Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Info

CyberCNS can evaluate the security policy of your Cisco Meraki Firewall and flag any potential shortcomings. You can initiate a Firewall Scan from the Integrations menu.

Navigate to Integrations

  1. In the CyberCNS portal, navigate to Global Settings(⚙) > Integrations and choose Cisco Meraki from the integrations listed.

  2. Next, you will add credentials for your Cisco Meraki firewall.

...

  • It will lead to add adding credentials for Cisco Meraki Instance. Provide details as requested.

Enter Credentials

  1. Enter Name: Choose a name of your choice for the credentials to be added.

  2. Enter Meraki API Key: Enter the Meraki API key.

  3. Select an associated company: Select the existing company to add the firewall as an asset of that company.

  • Once all the details are provided, SAVE the data. Likewise, add multiple credentials in this section using the '+' sign.

...

  • To import multiple companies from Cisco Meraki, choose Import Companies from Meraki, and click on Next.

...

  • In the below image, the company can be searched using the search option given.

  • Click on Get Companies to show the list of the integrations as requested in the search column.

  • Once searched as per the choice or the requirement it displays the search result in the Select Companies dropdown.

  • In case you want to manually search the company, you can simply click on the drop-down of Cisco Meraki Companies and it will list all companies available under Cisco Meraki.

  • Once the company is selected, it shows as an option to be deleted if required.

...

  • As shown in the below image, select the Local company and Cisco Meraki company by using a dropdown or with the search bar as per the requirement.

  • Once the company is selected click on Add to select choose the company and click on Finish to map all the selected Cisco Meraki companies.

...

  • In the below image, selected companies can be seen with the details such as Existing Company Name, Company Name, and Mapped Date.

  • There is an option to Delete the mapping using the Action column. Any mapping can be deleted if needed.

...

  • When the scan is complete, details of SystemDetails and AccessRules , L3 Fire Wall Rules, Cellular Fire Wall Rules, L7 Fire Wall Rules, Users, Port Forwarding Rules, and Static Routes are populated for the Cisco Meraki Firewall.

...

  • Completed firewall scans are listed with timestamps as shown below. To view the results of a scan, click the scan in the list.

  • The scan results can be be downloaded as a report in the Microsoft Word .docx format by clicking (⬇) Download Report.

...

Additional Settings under Firewall for allowing access

  • Allow an IP address based on CyberCNS SaaS hosted region under the organization settings of the firewall if an IP address or IP range sets limited access. Below are the CyberCNS SaaS region IP addresses. Please use the IP address to match the SaaS region from the list.

Region

Originating IP Address on Integration

USWEST2

44.231.123.15

EUCENTRAL1

35.158.55.215

EUWEST2

13.41.172.255

APSOUTHEAST2

54.206.202.191

USEAST2

3.22.165.174

  • For CyberCNS Self-hosted deployments, please use the IP address of the VM set up for CyberCNS.

Step 1: Go to organization settings under the Firewall settings as shown below:

...

Step 2: Add the IP address to be allowed access to in the Security > Limit Dashboard or Dashboard API access to these IP Ranges as shown below:

...

  • This completes the documentation of Cisco Meraki Integration.