Meraki MS Switches
Cisco Meraki MS switches are cloud-managed enterprise switches providing simplified network management through the Meraki Dashboard. The rXg integrates with Meraki switches via the Meraki Dashboard API, enabling configuration synchronization, VLAN management, and 802.1X/MAB authentication through Access Policies.
Supported Models
| Model/Series | Notes |
|---|---|
| MS120 Series | Cloud-managed access switches |
| MS125 Series | Cloud-managed access switches with mGig |
| MS210 Series | Cloud-managed aggregation switches |
| MS225 Series | Cloud-managed aggregation switches |
| MS250 Series | Cloud-managed aggregation switches |
| MS350 Series | Cloud-managed aggregation switches |
| MS390 Series | Cloud-managed stackable switches |
| MS410 Series | Cloud-managed aggregation switches |
| MS425 Series | Cloud-managed aggregation switches |
| MS450 Series | Cloud-managed aggregation switches |
All Meraki MS switches with Dashboard API access are supported.
Features Supported
| Feature | Supported | Description |
|---|---|---|
| Config Sync | Yes | Configuration via Meraki Dashboard API with Action Batches |
| Auto Bootstrap | No | Cloud-managed; requires Meraki Dashboard setup first |
| SNMP Monitoring | Yes | Community string synced from Meraki Dashboard |
| Switch Port Import | Yes | Automatic import via API |
| Port Enable/Disable | Yes | Enable/disable ports via API |
| Port Names | Yes | Sync port names via API |
| PoE Control | Yes | Enable/disable PoE per port |
| 802.1X Authentication | Yes | Via Access Policies with RADIUS |
| MAC Authentication Bypass (MAB) | Yes | Via Access Policies with RADIUS |
| Hybrid Authentication | Yes | Combined MAB + 802.1X via Access Policies |
| Dynamic VLAN Assignment | Yes | Via RADIUS with Access Policies |
| RADIUS CoA Support | Yes | Change of Authorization enabled on Access Policies |
| DHCP Snooping | No | Not supported via API |
| Firmware Management | N/A | Managed automatically by Meraki cloud |
| SPB-m Fabric | No | Not supported |
Prerequisites
Licensing Requirements
- Valid Meraki license for each switch
- API access enabled in Meraki Dashboard
- Enterprise or Advanced license recommended for full feature support
API Requirements
- Meraki Dashboard API key with appropriate permissions
- Organization ID (auto-detected from API key)
- Network ID (auto-detected from device serial)
Network Requirements
- Internet connectivity for cloud management
- Switch must be online in Meraki Dashboard
- HTTPS access to api.meraki.com (TCP port 443)
- RADIUS connectivity (UDP ports 1812, 1813) - for 802.1X/MAB
Onboarding Process
Cloud-Based Onboarding
Meraki switches are managed through the Meraki Dashboard. The rXg integrates via the Dashboard API.
Prerequisites for Integration:
- Switch must be claimed and online in Meraki Dashboard
- API access enabled in Organization settings
- API key generated with appropriate permissions
Onboarding Process:
Claim Switch in Meraki Dashboard:
- Log into Meraki Dashboard
- Navigate to Organization Inventory
- Claim switch using serial number and order number
Configure Network in Dashboard:
- Create or select network for the switch
- Assign switch to the network
- Configure basic network settings
Enable API Access:
- Navigate to Organization Settings Dashboard API access
- Enable API access
- Generate API key (My Profile API access)
Enable SNMP (Optional but Recommended):
- Navigate to Network-wide General SNMP
- Enable "Allow SNMP v1/2c"
- Configure community string
Add Switch to rXg:
- Create switch record in Network::Wired::Switches
- Enter switch serial number (as the identifier)
- Enter API key as the password
- Enter Organization ID in Domain Filter (optional, auto-detected)
- Save and import ports
Bootstrap Configuration
The rXg displays a reminder for SNMP configuration:
Configure the SNMP Community in `Network Wide Settings` => `General` => `SNMP` => 'Allow SNMP v1/2c' and provide a community string
Configuration
Connection Settings
Configure the switch in the Network::Wired::Switches scaffold with:
- Serial Number: Meraki switch serial number (required)
- Password: Meraki Dashboard API key
- Domain Filter: Organization ID (optional, auto-detected)
- Host: Auto-populated with switch LAN IP from API
- MAC Address: Auto-populated from API
- SNMP Community: Auto-synced from Meraki Dashboard
RADIUS / AAA Configuration
When a RADIUS Server Option is active in rXg, the system automatically creates Access Policies in the Meraki Dashboard:
Access Policy Types Created:
| Policy Name | Authentication Type | Description |
|---|---|---|
rxg-<ip>-eap |
802.1X | Standard 802.1X EAP authentication |
rxg-<ip>-mac |
MAC authentication bypass | MAC-based authentication |
rxg-<ip>-maceap |
Hybrid authentication | MAB first, then 802.1X fallback |
Access Policy Configuration:
- RADIUS server: rXg IP address
- RADIUS auth port: From RADIUS Server Option
- RADIUS secret: From RADIUS Server Option
- Host Mode: Single-Host
- RADIUS CoA: Enabled
- RADIUS Testing: Enabled
- Increase Access Speed: Enabled (for Hybrid authentication only)
Note: Meraki Dashboard allows a maximum of 8 Access Policies per network.
Port Authentication Configuration
Ports are configured for authentication via Access Policies:
- Open: No authentication (accessPolicyType: "Open")
- Custom access policy: Use assigned Access Policy for authentication
VLAN Configuration
VLANs are automatically managed through Switch Port Profiles:
- Access ports: Single untagged VLAN (
type: access,vlan: <id>) - Trunk ports: Tagged VLANs with native VLAN (
type: trunk,allowedVlans: <list>,vlan: <native>)
VLAN Format:
- Trunk ports can use
allfor all VLANs or comma-separated list - VLAN ranges supported in format
100-200 - Native VLAN defaults to 1 if not specified
Port Management
Port settings managed via API:
| Setting | API Field | Description |
|---|---|---|
| Port Name | name |
Descriptive name for the port |
| Enabled | enabled |
Enable/disable port (true/false) |
| Port Type | type |
access or trunk |
| Native VLAN | vlan |
Untagged/native VLAN ID |
| Allowed VLANs | allowedVlans |
Tagged VLANs for trunk ports |
| PoE | poeEnabled |
Enable/disable Power over Ethernet |
| Access Policy | accessPolicyNumber |
Access Policy for authentication |
Monitoring Capabilities
| Metric | Collection Method | Notes |
|---|---|---|
| Port Status | API | Connected/Disconnected state |
| Port Speed | API | Negotiated link speed |
| Port Enabled | API | Admin enabled/disabled state |
| Port Type | API | Access or trunk mode |
| VLAN Configuration | API | Current VLAN assignments |
| Device Info | API | Model, firmware, LAN IP, MAC |
| SNMP Community | API | Configured community string |
| Access Policies | API | Configured authentication policies |
Note: The Meraki API does not provide real-time port statistics like traditional SNMP. Use SNMP monitoring with the community string from Dashboard for detailed statistics.
Action Batches
The rXg uses Meraki Action Batches for efficient configuration:
- Batch Size: Up to 20 actions per synchronous batch
- Concurrent Batches: Maximum 5 concurrent batches
- Synchronous Mode: Waits for completion before proceeding
Action Batches are used for: - Port configuration updates - Access Policy creation - Bulk VLAN changes
Troubleshooting
Common Issues
Issue: API connection fails
Symptom: Unable to communicate with Meraki switch Cause: Invalid API key, network ID, or permissions Resolution: - Verify API key is valid and has not expired - Check API key has access to the organization - Verify switch is online in Dashboard - Check Organization ID if specified
Issue: 401 Unauthorized error
Symptom: Authentication failed during API calls Cause: Invalid or revoked API key Resolution: - Generate new API key in Meraki Dashboard - Update API key in rXg switch record - Verify API access is enabled for organization
Issue: 429 Too Many Requests error
Symptom: API calls being rate limited Cause: Exceeding Meraki API rate limits Resolution: - Reduce sync frequency - Use Action Batches for bulk changes - Wait for rate limit window to reset
Issue: Access Policy creation fails
Symptom: Cannot create authentication policies Cause: Maximum 8 Access Policies reached Resolution: - Remove unused Access Policies in Dashboard - Consolidate policies if possible - Verify rXg-created policies exist
Issue: Port configuration not applying
Symptom: Port settings in rXg don't match Dashboard Cause: Conflicting settings or validation errors Resolution: - Check Action Batch results for errors - Verify port type supports configuration - Ensure VLANs exist in Dashboard - Check for port-specific restrictions (stack ports excluded)
Issue: SNMP monitoring not working
Symptom: No SNMP statistics collected Cause: SNMP not enabled in Dashboard Resolution: - Enable SNMP v1/2c in Network-wide General SNMP - Configure community string - Wait for rXg to sync community string from API
Diagnostic Steps
Via Meraki Dashboard:
- Verify switch is online (green status)
- Check port status in Switch Ports
- Review Access Policies in Switch Access policies
- Check SNMP settings in Network-wide General
Via rXg:
- Check sync log for API errors
- Verify API key and serial number
- Review port import results
- Check Access Policy creation status
Known Limitations
- Requires active Meraki license for switch operation
- Maximum 8 Access Policies per network
- No real-time port statistics via API (use SNMP)
- No direct CLI access - all configuration via API
- Stack ports automatically excluded from port list
- Firmware managed by Meraki cloud (not configurable)
- DHCP snooping not available via API
- Some features require specific license tiers
Operational Caveats
- Cloud Dependency: Meraki switches require internet connectivity to Meraki cloud for management. Local switching continues if cloud is unreachable, but configuration changes require connectivity.
- API Rate Limits: Meraki enforces API rate limits. The rXg uses Action Batches to minimize API calls and respect limits.
- Organization Auto-Detection: If Domain Filter (Organization ID) is not specified, the rXg uses the first organization associated with the API key.
- Network Auto-Detection: Network ID is automatically determined from the switch serial number via device lookup.
- LAN IP Sync: The switch's LAN IP is automatically synced to the Host field from the API response.
- MAC Address Sync: The switch's MAC address is automatically synced from the API response.
- SNMP Community Sync: The SNMP community string is automatically synced from Dashboard settings.
- Access Policy Naming: rXg creates Access Policies with names in format
rxg-<ip>-<type>for identification. - Port Speed: API reports port speed capability, not negotiated speed. Use SNMP for actual link speed.
- Hybrid Authentication: The
increaseAccessSpeedsetting is required for Hybrid (maceap) authentication and automatically enabled. - RADIUS CoA: Change of Authorization is enabled on all rXg-created Access Policies for dynamic VLAN assignment.
- Stack Ports: Stacking ports are automatically excluded from port management (identified by single link negotiation capability).