Recovering Access to Accounts Protected by Two-Factor Authentication
Two Factor Authentication (TFA) is an important security mechanism, and cannot be disabled by Cisco Meraki without positively identifying the account owner. There are two methods available to ensure access is not lost: a backup phone number (with SMS auth), and a list of one-time codes (with Google Authenticator).
Log onto the Cisco Meraki Dashboard and navigate to Configure Client VPN. Select the option to enable the Client VPN Server. Set the Client VPN Subnet. This will be a unique IP subnet offered to clients connecting to the MX Security Appliance via a Client VPN connection. The VPN:The Meraki client VPN uses the L2TP tunneling protocol and can be deployed on PC’s, Mac’s, Android, and iOS devices without additional software as these operating systems natively support L2TP. The Encryption Method:Along with the L2TP/IP protocol the Meraki client VPN employs the following encryption and hashing algorithms: 3DES.

The two methods above are the primary options for disabling or temporarily bypassing two-factor authentication. If these methods cannot be utilized for any reason, the only alternative is to provide proof of identity after contacting Cisco Meraki Technical Support. There are two methods to request removal of SMS and Google Authentication for TFA.
Sonicwall Ssl Vpn 2fa
Please note that 2FA removal requests cannot be resolved via our support phone lines. 2FA disablement needs to be requested and processed by the admin email that needs assistance via a Meraki case for security purposes. See steps on recovering access below.
Meraki Client Vpn 2fa Download
Method 1:
Cisco Meraki Client Vpn 2fa
- Open a case by emailing licensing@meraki.com.
- This email must be sent from the email address of the account TFA is to be disabled on.
- It must include the full name of the organization that the account resides in. - A second organization administrator must comment on the case through Dashboard granting approval to disable TFA on the account.
- Email or phone approval is not acceptable for this. The approval must come as a comment on the case.
- This permission can be granted only by an organization administrator with Full access.
Method 2:
Alternatively, if a second organization administrator with full access does not exist or is otherwise unavailable:
Unifi Vpn 2fa
- Open a case by emailing licensing@meraki.com.
- This email must be sent from the email address of the account TFA is to be disabled on. - Once in communication with a Cisco Meraki Support Specialist, explain that TFA needs to be disabled for the account and provide the requested documentation.
- The Support Operations Specialist will request more information about the organization and its contents and settings to verify the validity of the request.
- Once this step has been completed, a Cisco Meraki Support Specialist will provide you a document which must be signed, notarized, and mailed to Cisco Meraki Headquarters (address found below).
- When this is received by support, it will then be scanned and attached to the case before TFA is disabled.
- It is strongly recommended to send this letter with tracking, in case of postal issues.
- Unless otherwise specified by the Support Ops Team, use the following address format:
Cisco Meraki- Support Operations
500 Terry A Francois Blvd
4th Floor, C/O [SUPPORT OPS SPECIALIST'S NAME]
San Francisco, CA 94158
