Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 2 Next »

About the Device

The Cisco Meraki MX is a complete networking and security solution, designed to make distributed networks fast, secure, and easy to manage. The MX is managed entirely through the Cisco Meraki web-based dashboard.

Cisco Meraki MX Security Appliances is ideal for organizations with large numbers of distributed sites. Since the MX is 100% cloud managed, installation and remote management is simple. The MX has a comprehensive suite of network services, eliminating the need for multiple appli­ances. Services include a next-generation firewall, content filtering, web search filtering, SNORT® based intrusion prevention, web caching, WAN optimization, multiple WAN uplinks and 4G failover.

Device Information

 Entity

Particulars

Vendor Name

Cisco

Product Name

Meraki

Type of Device

Hosted/ Hybrid

Collection Method

Log Type

 Ingestion label

Preferred Logging Protocol - Format

Log collection method

Cisco Meraki

CISCO_MERAKI

SYSLOG - Unstructured

CyberHub

Cisco Meraki

CISCO_MERAKI

Prop Vendor API - JSON

CyberHub

Port Requirements

Source

Destination

Port

Cisco Meraki

CyberHub

514 (UDP)

To facilitate secure communication and align with our best practice, we strongly encourage the use of Transport Layer Security (TLS) between your security devices and our Adaptive MxDR platform for event forwarding.

While we understand that TLS support may not be available on all devices, if your devices do support TLS communication, we recommend utilizing port 6514 for seamless integration.

In some cases, the upgraded version of the device might incorporate TLS support without prior notice. If you come across such a scenario or for further assistance in configuring TLS, we kindly ask you to reach out to your dedicated Adaptive MxDR Service Delivery Lead.

Device Configuration

To configure Cisco Meraki MX to collect logs:

  1. Log into Meraki Dashboard.

  2. Navigate to Configure > Alerts & administration.

km.jpg
  1. In Logging, fill below details:

  • Server IP: CyberHub IP Address

  • Port: 514

  • Roles: Select all

km2.jpg
  1. Click Save.

km3.jpg

API Integration

Prerequisite:

  1. If existing devices are not added in the network under organization ID, please follow steps provided in the below guide:https://documentation.meraki.com/General_Administration/Inventory_and_Devices/Adding_and_Removing_Devices_from_Dashboard_Networks

  2. For access to the API, first enable the API for your organization under Organization > Settings > Dashboard API access

image-20220426-094845.png

Device Configuration:

Please follow the below steps to generate the API key:

  1. Login to the Meraki dashboard. Click on the username which is at the right side corner.

image-20240812-122446.png
  1. Click on the My profile.

image-20240812-122522.png
  1. Scroll down to the API access and click on Generate new API key.

image-20240812-122551.png
  1. Copy and store the shown API key as it will be visible only once.

image-20240812-122625.png

  1. In a new browser tab, launch the following URL: https://api.meraki.com/api/v1/organizations.

  2. Copy each "id" value preceding each matching organization's "name" label. And provide all organization ids.

image-20240812-122702.png

Integration Parameters

Parameters required from customer for Integration.

Property

Default Value

Description

IP Address

Cisco Meraki interface IP address

Hostname or IP address of the device which forwards logs to the CyberHub

  • No labels