Navigate to Integrations
In the CyberCNS portal, navigate to Global Settings() > Integrations and choose Cisco Meraki from the integrations listed.
Next, you will add credentials for your Cisco Meraki firewall.
It will lead to adding credentials for Cisco Meraki Instance. Provide details as requested.
Enter Credentials
Enter Name: Choose a name of your choice for the credentials to be added.
Enter Meraki API Key: Enter the Meraki API key.
Select an associated company: Select the existing company to add the firewall as an asset of that company.
Once all the details are provided, SAVE the data. Likewise, add multiple credentials in this section using the '+' sign.
The next step is to map local companies in CyberCNS to Cisco Meraki companies corresponding to the selected credentials.
Company Mapping
Click on Company Mapping.
Choose Cisco Meraki Credentials ( already saved will appear in the dropdown) from the dropdown and click on + Add to add Company Mapping.
While configuring New Company Mapping, choose the Cisco Meraki Credential of your choice from the dropdown. One of the below two options could be selected:
Import Companies from Meraki:- To import multiple companies from Cisco Meraki into CyberCNS at a time.
Map Existing Company to a Meraki company:- To map an existing company into CyberCNS to the Cisco Meraki company.
To import multiple companies from Cisco Meraki, choose Import Companies from Meraki, and click on Next.
In the below image, the company can be searched using the search option given.
Click on Get Companies to show the list of the integrations as requested in the search column.
Once searched as per the choice or the requirement it displays the search result in the Select Companies dropdown.
In case you want to manually search the company, you can simply click on the drop-down of Cisco Meraki Companies and it will list all companies available under Cisco Meraki.
Once the company is selected, it shows as an option to be deleted if required.
Now click on Finish to import all the selected Cisco Meraki companies. This completes importing companies from Cisco Meraki.
In case the local company is already created into CyberCNS to be mapped with Cisco Meraki company, then select Map Existing Company to Cisco Meraki company and click on Next.
As shown in the below image, select the Local company and Cisco Meraki company by using a dropdown or with the search bar as per the requirement.
Once the company is selected click on Add to choose the company and click on Finish to map all the selected Cisco Meraki companies.
In the below image, selected companies can be seen with details such as Existing Company Name, Company Name, and Mapped Date.
There is an option to Delete the mapping using the Action column. Any mapping can be deleted if needed.
In the Firewalls section, click Firewall Scan to initiate a scan of all the configured firewalls.
When the scan is complete, details of SystemDetails, L3 Fire Wall Rules, Cellular Fire Wall Rules, L7 Fire Wall Rules, Users, Port Forwarding Rules, and Static Routes are populated for the Cisco Meraki Firewall.
Completed firewall scans are listed with timestamps as shown below. To view the results of a scan, click the scan in the list.
The scan results can be downloaded as a report in Microsoft Word .docx format by clicking () Download Report.
Additional Settings under Firewall for allowing access
Allow an IP address based on CyberCNS SaaS hosted region under the organization settings of the firewall if an IP address or IP range sets limited access. Below are the CyberCNS SaaS region IP addresses. Please use the IP address to match the SaaS region from the list.
Region | Originating IP Address on Integration |
USWEST2 | 44.231.123.15 |
EUCENTRAL1 | 35.158.55.215 |
EUWEST2 | 13.41.172.255 |
APSOUTHEAST2 | 54.206.202.191 |
USEAST2 | 3.22.165.174 |
For CyberCNS Self-hosted deployments, please use the IP address of the VM set up for CyberCNS.
Step 1: Go to organization settings under the Firewall settings as shown below:
Step 2: Add the IP address to be allowed access to in the Security > Limit Dashboard or Dashboard API access to these IP Ranges as shown below:
This completes the documentation of Cisco Meraki Integration.
Was this article helpful?
That’s Great!
Thank you for your feedback
Sorry! We couldn't be helpful
Thank you for your feedback
Feedback sent
We appreciate your effort and will try to fix the article