at the site with the APs, are there MXs there, or another SD-WAN solution?&lt;/P&gt;</description>
      <pubDate>Thu, 24 Jul 2025 23:18:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/confusing-documentation-for-mx-ha/m-p/5522692#M308664</guid>
      <dc:creator>CMR</dc:creator>
      <dc:date>2025-07-24T23:18:36Z</dc:date>
    </item>
    <item>
      <title>Re: Confusing documentation for MX HA</title>
      <link>https://community.cisco.com/t5/wireless/confusing-documentation-for-mx-ha/m-p/5522693#M308665</link>
      <description>&lt;P&gt;Since there is a requirement to backhaul all traffic back to the data center, guest traffic has been requested to be segregated.&lt;/P&gt;</description>
      <pubDate>Fri, 25 Jul 2025 00:59:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/confusing-documentation-for-mx-ha/m-p/5522693#M308665</guid>
      <dc:creator>NineLine</dc:creator>
      <dc:date>2025-07-25T00:59:19Z</dc:date>
    </item>
    <item>
      <title>Re: Confusing documentation for MX HA</title>
      <link>https://community.cisco.com/t5/wireless/confusing-documentation-for-mx-ha/m-p/5522694#M308666</link>
      <description>&lt;P&gt;i can't just throw random testing by just upgrading and hoping for the best.&lt;BR /&gt;The question was, whether the documentation was trying to say one thing or the other. what is the correct use case of this feature.&lt;BR /&gt;&lt;BR /&gt;Further more, the SDWAN solution is called Cisco SDWAN, i didn't say viptela because it wouldn't make sense to say that. this renaming was done way back in 2019.&lt;/P&gt;</description>
      <pubDate>Fri, 25 Jul 2025 01:01:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/confusing-documentation-for-mx-ha/m-p/5522694#M308666</guid>
      <dc:creator>NineLine</dc:creator>
      <dc:date>2025-07-25T01:01:20Z</dc:date>
    </item>
    <item>
      <title>Re: Confusing documentation for MX HA</title>
      <link>https://community.cisco.com/t5/wireless/confusing-documentation-for-mx-ha/m-p/5522695#M308667</link>
      <description>&lt;P&gt;I think you might have a fundamental design issue. But not enough information has been supplied to answer whether that is the case or not.&lt;/P&gt;</description>
      <pubDate>Fri, 25 Jul 2025 02:42:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/confusing-documentation-for-mx-ha/m-p/5522695#M308667</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2025-07-25T02:42:00Z</dc:date>
    </item>
    <item>
      <title>Re: Confusing documentation for MX HA</title>
      <link>https://community.cisco.com/t5/wireless/confusing-documentation-for-mx-ha/m-p/5522696#M308668</link>
      <description>&lt;P&gt;what information did i not supply?&lt;BR /&gt;What is the issue with the design if you say i didn't give the entire description?&lt;BR /&gt;&lt;BR /&gt;2 contradicting statements.&lt;BR /&gt;&lt;BR /&gt;Regardless whether the design is the wrong one or not, does not address the fact that the document is not stating what is the right or wrong use case for it. or how it should be used. or how the DHCP packets are crafted. or what DHCP options are in them.&lt;BR /&gt;&lt;BR /&gt;Those are the important questions, not what our topology is at the moment.&lt;/P&gt;</description>
      <pubDate>Fri, 25 Jul 2025 05:12:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/confusing-documentation-for-mx-ha/m-p/5522696#M308668</guid>
      <dc:creator>NineLine</dc:creator>
      <dc:date>2025-07-25T05:12:30Z</dc:date>
    </item>
    <item>
      <title>Re: Confusing documentation for MX HA</title>
      <link>https://community.cisco.com/t5/wireless/confusing-documentation-for-mx-ha/m-p/5522697#M308669</link>
      <description>&lt;P&gt;For the MR to keep track of if the tunnel is up, in monitors traffic. If there is no traffic, it will monitor using DHCP. It doesn't really matter what options are being used, or how it is crafted. If the MR gets a DHCP response of any kind, the tunnel is marked up. &lt;/P&gt;&lt;P&gt;You can either specify a specific IP address of a DHCP server, or not. If you specify a server IP, it will send directed DHCP requests to that. &lt;/P&gt;&lt;P&gt;After a failover of the secondary concentrator, the MR will continue to monitor the connection to the primary, and preemptively fall back. So I'd argue that if you see the connection flap between DCs, something is dropping either the VPN connection or DHCP packets.&lt;/P&gt;&lt;P&gt;You may want to ensure that the VPN Concentrator that the MRs are terminating their VPN connection on is not part of the rest of the AutoVPN topology. I.e. do not use the same MX for AutoVPN SDWAN Cloud and for the SSID tunneling. This is to avoid the "Double Tunnel", as mentioned in the SSID Tunneling document.&lt;/P&gt;&lt;P&gt;&lt;A href="https://documentation.meraki.com/MR/Client_Addressing_and_Bridging/SSID_Tunneling_and_Layer_3_Roaming_-_VPN_Concentration_Configuration_Guide#How_SSID_Tunneling_Works" target="_blank" rel="nofollow noopener noreferrer"&gt;https://documentation.meraki.com/MR/Client_Addressing_and_Bridging/SSID_Tunneling_and_Layer_3_Roaming_-_VPN_Concentration_Configuration_Guide#How_SSID_Tunneling_Works&lt;/A&gt; &lt;/P&gt;</description>
      <pubDate>Fri, 25 Jul 2025 09:09:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/confusing-documentation-for-mx-ha/m-p/5522697#M308669</guid>
      <dc:creator>Rasmus Hoffmann Birkelund</dc:creator>
      <dc:date>2025-07-25T09:09:30Z</dc:date>
    </item>
    <item>
      <title>Re: Confusing documentation for MX HA</title>
      <link>https://community.cisco.com/t5/wireless/confusing-documentation-for-mx-ha/m-p/5522698#M308670</link>
      <description>&lt;P&gt;I disagree with the sentiment that it doesn't matter what the DHCP packet looks like. And as Chris Greer says "wireshark/packet captures is the source of truth".&lt;BR /&gt;it completely does, the size of the packet could be a problem since the Cisco SDWAN tunnel could be dropping the packet since im sure df bit is set (but that's an assumption). and that's why i want to see the packet and how it looks like.&lt;BR /&gt;&lt;BR /&gt;Based on that, traffic did exist and i was able to browse the internet, so clearly the MR and MX knows that there is traffic since the tunnel terminates at the MX and traffic exits there.&lt;BR /&gt;&lt;BR /&gt;That only means that either the MR isn't getting the response back or isn't sending it at all.&lt;BR /&gt;&lt;BR /&gt;And we know for a fact that we didn't get any probes from the MR as a DHCP packet.&lt;BR /&gt;&lt;BR /&gt;So that only means the MR code is broken and the probe isn't functioning/being sent at all.&lt;/P&gt;</description>
      <pubDate>Fri, 25 Jul 2025 13:30:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/confusing-documentation-for-mx-ha/m-p/5522698#M308670</guid>
      <dc:creator>NineLine</dc:creator>
      <dc:date>2025-07-25T13:30:26Z</dc:date>
    </item>
    <item>
      <title>Re: Confusing documentation for MX HA</title>
      <link>https://community.cisco.com/t5/wireless/confusing-documentation-for-mx-ha/m-p/5522699#M308671</link>
      <description>&lt;P&gt;&lt;A href="https://community.meraki.com/t5/user/viewprofilepage/user-id/129262"&gt;@hussam aulaian&lt;/A&gt; do you realise that everyone here apart from those marked as Meraki employees are either end users or integrators who give up their time for free to help.  Several of us are trying to help you, so getting angry and saying it just doesn't work isn't helping anyone.&lt;/P&gt;&lt;P&gt;I haven't personally created a setup exactly as you are trying, so hadn't chipped in, but the smallest detail might be the key, so if you want to find the solution (which I am sure you do) then please treat us as a community to help and not a forum to shout at &lt;SPAN class="lia-unicode-emoji" title=":hugging_face:"&gt;&lt;span class="lia-unicode-emoji" title=":hugging_face:"&gt;🤗&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 25 Jul 2025 19:21:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/confusing-documentation-for-mx-ha/m-p/5522699#M308671</guid>
      <dc:creator>CMR</dc:creator>
      <dc:date>2025-07-25T19:21:13Z</dc:date>
    </item>
    <item>
      <title>Re: Confusing documentation for MX HA</title>
      <link>https://community.cisco.com/t5/wireless/confusing-documentation-for-mx-ha/m-p/5522700#M308672</link>
      <description>&lt;P&gt;Is the tunneled SSID stable when configured for only one of the concentrators? Meaning, point to only MX1 and the SSID is stable? Reconfigure and point to MX2 and the SSID is still stable? Apologies if you already verified and answered that in the thread and I overlooked it.&lt;/P&gt;</description>
      <pubDate>Fri, 25 Jul 2025 23:03:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/confusing-documentation-for-mx-ha/m-p/5522700#M308672</guid>
      <dc:creator>Ryan_Miles</dc:creator>
      <dc:date>2025-07-25T23:03:04Z</dc:date>
    </item>
    <item>
      <title>Re: Confusing documentation for MX HA</title>
      <link>https://community.cisco.com/t5/wireless/confusing-documentation-for-mx-ha/m-p/5522701#M308673</link>
      <description>&lt;P&gt;But you are running catalyst SD-WAN no? Why not reduce the complexity of your guest network solution and drop it in a separate guest VPN instead of dubbel tunneling?&lt;/P&gt;&lt;P&gt;Anyhow, seems like the tunnel is up. Have you tried to capture traffic in the MX vpn consentrators? You should be able to capture the de-capsulated packets there.&lt;/P&gt;</description>
      <pubDate>Sat, 26 Jul 2025 10:54:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/confusing-documentation-for-mx-ha/m-p/5522701#M308673</guid>
      <dc:creator>martin-lystad</dc:creator>
      <dc:date>2025-07-26T10:54:20Z</dc:date>
    </item>
    <item>
      <title>Re: Confusing documentation for MX HA</title>
      <link>https://community.cisco.com/t5/wireless/confusing-documentation-for-mx-ha/m-p/5522702#M308674</link>
      <description>&lt;P&gt;i can't believe that i have to reply to such comment.&lt;BR /&gt;1- people started saying that im not explaining properly or providing a complete topology, or my topology is not correct. (what is not correct about it? im very open to listen)&lt;BR /&gt;2- I was asking about something and conversation is getting dragged in unrelated direction. i asked about the document and the document only. &lt;BR /&gt;3- im well aware of how to distinguish who is a Meraki employee and who is not.&lt;BR /&gt;4- please don't preach to me about decorum because y'all instigated these kind of responses. &lt;BR /&gt;5- no one forced any of the people who commented to respond so please don't think i'm begging for help here. im merely bringing a technical conversation but people like you insist on derailing it with unrelated discussion. &lt;BR /&gt;&lt;BR /&gt;I don't see anyone trying to help so far, just projecting and self righteousness, such as your comment up here.&lt;BR /&gt;&lt;BR /&gt;Lastly, no one is shouting, if you have a language barrier and thin skin to fail to read between the lines, that's on you to feel offended over nothing.&lt;BR /&gt;&lt;BR /&gt;I didn't claim any entitlement for help, so please spare me this rant on how you are "just trying to help". because you aren't.&lt;BR /&gt;&lt;BR /&gt;if you have something constructive to add to the conversation, go ahead. i won't be responding to none-technical questions anymore or even have to justify what i'm saying.&lt;/P&gt;</description>
      <pubDate>Sat, 26 Jul 2025 22:23:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/confusing-documentation-for-mx-ha/m-p/5522702#M308674</guid>
      <dc:creator>NineLine</dc:creator>
      <dc:date>2025-07-26T22:23:07Z</dc:date>
    </item>
  </channel>
</rss>

