05-10-2019 10:05 AM - edited 07-05-2021 10:22 AM
This topic is a chance to discuss more about the best practices, considerations and proved guidelines to configure, monitor and troubleshoot 802.11 wireless services under Meraki Cloud-Based architecture. The session focuses in the following topics:
To participate in this event, please use thebutton below to ask your questions
Ask questions from Monday 6 to May 17th, 2019
Edgar Monroy is a Support Engineer for Cisco Meraki Products, he covers MX, MS, MR, MV and SM. Before joining Meraki’s team he worked as a Cisco Customer Support Engineer for Cisco’s TAC for 4 years. He specializes in 802.11 technology and he has experience in the entire Cisco Wireless Portfolio, including CUWN, Mobility Express, Prime Infrastructure, MSE, CMX and Meraki MR Products. Edgar holds a Bachelor’s Degree in Electronics Engineering from the UDFJC University in Colombia. He holds a CWNA and a CCNP R&S certification.
Remember that you can continue the conversation on the Wireless and Mobility community.
Find other events https://community.cisco.com/t5/custom/page/page-id/Events?categoryId=technology-support
**Helpful votes Encourage Participation! **
Please be sure to rate the Answers to Questions
05-10-2019 11:00 AM
Hi Edgar, I have one simple question.
802.11w had a vulnerability a while back and the button was greyed out so it couldn't be enabled. Now that the button is back, is it safe to enable 802.11w?
05-10-2019 10:06 PM
Hello @cjjones
I don't have recent information regarding vulnerabilities involving 802.11w (Protected Management Frames). if you have details for it, feel free to share and I can dig more into it.
Recent major vulnerability for wireless, known as KRACK vulnerability was referred to the use of 802.11r (Fast transition). For this particular vulnerability, the fix was implemented since the firmware version 25.7. The latest stable release is 25.13, and it is safe to use 802.11r over the fixed firmware. Details at: https://documentation.meraki.com/zGeneral_Administration/Support/802.11r_Vulnerability_(CVE%3A_2017-13082)_FAQ
05-13-2019 12:20 AM
05-13-2019 10:39 AM
Could you please post your question again? We can't see the content/question you posted
05-13-2019 10:00 PM
05-14-2019 09:55 PM
Hello @BharathPatil6936
The communication between the Meraki Devices and the Meraki cloud is done via a secure encrypted connection across the internet. Current public subnets for the Meraki cloud servers are 64.62.142.12/32, 108.161.147.0/24, 199.231.78.0/24, 209.206.48.0/20. Communication uses UDP port 7351.
Meraki hardware devices act as the server/receiver as the Meraki cloud initiates calls to the devices for data collection and configuration deployment.
Additional details, including information of the Meraki Cloud architecture, can be found at:
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide