Save time by automating custom alerts in your Meter Dashboard

October 2024

Isaac Diamond
Nilesh Hirve
AK
Abhijeet Kumar
Andy Kramolisch
Alex Phan

Today, we’re pleased to announce that we’ve made exciting improvements and additions to our alerts, secure tunnels, authentication, and access features in the Meter Dashboard. These updates are available to all customers today. They enhance visibility, control, and security of Meter networks, saving you significant time through improved customization options.

Improve visibility and control with custom alerts

You can now create custom email alerts in your dashboard, ensuring important notifications about ISP degradation and WAN failover are surfaced to you in a real time fashion where you do work. Beta customers have used this feature to create custom email notifications, Slack notifications, and even text notifications so they never miss an important issue again. Alerts can also be sent to Incident Management platforms via email such as PagerDuty, OpsGenie, and more. We’ll continue to roll-out new alert categories in the coming months.

Notifications
2700 18th Street, San Francisco CA
Enabled
Trigger
Broadcast storm
Multicast storm
WAN degradation
WAN status change
Receiver
IT
NOC
IT
NOC
NOC
Service desk
NOC
Service desk
ISP quality degradation on network Primary
Meter 9:30 AM
to me
Spectrum’s internet quality was observed at 11.31% which is below a set threshold of 95.00% at 132 Main St, Suite 100, San Francisco, CA 94110.
Reach out to support if you have any questions.

Protect your network and improve the employee experience with ClientVPN

With ClientVPN, enable remote users to securely access your organization's internal network resources and applications, allowing them to connect to your company's network from any location. Quickly scale remote access by elastically handling spikes in remote work demand and provide a convenient, hybrid work environment for your employees.

Network
2700 18th St
Insights
Network
Clients
Logs
Hardware
Security appliances
Switches
Access points
Network-wide
ISPs
VLANs
Routing
Captive portal
Firewall
Rules
DNS security
Rate limiting
Port forwarding
Wireless
SSIDs
Design
Topology
Secure tunnels
Client VPN
Meter
················
Client VPN
Add VPN client
Endpoint
e7c9d7a1100-117fa-42c4d-a61y-3d781z011.meterddns.com
Address
10.250.1.10
Port
53721
DNS listen address
10.109.0.3
Clients
312
Status
Name
Linus Sivaraña
Alice Takeda
Ethan Kovács
Zara Patel
Nathan Weber
Maya Brooks
Leo Reed
Aria Novak
Kai Kim
Luna Morgan
Maxwell Cooper
Sofia Nguyen
Caleb Osei
Avery Mitchell
Ella Ramirez
Hudson Price
Lila Evans
Oscar Ward
User
linus@globex.net
alice@globex.net
ethan@globex.net
zara@globex.net
nathan@globex.net
maya@globex.net
leo@globex.net
aria@globex.net
kai@globex.net
luna@globex.net
maxwell@globex.net
sofia@globex.net
caleb@globex.net
avery@globex.net
ella@globex.net
hudson@globex.net
lila@globex.net
oscar@globex.net
IP
10.200.0.150
10.200.0.150
10.200.0.150
10.200.0.150
10.200.0.150
10.200.0.150
10.200.0.150
10.200.0.150
10.200.0.150
10.200.0.150
10.200.0.150
10.200.0.150
10.200.0.150
10.200.0.150
10.200.0.150
10.200.0.150
10.200.0.150
10.200.0.150
Created
September 5, 2024 at 2:35 PM PDT
September 5, 2024 at 2:35 PM PDT
September 5, 2024 at 2:35 PM PDT
September 5, 2024 at 2:35 PM PDT
September 5, 2024 at 2:35 PM PDT
September 5, 2024 at 2:35 PM PDT
September 5, 2024 at 2:35 PM PDT
September 5, 2024 at 2:35 PM PDT
September 5, 2024 at 2:35 PM PDT
September 5, 2024 at 2:35 PM PDT
September 5, 2024 at 2:35 PM PDT
September 5, 2024 at 2:35 PM PDT
September 5, 2024 at 2:35 PM PDT
September 5, 2024 at 2:35 PM PDT
September 5, 2024 at 2:35 PM PDT
September 5, 2024 at 2:35 PM PDT
September 5, 2024 at 2:35 PM PDT
September 5, 2024 at 2:35 PM PDT
Edit VPN server
Address
Address mask
Listen port
DNS listen address
Optional
Must be a private IPv4 address.
Default client allowed IPs
Optional
One IP prefix per line (CIDRs).
10.0.0.0/8
172.16.0.0/12
WAN
Primary (MC01) WAN1 (AT&T)
WAN failover
If enabled, the VPN will fail over alongside active WAN. If disabled, VPN will remain pinned to the selected WAN and will not fail over.

Improve visibility into your network with read-only access

In addition to our current role based access controls, we’ve introduced a read-only access role. This joins are already established roles, all defined below. 

  • Company admin: permission to view and make changes to all networks operated by your organization
  • Network admin: permission to view and make changes to the network(s) they’ve been granted access to
  • New Network admin read-only: permission to view the network(s) they’ve been granted access to
  • User: no permissions to view anything today
Role
Company admin
Network admin
Network admin (read-only)
User
Receiver
Make changes
View
Make changes
View
Make changes
View
Control
All networks
Select network(s)

Have questions?

If you’re a customer, reach out to your account manager. If not, please contact us here.

Cohesive networks, not patchworks
Built by network engineers

Contact us