DEV Community

ZeroTrust Architect
ZeroTrust Architect

Posted on • Edited on • Originally published at cacheguard.com

Cloud-Managed vs On-Premises Network Security: Management Plane Architecture Compared

Cisco Meraki and CacheGuard represent opposite ends of the management architecture spectrum. Meraki is cloud-managed; CacheGuard is on-premises. This is not just a UX difference — it has implications for control plane dependencies, outage behaviour, and data sovereignty.

CacheGuard, a Cisco Meraki Alternative

The cloud management plane architecture

Meraki MX appliances communicate continuously with Meraki's cloud management infrastructure (dashboard.meraki.com). The cloud plane serves several functions:

  • Configuration distribution: Policy changes made in the dashboard are pushed to devices via cloud
  • Telemetry collection: Traffic statistics, event logs, and health metrics are sent to Meraki's cloud
  • Authentication: License validation happens against the cloud
  • Firmware management: Updates are pushed from the cloud

The data plane — actual traffic forwarding — runs locally on the MX hardware. An MX appliance that loses cloud connectivity continues forwarding traffic according to its last-pushed configuration.

What breaks when cloud connectivity is lost

Cloud connectivity lost
├── Dashboard access → unavailable
├── Configuration changes → cannot be applied
├── New appliance provisioning → blocked (zero-touch requires cloud)
├── License revalidation → may trigger grace period or shutdown
└── Traffic forwarding → continues (data plane is local)
Enter fullscreen mode Exit fullscreen mode

For most operational scenarios, losing cloud connectivity is a management-plane problem, not a data-plane problem. However, organisations with strict requirements for management access (incident response, emergency rule changes) cannot tolerate management plane unavailability.

The license-as-kill-switch mechanism

Meraki's licensing is tied to cloud validation. When an Advanced Security license expires:

  1. The appliance contacts the Meraki cloud for license revalidation
  2. No valid license found
  3. Security features (content filtering, AMP, IPS) are disabled
  4. After a grace period, the appliance may shut down entirely or revert to a firmware-limited mode

This is architecturally intended — Meraki's business model depends on license renewal. But it creates a hard operational dependency: the appliance is not usable without an active subscription, regardless of whether the hardware is functional.

From a risk management perspective: your network security posture is dependent on the continued availability and business operations of a third-party vendor.

Data sovereignty implications

Meraki sends telemetry — traffic metadata, DNS queries, application signatures — to Meraki's cloud infrastructure. The data residency of this telemetry depends on Meraki's infrastructure geography, which may not match your compliance requirements.

For organisations subject to GDPR, HIPAA, or sector-specific regulations requiring data to remain within a specific jurisdiction, cloud-managed platforms with fixed telemetry destinations require careful legal review.

The on-premises alternative architecture

On-premises management keeps the control plane local. Configuration changes, policy updates, and telemetry are handled by software running on infrastructure you control.

[Admin] → [Local web interface at 192.168.x.x:8090]
                    ↓
         [CacheGuard appliance]
         (config changes applied locally, no cloud round-trip)
Enter fullscreen mode Exit fullscreen mode

For multi-site deployments, CacheGuard Manager provides centralised management deployed on your own infrastructure. All configuration traffic stays within your network.

Trade-off: Zero-touch provisioning for new sites — one of Meraki's strongest operational features — requires physical or remote-hands access for initial setup with on-premises platforms. You gain control and lose deployment automation.

https://www.cacheguard.com/cisco-meraki-alternative/


Originally published on the CacheGuard Blog. CacheGuard is free and open source — GitHub.

Top comments (0)