Showing results for 
Search instead for 
Did you mean: 
Cisco Moderador
Community Manager

Ask the Expert- Meraki MR Series: Configuration and Troubleshooting

This topic is a chance to discuss more about the best practices, considerations and proved guidelines to configure, monitor and troubleshoot 802.11 wireless services under Meraki Cloud-Based architecture. The session focuses in the following topics:

  • Configuration topics include SSID definition, authentication types, client IP assignments, service distributing, availability, firewall, traffic shaping, and radio settings.
  • Monitoring topics cover the understanding of the Access Points status information, client details and RF status.
  • Troubleshooting tools provided by the Meraki Dashboard such as Wireless Health and Packet Captures.

To participate in this event, please use theJoin the Discussion : Cisco Ask the Expertbutton below to ask your questions

Ask questions from Monday 6 to May 17th, 2019


Featured Expert

edgarM.jpgEdgar Monroy is a Support Engineer for Cisco Meraki Products, he covers MX, MS, MR, MV and SM. Before joining Meraki’s team he worked as a Cisco Customer Support Engineer for Cisco’s TAC for 4 years. He specializes in 802.11 technology and he has experience in the entire Cisco Wireless Portfolio, including CUWN, Mobility Express, Prime Infrastructure, MSE, CMX and Meraki MR Products. Edgar holds a Bachelor’s Degree in Electronics Engineering from the UDFJC University in Colombia. He holds a CWNA and a CCNP R&S certification.

Remember that you can continue the conversation on the Wireless and Mobility community.

Find other events  


**Helpful votes Encourage Participation! **
Please be sure to rate the Answers to Questions


Hi Edgar, I have one simple question.


802.11w had a vulnerability a while back and the button was greyed out so it couldn't be enabled. Now that the button is back, is it safe to enable 802.11w?

Hello @cjjones 


I don't have recent information regarding vulnerabilities involving 802.11w (Protected Management Frames). if you have details for it, feel free to share and I can dig more into it.


Recent major vulnerability for wireless, known as KRACK vulnerability was referred to the use of 802.11r (Fast transition). For this particular vulnerability, the fix was implemented since the firmware version 25.7. The latest stable release is 25.13, and it is safe to use 802.11r over the fixed firmware. Details at:



Hi @BharathPatil6936 

Could you please post your question again? We can't see the content/question you posted 

Need to know how data fulled from cloud to miraki devices?

Hello @BharathPatil6936 

The communication between the Meraki Devices and the Meraki cloud is done via a secure encrypted connection across the internet. Current public subnets for the Meraki cloud servers are,,, Communication uses UDP port 7351.

Meraki hardware devices act as the server/receiver as the Meraki cloud initiates calls to the devices for data collection and configuration deployment. 


Additional details, including information of the Meraki Cloud architecture, can be found at:

Content for Community-Ad