01-24-2020 03:04 PM
I am looking for older firmware versions for AP230 and AP370's. I am having major performance issues with a few of these AP's and wanted to try an older firmware.
Thanks
01-30-2020 10:25 AM
Channel width of the Meraki is 80Mhz - same as the AH (looking at this config)
01-30-2020 10:17 AM
hostname AP-Rm212
admin root-admin admin password ***
dns server-ip 10.3.33.1
dns server-ip 10.3.33.2 second
ntp server ntp1.aerohive.com
ntp interval 1440
clock time-zone daylight-saving-time 03-31 00:59:59 10-27 01:59:59
config version 138
config rollback enable
snmp location "Rm212@First Floor"
capwap client server name hm-emea-206.aerohive.com
capwap client dtls hm-defined-passphrase *** key-id 1
capwap client vhm-name Okehampton_College
no capwap client dtls negotiation enable
service L7-SNAPCHAT app-id 1137
service app19000 app-id 19000
qos policy BYOD-Students user-profile 3000 10 user 1000
qos policy BYOD-Students qos 0 wrr 1000 10
qos policy BYOD-Students qos 1 wrr 1000 20
qos policy BYOD-Students qos 2 wrr 1000 30
qos policy BYOD-Students qos 3 wrr 1000 40
qos policy BYOD-Students qos 4 wrr 1000 50
qos policy BYOD-Students qos 5 wrr 1000 60
qos policy BYOD-Students qos 6 strict 1000 0
qos policy BYOD-Students qos 7 strict 1000 0
user-profile Guest qos-policy def-user-qos vlan-id 18 attribute 18
user-profile BYOD-User qos-policy BYOD-Students vlan-id 17 attribute 1
user-profile InternalUser qos-policy def-user-qos vlan-id 1 attribute 2
ip-policy SnapchatDeny
ip-policy SnapchatDeny id 1 from 0.0.0.0 0.0.0.0 to 0.0.0.0 0.0.0.0 service app19000 action deny
ip-policy SnapchatDeny id 2 from 0.0.0.0 0.0.0.0 to 0.0.0.0 0.0.0.0 service L7-SNAPCHAT action deny
user-profile Guest security ip-policy from-access SnapchatDeny
user-profile Guest ip-policy-default-action permit
bonjour-gateway enable
bonjour-gateway vlan 16 18
bonjour-gateway realm "Mill Road_Okehampton_College"
application reporting auto
application identification cdp-index 19000 cdp-name app19000
application identification cdp-index 19000 cdp-rule host=feelinsonice.appspot.com cdp-module TLS
application identification cdp-index 19000 cdp-rule host=feelinsonice-hrd.appspot.com cdp-module TLS
application identification cdp-index 19000 cdp-rule host=data.flurry.com cdp-module TLS
application identification cdp-index 19000 cdp-rule host=appspot.l.google.com cdp-module TLS
application reporting watch-list 191,641,706,957,1137,1152,19000 enable
bonjour-gateway filter rule 1 *._aerohive-proxy._tcp.
bonjour-gateway filter rule 2 *._aerohive*._tcp.
bonjour-gateway filter rule 3 *._aerohive*._udp.
01-30-2020 10:17 AM
Hi. Quite possibly - this install was put in by an external company 5 years ago and the config was left to them. It has been working perfectly fine until recently so never had the need to look too closely. The situation now is that our hivemanager licensing has expired - this is for a number of reasons that I wont go into here. Here is the running config on this AP:
security mac-filter Okehampton_College default permit
security mac-filter OKE-Internal default permit
security mac-filter OKE-Guest default permit
security mac-filter OKE-BYOD default permit
security mac-filter OKE-BYOD address 8863:df70:f1e6 deny
security mac-filter OKE-BYOD address dc41:5fa0:49b1 deny
security mac-filter OKE-BYOD address 444c:0cd7:2d3d deny
security mac-filter OKE-BYOD address 28a0:2b36:b90f deny
security mac-filter OKE-BYOD address 28ed:6a53:d3a3 deny
security mac-filter OKE-BYOD address c4b3:0163:d6e9 deny
security mac-filter OKE-BYOD address 48e9:f149:ba4e deny
security mac-filter OKE-BYOD address a0cb:fd78:6ece deny
security mac-filter OKE-BYOD address 68fb:7e26:382d deny
security mac-filter OKE-BYOD address 68fb:7eac:8c3e deny
security mac-filter OKE-BYOD address 8832:9b68:3741 deny
security mac-filter OKE-BYOD address 24a2:e1dd:478d deny
security mac-filter OKE-BYOD address 78c3:e936:6ed0 deny
security mac-filter OKE-BYOD address ac29:3a35:96cc deny
security mac-filter OKE-BYOD address 5c95:ae71:999a deny
security mac-filter OKE-BYOD address e05f:459c:3954 deny
security mac-filter OKE-BYOD address 4033:1a98:f4fd deny
security mac-filter OKE-BYOD address 70e7:2ca5:2315 deny
security mac-filter OKE-BYOD address 1ccb:9900:fd91 deny
security mac-filter OKE-BYOD address 08fc:887a:9cae deny
security mac-filter OKE-BYOD address bc4c:c43b:e859 deny
security mac-filter OKE-BYOD address a88e:241d:d02e deny
security mac-filter OKE-BYOD address f0db:f872:88cf deny
security mac-filter OKE-BYOD address 483b:3864:3942 deny
security mac-filter OKE-BYOD address 78fd:9463:3bb0 deny
security mac-filter OKE-BYOD address c0f2:fb29:5ff7 deny
security mac-filter OKE-BYOD address 20a9:0eb9:26ce deny
security mac-filter OKE-BYOD address 60d9:c71c:6c2a deny
security mac-filter OKE-BYOD address 3ce0:72a7:bafc deny
security mac-filter OKE-BYOD address dc41:5fa8:5f48 deny
security mac-filter OKE-BYOD address 0ce7:2537:4934 deny
security mac-filter OKE-BYOD address 4033:1a44:d3b8 deny
radio profile Okehampton_NG
radio profile Okehampton_NG phymode 11ng
radio profile Okehampton_NG acsp access channel-auto-select time-range 05:00 10:00
radio profile Okehampton_NG beacon-period 300
radio profile Okehampton_NG short-guard-interval
radio profile Okehampton_NG benchmark phymode 11b rate 11 success 60 usage 50
radio profile Okehampton_NG benchmark phymode 11b rate 5.5 success 70 usage 50
radio profile Okehampton_NG benchmark phymode 11g rate 36 success 70 usage 50
radio profile Okehampton_NG benchmark phymode 11g rate 24 success 80 usage 50
radio profile Okehampton_NG benchmark phymode 11a rate 36 success 70 usage 50
radio profile Okehampton_NG benchmark phymode 11a rate 24 success 80 usage 50
radio profile Okehampton_NG benchmark phymode 11n rate mcs4/2 success 80 usage 50
radio profile Okehampton_NG benchmark phymode 11n rate 54 success 70 usage 50
radio profile Okehampton_NG benchmark phymode 11ac rate mcs2/2 success 80 usage 50
radio profile Okehampton_NG benchmark phymode 11ac rate 54 success 70 usage 50
radio profile Okehampton_NG band-steering enable
radio profile Okehampton_AC
radio profile Okehampton_AC phymode 11ac
radio profile Okehampton_AC channel-width 80
radio profile Okehampton_AC beacon-period 300
radio profile Okehampton_AC short-guard-interval
radio profile Okehampton_AC benchmark phymode 11b rate 11 success 60 usage 50
radio profile Okehampton_AC benchmark phymode 11b rate 5.5 success 70 usage 50
radio profile Okehampton_AC benchmark phymode 11g rate 36 success 70 usage 50
radio profile Okehampton_AC benchmark phymode 11g rate 24 success 80 usage 50
radio profile Okehampton_AC benchmark phymode 11a rate 36 success 70 usage 50
radio profile Okehampton_AC benchmark phymode 11a rate 24 success 80 usage 50
radio profile Okehampton_AC benchmark phymode 11n rate mcs4/2 success 80 usage 50
radio profile Okehampton_AC benchmark phymode 11n rate 54 success 70 usage 50
radio profile Okehampton_AC benchmark phymode 11ac rate mcs2/2 success 80 usage 50
radio profile Okehampton_AC benchmark phymode 11ac rate 54 success 70 usage 50
radio profile Okehampton_AC band-steering enable
radio profile Okehampton_AC tx-beamforming auto
security-object OKE-Internal
security-object OKE-Internal security protocol-suite wpa2-aes-psk ascii-key ***
security-object OKE-Internal default-user-profile-attr 2
security-object OKE-Guest
security-object OKE-Guest security protocol-suite wpa2-aes-psk ascii-key ***
security-object OKE-Guest default-user-profile-attr 18
security-object OKE-BYOD
security-object OKE-BYOD security aaa radius-server account-interim-interval 20
security-object OKE-BYOD security aaa radius-server primary 10.3.35.181 shared-secret ***
security-object OKE-BYOD security aaa radius-server accounting primary 10.3.35.181 shared-secret ***
security-object OKE-BYOD security aaa user-profile-mapping enable
security-object OKE-BYOD security aaa user-profile-mapping attribute-id 1
security-object OKE-BYOD security protocol-suite wpa2-aes-8021x
security-object OKE-BYOD security additional-auth-method captive-web-portal reg-user-profile-attr 1
security-object OKE-BYOD default-user-profile-attr 1
security-object OKE-BYOD security additional-auth-method captive-web-portal default-language english
security-object OKE-BYOD security additional-auth-method captive-web-portal success-redirect original-page
security-object OKE-BYOD web-server web-page mandatory-field 0 optional-field 0
security-object OKE-BYOD web-server index-file eulaokecoll.html success-file successokecoll.html
security-object OKE-BYOD web-directory OkehamptonCollAUP
ssid OKE-Internal
ssid OKE-Internal security-object OKE-Internal
ssid OKE-Internal security mac-filter OKE-Internal
ssid OKE-Guest
ssid OKE-Guest security-object OKE-Guest
ssid OKE-Guest security mac-filter OKE-Guest
ssid OKE-BYOD
ssid OKE-BYOD security-object OKE-BYOD
ssid OKE-BYOD security mac-filter OKE-BYOD
hive Okehampton_College
hive Okehampton_College security mac-filter Okehampton_College
hive Okehampton_College wlan-idp mitigation-mode manual
hive Okehampton_College password ***
interface wifi0 radio profile Okehampton_NG
interface wifi1 radio profile Okehampton_AC
interface mgt0 hive Okehampton_College
interface wifi0 ssid OKE-BYOD
interface wifi0 ssid OKE-Guest
interface wifi0 ssid OKE-Guest shutdown
interface wifi0 ssid OKE-Internal
interface wifi1 ssid OKE-BYOD
interface wifi1 ssid OKE-Guest
interface wifi1 ssid OKE-Guest shutdown
interface wifi1 ssid OKE-Internal
system led power-saving-mode
security wlan-idp profile RogueAP
security wlan-idp profile RogueAP ap-policy
security wlan-idp profile RogueAP ap-policy ap-oui
security wlan-idp profile RogueAP ap-policy ap-oui entry 40:18:b1
security wlan-idp profile RogueAP ap-policy ap-oui entry 00:19:77
security wlan-idp profile RogueAP ap-policy ap-oui entry 08??44
security wlan-idp profile RogueAP ap-policy ap-oui entry e0:1c:41
security wlan-idp profile RogueAP ap-policy ap-oui entry f0:9c:e9
security wlan-idp profile RogueAP ap-policy ap-oui entry 9c:5d:12
security wlan-idp profile RogueAP ap-policy ap-oui entry b8:7c:f2
security wlan-idp profile RogueAP ap-policy ap-oui entry 88:5b:dd
security wlan-idp profile RogueAP ap-policy ap-oui entry c4:13:e2
security wlan-idp profile RogueAP ap-policy ap-oui entry d8:54:a2
security wlan-idp profile RogueAP ap-policy short-preamble
security wlan-idp profile RogueAP ap-policy short-beacon
security wlan-idp profile RogueAP adhoc
interface wifi0 wlan-idp profile RogueAP
interface wifi1 wlan-idp profile RogueAP
lldp
lldp max-power 154
report statistic period 1
01-30-2020 10:06 AM
Out of interest, is there any difference in radio profile settings - specifically in regard to channel widths - are they both using 20MHz channels?
01-30-2020 10:04 AM
Quick update... results copying large file (12ish GB)
Initial firmware 8.2r6 (fresh boot): 19min 50
6.5r3 (fresh boot): 15min 50
8.2r4: 19min 30
Meraki MR33: 7min 15