Diagnose and fix common network problems

Common Problems
🌐

VLAN has IP but no internet

Device gets DHCP but can't reach the web

🔒

VLANs can still talk to each other

Isolation rules not working as expected

🚪

Port forward not working

External traffic not reaching internal server

Connectivity Issues
📡

Device won't adopt/join

New device stuck in pending state

📺

Can't cast to TV across VLANs

Chromecast, AirPlay, Sonos not discovering

⚠️

Firewall rule isn't working

Created a rule but traffic still flows

🔌

Switch port VLAN confusion

Tagged, untagged, native, trunk... help!

🌐 VLAN Has IP But No Internet

🔧

UniFi Fix

1

Check DHCP is enabled

Settings → Networks → [Your VLAN] → DHCP should be "DHCP Server"

2

Verify gateway is set

The gateway should be the UniFi router's IP on that VLAN (usually .1)

3

Check inter-VLAN routing

Settings → Routing → Make sure no rules block this VLAN from WAN

4

Check firewall rules

Settings → Firewall & Security → Rules → Look for any "Drop" rules affecting this VLAN to WAN

🔧

Meraki Fix

1

Check VLAN configuration

Security & SD-WAN → Addressing & VLANs → Verify VLAN has correct subnet and DHCP range

2

Check Appliance routing

Security & SD-WAN → SD-WAN & traffic shaping → Verify no rules blocking outbound

3

Check Layer 3 firewall

Security & SD-WAN → Firewall → Look for deny rules affecting the VLAN subnet

4

Verify upstream connectivity

Security & SD-WAN → Appliance status → Check WAN uplink is healthy

💡
Meraki Tip

Use the built-in packet capture tool at Network-wide → Packet capture to trace traffic flow.

🔧

Catalyst / IOS Fix

1

Verify SVI exists and is up

show ip interface brief | include Vlan
2

Check DHCP helper/relay

show run interface Vlan[X] ! Look for: ip helper-address [DHCP-SERVER-IP]
3

Check routing table

show ip route ! Verify default route exists: S* 0.0.0.0/0
4

Check ACLs on SVI

show ip interface Vlan[X] | include access list
⚠️
Don't Forget

If using a separate router, ensure the L3 switch has a route to the default gateway.

🔒 VLANs Can Still Talk To Each Other

🛡️

UniFi VLAN Isolation

Create firewall rules to block inter-VLAN traffic:

Path: Settings → Firewall & Security → Firewall Rules → LAN In
1

Create "Block Inter-VLAN" rule

Action: Drop | Source: [Guest VLAN] | Destination: All Private IPs (RFC1918)

2

Place above "Allow" rules

Rule order matters! Drag block rule above any allow rules.

💡
Use "Block and Isolate" Network

In Settings → Networks, enable "Isolate Network" for true client isolation.

🛡️

Meraki VLAN Isolation

Path: Security & SD-WAN → Firewall → Layer 3 Firewall
1

Add L3 firewall rule

Policy: Deny | Protocol: Any | Source: [VLAN subnet] | Destination: Local LAN

2

Or use Group Policies

Network-wide → Group policies → Create policy with firewall rules

Quick Option

For wireless clients: Wireless → Access control → Client isolation will block client-to-client on same SSID.

🛡️

Catalyst VLAN Isolation

Use ACLs on the SVI to control inter-VLAN traffic:

! Create ACL to block inter-VLAN ip access-list extended BLOCK-INTERVLAN deny ip 10.10.20.0 0.0.0.255 10.10.0.0 0.0.255.255 permit ip any any ! Apply to VLAN interface interface Vlan20 ip access-group BLOCK-INTERVLAN in
💡
Private VLANs

For complete isolation, consider using Private VLANs (PVLAN) with isolated/community ports.

🚪 Port Forward Not Working

🔧

UniFi Port Forwarding

Path: Settings → Firewall & Security → Port Forwarding
1

Create port forward rule

Name it, set external port, internal IP, and internal port

2

Check "WAN In" firewall rules

Port forwards auto-create rules, but verify no conflicting DROP rules exist above it

3

Verify from external network

Test from outside your network (mobile hotspot, or use online port checker)

⚠️
Common Mistake

Double NAT! If your UniFi is behind another router, forward ports on BOTH devices.

🔧

Meraki Port Forwarding

Path: Security & SD-WAN → Firewall → Port forwarding
1

Add forwarding rule

Set public port, LAN IP, local port, and allowed remote IPs (or "any")

2

For 1:1 NAT

Security & SD-WAN → Firewall → 1:1 NAT for full IP mapping

💡
Check Uplink

If using dual WAN, specify which uplink the port forward applies to.

🔧

Catalyst / IOS NAT

Configure static NAT for port forwarding:

! Define inside and outside interfaces interface GigabitEthernet0/0 ip nat outside interface GigabitEthernet0/1 ip nat inside ! Create static NAT with port translation ip nat inside source static tcp 192.168.1.100 443 interface GigabitEthernet0/0 443

Verify NAT translations:

show ip nat translations show ip nat statistics

📡 Device Won't Adopt/Join

🔧

UniFi Device Adoption

1

Factory reset the device

Hold reset button 10+ seconds until LED flashes

2

Check L2 connectivity

Device must be on same VLAN as controller, or have L3 adoption configured

3

Set inform URL via SSH

set-inform http://[CONTROLLER-IP]:8080/inform
4

Check discovery ports

UDP 10001 must not be blocked between device and controller

🔧

Meraki Device Claim

1

Add device to network

Organization → Inventory → Claim device (enter serial number)

2

Assign to network

Select device → Assign to network

3

Check cloud connectivity

Device needs HTTPS (443) outbound to Meraki cloud. Check firewall.

4

Check DHCP

Device needs IP, gateway, and DNS to reach cloud

💡
Local Status Page

Connect to device directly and visit its local IP to see connectivity status.

🔧

Catalyst Stacking / DNA Center

For traditional CLI management:

! Check current stack members show switch ! If adding to DNA Center, verify: show pnp status show cdp neighbors
💡
DNA Center / Catalyst Center

For cloud-managed Catalyst, device needs HTTPS access to DNA Center and proper DHCP option 43 for PnP.

📺 Can't Cast Across VLANs

UniFi mDNS Setup

💡
Good News!

UniFi has a built-in mDNS reflector. No firewall rules needed.

Path: Settings → Networks → Global Settings → Multicast DNS

Enable it and select which networks should share mDNS discovery.

Meraki Bonjour Forwarding

Path: Network-wide → General → Bonjour forwarding
1

Enable Bonjour forwarding

Toggle on Bonjour forwarding

2

Add forwarding rules

Specify which services (AirPlay, Chromecast, etc.) to forward between which VLANs

Catalyst mDNS Gateway

Configure mDNS gateway for cross-VLAN discovery:

! Enable mDNS globally mdns-sd gateway ! Configure service list mdns-sd service-list PERMIT-LIST IN match _googlecast._tcp match _airplay._tcp match _raop._tcp ! Apply to VLANs interface Vlan10 mdns-sd gateway interface Vlan20 mdns-sd gateway

⚠️ Firewall Rule Not Working

🔍

UniFi Firewall Debugging

1

Check rule order

Rules process top to bottom. First match wins. Move your rule up.

2

Verify rule type

LAN In = traffic entering from LAN. LAN Out = traffic leaving to LAN. WAN In = from internet.

3

Check "Established/Related"

Default allow rule for established connections may be permitting return traffic.

4

Use traffic analysis

Settings → Traffic & Security → Traffic Identification to see what's flowing

🔍

Meraki Firewall Debugging

1

Check rule order

Rules are numbered and processed in order. Higher rules take precedence.

2

Use Event Log

Network-wide → Event log → Filter by "Firewall" to see blocked/allowed traffic

3

Verify correct firewall

L3 firewall = routed traffic. L7 firewall = application-level. Group policies = per-client.

🔍

Catalyst ACL Debugging

! Show ACL with hit counts show access-lists ! Debug ACL matches (use carefully!) debug ip packet [ACL-NUMBER] detail ! Verify ACL is applied show ip interface [INTERFACE] | include access list ! Check ACL direction (in vs out) show running-config interface [INTERFACE]
⚠️
Remember

ACLs have implicit "deny any" at the end. Make sure you have a permit statement for traffic you want to allow.

🔌 Switch Port VLAN Confusion

📚

UniFi Port Profiles

Path: Settings → Profiles → Switch Ports
1

Access Port (single VLAN)

Native VLAN = your VLAN, Tagged VLANs = none. For PCs, printers.

2

Trunk Port (multiple VLANs)

Native VLAN = management, Tagged VLANs = all needed VLANs. For APs, downstream switches.

3

Apply to ports

Devices → [Switch] → Ports → Select port → Apply profile

📚

Meraki Switch Ports

Path: Switching → Switch ports
1

Access Port

Type: Access, VLAN: [your VLAN]. Simple single-VLAN connection.

2

Trunk Port

Type: Trunk, Allowed VLANs: all or specific list, Native VLAN: management

💡
Voice VLAN

For phones: Set Type: Access, VLAN: data, Voice VLAN: voice. Meraki handles tagging.

📚

Catalyst Port Config

Access Port:

interface GigabitEthernet1/0/1 switchport mode access switchport access vlan 10

Trunk Port:

interface GigabitEthernet1/0/24 switchport trunk encapsulation dot1q switchport mode trunk switchport trunk native vlan 1 switchport trunk allowed vlan 10,20,30

Voice + Data:

interface GigabitEthernet1/0/5 switchport mode access switchport access vlan 10 switchport voice vlan 50

🛡️ Firewall Rule Auditor

🔍

Paste Your UniFi Firewall Rules

Export from: Settings → Firewall & Security → Export (or copy from API)

🔍

Paste Your Meraki Firewall Rules

Export from: Security & SD-WAN → Firewall → Download template (CSV)

🔍

Paste Your Catalyst ACLs

Get from: show running-config | section access-list