General MX Best Practices
General MX Best Practices
With the increasing popularity and demand for SD-WAN architecture, planning and designing a secure and highly functional network can be a challenging
task. With cloud technology on the rise, and an increase in the amount of user data in modern networks, it is no easy task to plan and accommodate, while
maintaining overall security. The Cisco Meraki WAN appliances allow for high-end performance with a robust feature set to provide an easy to manage security
solution for environments of any size. From small form factor teleworker gateways to powerful datacenter appliances, the Cisco Meraki WAN appliance allows
for flexibility and functionality of network operations.
For branch offices that require communication to the corporate network, remote employees on the go that need to view important documents on public networks,
or administrators that require increased control over client devices, Software Defined Networking is an ever-growing key component of the modern data
network. Typically this requires tedious interaction and configurations to ensure full functionality for end users and client devices, as well as constant
monitoring. Due to the fact that Cisco Meraki WAN appliances are managed completely with the Meraki cloud, all of this can be done with our intuitive online
dashboard. The dashboard provides the in-depth visibility needed for the modern network with integrated monitoring tools.
To find more in-depth information on what model of the Cisco Meraki WAN appliance
best suits your needs, please refer to the MX sizing guide.
Deployment Options
The Cisco Meraki WAN appliance has a number of deployment options to meet the needs of your network and infrastructure. Whether as the main edge firewall
for your network, or as a concentrator device in your data center, the WAN appliance can be easily integrated. The operational modes of the WAN appliance can
be found on the Cisco Meraki dashboard under Security & SD-WAN > Configure > Addressing and VLANs.
1
Routed (NAT) Mode
Routed mode on a Cisco Meraki WAN appliance is best used when the WAN appliance will be connecting directly to your internet demarcation
point. When this is the case, the WAN appliance will have a public IP address that is issued by the internet service provider. The WAN appliance will also be the
device handling the routing for clients to the internet, and any other networks configured for the device to communicate to. This mode is optimal for networking
environments that require a WAN appliance with Layer 3 networking capabilities.
2
Passthrough or VPN Concentrator Mode
Passthrough mode on a Cisco Meraki WAN appliance configures the appliance as a Layer 2 bridge for the network. The WAN appliance in this mode will not
perform any routing or any network translations for clients on the network. Passthrough or VPN Concentrator Mode is best used when there is an existing Layer
3 device upstream handling network routing functions. The WAN appliance in this instance would still act as a WAN appliance, but with less functionality for
Layer 3 networking.
The recommended use case for the WAN appliance in passthrough mode is when it is acting as a VPN Concentrator for the Cisco Meraki Auto VPN
feature. Passthrough or VPN Concentrator mode ensures easy integration into an existing network that may already have layer 3 functionality and edge
security in place. With this mode, a Cisco Meraki WAN appliance can be integrated into the existing topology and allow for seamless site to site
communication with minimal configuration needed.
3
Passthrough or VPN Concentrator Considerations
• When in Passthrough or VPN Concentrator mode, The Cisco Meraki WAN appliance will not provide Internal LAN
subnets and VLAN Interfaces performing Layer 3 (L3) functions such as NAT or routing.
• A WAN appliance in passthrough or VPN concentrator mode will act as a layer 2 firewall that will integrate into the
existing LAN with a layer 3 routing appliance upstream.
• VPN destined traffic will need to be directed to the WAN appliance for effective routing to the VPN endpoint. As
such, static routes on other Layer 3 capable devices may be needed for full VPN functionality.
• WAN appliances in passthrough are able to allow IPv6 traffic to pass across the existing LAN if the traffic flows
through the WAN appliance.
4
High Availability (HA) Pair
When deploying two WAN appliances in high availability (HA), it is recommended to have the management traffic for HA traverse via a downstream
connection to a layer 2 switch, and to not have a dedicated HA cable connected between the two appliances. The reason for this is because there is an
increased potential for a spanning-tree loop if the WAN appliances are also connected to the same layer 2 switch. The best topology is to have the WAN
appliances connected to the same downstream Layer 2 switch.
5
NOTE: The WAN appliance generates and sends VRRP heartbeats across all configured VLANs. For best high availability behavior, it is
recommended to have all VLANs allowed on the downstream connections to the switches that are connecting the WAN appliance HA pair. It is also
recommended that any downstream switches that may be passing the VRRP traffic are configured to be aware of all the VLANs configured on the
WAN appliance.
For more information on HA configuration with VRRP on the Meraki WAN appliance, see the knowledge base document MX Warm Spare - HA Pair.
For more information on WAN appliance layer 2 connectivity, see the knowledge base document MX Layer 2 Functionality.
6
separation of networks that will be hosting employee data and networks providing guest access. This is a critical consideration to ensure the maximum
possible security for your networking environment. Using multiple VLANs for different use cases will also decrease the amount of broadcast traffic within the
same subnet. When designing and configuring multiple VLANs, it is generally recommended to create the subnet to be sized for the necessary amount of
devices intended to be in that particular network. Generally, networks with /24 subnet masks are large enough for common deployments, while also providing
room for expansion and simple subnetting scalability if more VLANs are to be added. However, it is always best to consider the needs of your deployment when
planning your subnets, as some deployments may require larger addressing spaces.
For more information on enabling and configuring VLANs please see our knowledge base document Configuring VLANs on the MX Security
Appliance.
In the example below, an WAN appliance is set up as an Internet edge firewall, with the rest of the layer 3 routing taking place on a downstream switch
stack. With this configuration, it is best to have a single subnet configured between the WAN appliance and the other layer 3 device, to minimize the
amount of traffic and routing that will be taking place as well as to keep routing consistency. This single subnet will act as a transit VLAN for all routing that is to
take place between the two layer 3 endpoints in the topology.
7
For more information on WAN appliance routing and layer 3 connectivity, please refer to the documents MX and MS Basic Layer 3 Topology and MX
Routing Behavior
8
Layer 3 Firewall Rules
The Meraki WAN appliance allows for custom outbound firewall rules to be configured to ensure precise and granular control over which networks are able to
communicate with one another. The WAN appliance is a stateful firewall, meaning that all inbound connections are blocked unless they have either
originated from within the WAN Appliance or a forwarding rule is configured.
By default, all VLANs configured on the WAN appliance will be able to communicate with one another. If there are VLANs you wish to not be able to
pass traffic between, firewall rules will need to be configured. It is best practice to restrict the amount of traffic that can travel between subnets that are not
closely related. For example, it is recommended to create firewall rules to block all traffic from a VLAN that may be used for guest access from being able to
contact other VLANs used for business operations.
Additionally, if there are internal users that need internet access, but should be blocked from accessing a certain site or IP address, the firewall rules can be
configured with IPs or URLs as the destinations. The use case for this is if you know of a website the users in that VLAN should not access.
NOTE: The layer 3 firewall rules configured will be processed in top-down order. If traffic matches a rule in the list, the WAN appliance will no
longer process any further rules for that traffic.
Using Layer 7 firewall rules for blocking traffic based on countries also has its caveats as well. While it may seem more secure to block all countries other than
the one the WAN appliance is located in, this can cause issues with traffic flows to certain resources that may actually be necessary for daily operations. Certain
webpages and web applications can be hosted in a country not being blocked, but they may pull supplementary data or resources from a server located in a
country that is being blocked by the WAN appliance. As a result, certain aspects may not function as intended or may fail to function altogether. It is essential to
only block countries with a Layer 7 rule if you know traffic from this country is malicious in nature.
9
For more information on WAN appliance layer 7 rules please refer to the knowledge base documents for the MX Firewall Settings and Creating a
Layer 7 Firewall Rule
10
1:Many NAT Rules
In some instances, particularly if the number of public IPs available to you are limited, a 1:Many NAT rule can be put in place. This is also very similar to a port
forwarding rule, but again the public IP address that traffic is destined to determines how the Cisco Meraki WAN appliance handles the traffic. If
traffic destined for that specific IP address comes in on a particular public port, then the WAN appliance will forward the traffic to an internal host based on said
port. This enables the ability to use a single public IP address for multiple services. This also allows for a concise deployment so there are not multiple public
IPs required.
11
Advanced Malware Protection (AMP)
Advanced Malware Protection (AMP) is an adaptive and powerful tool that is incorporated on the Cisco Meraki WAN appliance with the Advanced Security
license. AMP scans and inspects HTTP downloads that are moving through the WAN appliance. The WAN appliance then takes action based on the threat
intelligence it receives from the AMP cloud. If a download matches a known signature from the AMP cloud, then the WAN appliance will block the download.
With a WAN appliance, it is highly recommended to have AMP enabled and functioning so your networking environment is secure and safe from attacks.
For more information about AMP, please refer to the knowledge base documents Advanced Malware Protection (AMP) and Threat Protection
For more information on IDS/IPS, please refer to the knowledge base document Threat Protection
12
If you would like more information about this feature on the Meraki WAN appliance, please see the knowledge document IP Source Address Spoofing
Protection
13
It is recommended to have a Cisco Meraki WAN appliance configured as a hub if it is essential for all other WAN appliances configured in the VPN
topology to have communication to networks on the hub appliance. Typically this is effective for WAN appliances at locations where there are a large
number of resources for business operations, such as at the corporate office or a datacenter.
14
Client VPN
The Meraki WAN appliance includes the option to configure client VPN functionality for remote users that require access to resources hosted in your data
network. The client VPN feature allows those users to establish a secure connection to the WAN appliance from their device as long as they have a
valid internet connection. Though it is not required for full client VPN functionality, the client VPN feature has increased functionality and ease of use when
it is deployed with a policy encompassed with Cisco Meraki Systems Manager installed on the user's remote device. Meraki Systems Manager allows
for a dynamic policy to be remotely pushed to the client device so the client VPN functionality is seamlessly integrated on the end device without end-user
configuration.
It is highly recommended to deploy and use the client VPN feature with the use of a Systems Manager policy, as this allows for a better experience for
end-users as they will not have to do any sort of configuration on their end. This is exceedingly useful in the event that the end-user's client VPN service is
having issues connecting to the WAN appliance. This allows administrators the ability to effectively troubleshoot the issue without needing the end-user to
engage in the technical troubleshooting process; creating a more simple end customer experience.
15
For more information about the Client VPN feature, please see the following knowledge base documents:
Uplink Configuration
Under the SD-WAN settings, the uplink connections for the WAN appliance can be configured to best fit the needs of your networking environment. The uplink
bandwidth limit can be configured and changed to best fit the requirements of the connection with your internet service provider. It is best practice to set the
throughput bandwidth to the highest possible amount based on your bandwidth set by your provider as to avoid potentially saturating the connection.
For uplink monitoring, it is recommended to configure multiple uplink statistic test IPs on the Meraki dashboard. This is exceptionally useful for
troubleshooting purposes, as it allows the dashboard to collect and monitor data on certain connections specified. A few examples of connections to monitor
would be a general connection to the internet (Google's 8.8.8.8 is configured by default), the connection to your service provider gateway, and the connection to
any remote sites that may be participating in site to site VPN tunneling.
Another feature of the functionality that the WAN appliance includes is automatic security list updates for features such as AMP, IDS/IPS, and content URL
filtering. These lists can be configured to check for changes in security rules on an hourly, daily, or weekly basis. The best practice to ensure your
environment stays secure is to have this interval set to check the security lists hourly. The frequency of updates can be changed per each WAN uplink,
including the cellular uplink as well.
16
Uplink Selection
Included with the SD-WAN options is the ability to have the WAN appliance route traffic to different uplinks depending on certain scenarios. Uplink selection
enables the ability of policy-based routing on the WAN appliance, which uses flow preferences for specific traffic as it heads out the WAN connection. With this
tool, it is recommended to have the uplink connections be set to load balance the traffic if applicable. This is best used if there are redundant internet
connections that have similar bandwidth capabilities.
With flow preferences based on the source traffic, it is easy to shape traffic to best fit the nature of the network traffic as it transverses to the WAN
connection. An example of what a flow preference may be used for is guest traffic. To allow for a consistent and stable connection the more cost-effective
secondary WAN connection can be configured to handle guest related traffic.
17
SD-WAN Policies
SD-WAN policies can be configured to control and modify the flows for specific VPN traffic. With multiple WAN uplinks, the WAN appliance will proactively build
multiple tunnels with each available WAN interface. In the case where there are redundant WAN connections on the WAN appliance, traffic flows based on the
type of traffic traversing the VPN connections can also be configured to allow for best performance. Custom policies set to desired preferences can be set to
ensure traffic flows take the appropriate path based on your environment. If a WAN connection that normally handles traffic such as file transfers begins to have
performance issues, the Cisco Meraki WAN appliance can dynamically change the VPN connection to an alternative WAN uplink. This is done with custom
policies or predetermined policies on the dashboard. It is encouraged to configure said policies in your deployment to best fit the needs based on the
nature of the traffic and the capabilities of the WAN connections available on the WAN appliance.
Once configured, these custom VPN policies are enforced on all VPN traffic that matches the specifications you select. Example configurations can
be found in the Meraki SD-WAN configuration guide.
If you do have questions about what policies are best for your deployment, you can always reach out to either a Meraki Sales Engineer or your Meraki
partner for a consultation on what best fits your needs.
On MX18.2 firmware while using MultiWAN MXs SD-WAN policies and load balancing policies do not apply to WAN3. You can
reference MultiWAN_Backup_Uplink
Speedburst is an option to allow clients a short window of time to exceed the bandwidth limit configured to allow, for example, a large file to transfer faster. This
is a useful feature if there are users that will be handling and uploading large files frequently on the network. Speedburst is a recommended feature to enable,
with the caveat that it should only be used if there are not a large number of clients that will need high amounts of bandwidth at the same time. If
there are a select few users or devices that require moments of higher bandwidth then Speedburst is recommended.
18
Traffic Shaping Rules
Different types of traffic require different priorities on the network. The WAN appliance is able to prioritize and shape traffic on the local network based on the
traffic type. The Meraki dashboard offers default traffic shaping rules that best fit the needs for most deployments. These default rules ensure best performance
for local voice traffic, software updates for end client devices, and collaboration applications. It is recommended to enable these default traffic shaping rules
on the WAN appliance as it allows for simple and fast configuration for the best performance of network traffic.
19