In his encyclopedic answer here, @Spiff touches upon a ton of wireless access point issues, but not the ONE detail I'm looking for!
I'm supporting a pre-Cisco buy-out Meraki wireless network that gives every guest an account in the 10.x.y.z scope, which is awesome. The internal addresses for the Merakis were all on our main 192.168.168.x scope, but because of their guest configuration, it was never an issue.
However, I've finally come up empty trying to find replacements on ebay, and finally broke down and bought a few similarly priced TP-Link APs. Put one on the same switch, configured it to have the same security and SSID. Turns out that while they are as unmanaged as the Merakis, they aren't as smart, and immediately started putting customers phones directly on our main network 192.168.168.x. (To be clear, they defaulted to using the only DHCP server available, THE server, which had only the one scope to put the guests on. Not a misconfiguration on TP-Link's part, just a different (albeit worse) default configuration than the Merakis. The TP-Link solution is to purchase a TP-Link L3 switch that can create VLANs by itself.)
I head to the server and SonicWall interfaces to figure out how to put all of the wireless gear on their very own VLAN. A few days and much head- (and butt-)scratching later, all of the Meraki APs and the tester TP-Link AP are on new VLAN, on a new DHCP scope, handed out by the SonicWall firewall, so they all have internally facing 192.168.2.x. However, clients connected to the Merakis are getting 10.x.y.z IP addresses, and the TP-Links are deferring to the SonicWall, which gives out 192.168.2.x addresses to guests.
TO THE QUESTIONS, AT LONG LAST: I assume that when a guest is roaming over the Meraki network between various APs, they maintain the same IP address.
- Will that roaming still work between such different make and model APs?
- If so, will the massively different IP addresses for the guests either a) slow down the handoff, or b) create browsing issues?
At the end of the day, all of the traffic to the internet is coming out of the same external IP address on the SonicWall, so an external server shouldn't necessarily be noticing them changing IP addresses...
The long-term goal IS to replace the Merakis as they die, so this doesn't need to be a forever solution.
Edit to add: I don't see any way to change the default Meraki behavior of using the 10.0.0.0/8 address pool for clients, and I'd apparently need to buy the aforementioned TP-Link L3 switch to also be able to manage them and what addresses they hand out. But even there, I'd don't know that I'd have a solid way to reserve a chunk of the 10.0.0.0/8 addresses to avoid conflicts with the Merakis.