Appliance settings are accessible through the Security & SD-WAN > Configure > Addressing & VLANs page and include deployment settings for routed or passthrough / VPN Concentrator mode, client tracking methods, subnet and VLAN configuration, and static routes.
The WAN appliance can be deployed in two possible modes:
Note: Making changes in Security & SD-WAN > Configure > Addressing & VLANs page can cause minor network disruption. It is not recommended to make changes during production hours.
This is the default selection. Choose this option if you want to use the WAN appliance as a layer 7 firewall to isolate and protect LAN traffic from the Internet (WAN). Client traffic to the Internet will have its source IP rewritten to match the WAN IP of the appliance. In this mode, the WAN appliance is generally also the default gateway for devices on the LAN. This section also provides a link to the DHCP settings page.
As a layer 2 passthrough device
Choose this option if you simply want to deploy the WAN appliance:
In this mode, the WAN appliance does not provide any address translation and operates as a passthrough device between the Internet and the LAN ports (sometimes referred to as a layer 2 bridge). The WAN appliance also provides VPN tunneling functionality.
For more information, please refer to the Deployment guides.
Placing a WAN appliance in Passthrough mode at the perimeter of your network with a publicly routable IP address is not recommended and can present security risks. As a best practice, Passthrough mode WAN appliances should always be deployed behind an edge firewall.
Here you can configure how the WAN appliance identifies and tracks client devices in order to apply network access policies and store information on client activity. You have three options available:
NOTE: If it is the first time enabling VLANs on a network, Security & SD-WAN > Configure > Site-to-Site VPN > Local Networks > VPN mode for the default VLAN (VLAN ID 1 after enabling VLANs) will be set to Disabled.
Re-enabling VLANs from Single VLAN will set VPN mode to the previously configured state for that network.
Newly created VLAN would inherit DNS custom name server configuration from the DHCP setting of original subnet in previous Single LAN mode. This is persistent for network being either created from default or cloned from other network currently in VLANs mode; however, with pre-existing custom name server configuration for Single LAN mode.
Deleting all VLANs will result in an error. If no VLANs are required, change the LAN setting to Single LAN mode.
You can configure a single LAN or enable VLANs under the Routing section of the Addressing & VLANs page. To enable VLANs, check the VLANs box.
VLANs allow you to partition your network into different subnets such that downstream hosts are separated into different broadcast domains based on the VLAN they operate in. VLAN-based network separation can be an effective tool for isolating and identifying different segments of your network and therefore provides an additional layer of security and control. The appliance has multiple LAN IPs, each of which is the default gateway address on its particular VLAN.
To add a new VLAN, click Add VLAN at the top right of the Subnets table. To modify an existing VLAN, click on that VLAN in the Subnets table. The following fields can be set for a local VLAN:
To delete a VLAN, click the check box next to the VLAN and click the Delete button, then click Save.
Here you can view and modify the VLAN settings for your WAN appliance on a per-port basis. To modify the per-port VLAN settings, select the port or ports you wish to reconfigure and click Edit. You will be presented with a menu that allows you to set the following parameters:
NOTE: If a VLAN in use as the Native VLAN for one or more ports is deleted, those ports will be disabled until a new Native VLAN is configured
Static routes are used to reach subnets that are behind a layer 3 switch or otherwise not directly connected to or configured on the WAN appliance.
To add a new static route, click " Add Static Route " at the top right of the Static routes table. To modify an existing static route, click on it in the Static routes table. The following fields can be set for a static route:
To delete a static route, click on the check box next to that route on the left side of the Static routes table.
The status of configured routes can be viewed on the Security & SD-WAN > Monitor > Route table page.
When a static route is setup with one of these conditions; While next hop responds to ping or While host responds to ping, the WAN appliance will generate ICMP requests that are sourced from the VLAN interface that the next hop IP is in.
Please refer to MPLS to VPN failover deployment guide for a detailed discussion on route failure detection and implementing a resilient WAN architecture.
Warm spare can be configured on the Security & SD-WAN > Monitor > Appliance status page. You can learn more about warm spare functionality here.
Dynamic DNS allows you to reach a public-facing WAN appliance over the Internet even if the public IP address changes. Meraki will automatically issue a unique FQDN (fully qualified domain name) for the WAN appliance and auto-register the WAN appliance through Meraki's own Dynamic DNS service. This public DNS record will be updated if the public IP address of the WAN appliance changes due to DHCP lease renewal or uplink failover. To configure Dynamic DNS, go to the Security & SD-WAN > Monitor > Appliance status page.