Configuring VLANs in a Cisco Meraki Environment


Configuring VLANs in a Cisco Meraki Environment

Introduction to VLAN Configuration

Virtual Local Area Networks (VLANs) offer a method of dividing a physical network into multiple logical networks, which can improve performance and security. This guide will provide a comprehensive walkthrough for setting up VLANs on a Cisco Meraki environment.

Basic Steps to Create a VLAN

  1. Navigate to Security and SD1 > Addressing and VLAN.
  2. Scroll to the Add VLAN section.
  3. Fill in the required fields:
    • VLAN ID
    • Name
    • Network
    • Subnet mask
  4. Once configured, scroll to the ports section.
  5. Enable the VLAN on the desired port.

After this setup, connecting a device to the port where the VLAN has been enabled should allow it to connect to the network.

Considerations for More Complex Networks

While the aforementioned steps are perfect for a basic configuration, in many real-world situations, devices such as computers or servers won't be connected directly to the MX. Instead:

  • Switches will often be connected to the MX to facilitate more devices.
  • The networking information discussed is universal and can apply to any type of networking equipment, not just Cisco Meraki.

Working with Multiple VLANs

If you're working in an environment with multiple VLANs, it's essential to ensure that VLANs are correctly tagged on both ends - the firewall and the switch. Here's how you can do it:

  1. Ensure the VLAN is set on the MX Firewall.
  2. Tag the correct port with the VLAN. This is usually done with a dropdown menu showing available VLANs.
  3. Proceed to the MS Switch and select the uplink port, which connects it to the firewall.
  4. It's a best practice to label these ports for clarity, especially in larger environments. This label is purely for informational purposes and doesn’t impact configurations.
  5. Ports that transmit data between multiple VLANs (between switches, routers, and firewalls) should be configured as trunk ports.
  6. Ports that connect to endpoint devices should be set as access ports. These devices could be servers, computers, etc.
  7. Ensure that the VLANs are enabled on the specific ports devices are connected to.

Inter-VLAN Communication

If devices on separate VLANs need to communicate with each other, it's crucial to ensure that:

  1. The switch ports are tagged correctly.
  2. The native VLANs are set appropriately on access ports.

For instance, if you have a device on VLAN 50 and another on the default VLAN, you'd need to ensure both VLANs are correctly configured on their respective ports.

Expanding Network Configuration

The guide has covered basic VLAN configuration, but as networks grow and encompass more VLANs and devices, the configuration might get more intricate. However, the foundational concepts remain consistent.

In future lessons, configurations might expand to include adding access points with multiple SSIDs (like a guest and office SSID) on different network segments.


Configuring VLANs in your network environment can seem daunting, but with the right steps, it becomes manageable. Remember:

  • Configure access ports for endpoint devices like computers and servers.
  • Set uplinks between your networking devices as trunk ports.
  • Ensure that the router or firewall handles the routing between different network segments correctly.

Practicing and familiarizing yourself with these configurations will make managing your network much smoother. If you found this guide helpful, please consider leaving feedback and stay tuned for more advanced configurations in upcoming guides. Safe networking!

Post a Comment