Cisco Meraki (syslog)

Configure the Cisco Meraki syslog data connector.

Overview

Cisco Meraki is a suite of internet-managed network solutions that enables a single source of management over locations, infrastructure, and devices.

In this guide, you’ll complete the following steps:

Prerequisites

  • Admin access to the Cisco Meraki Dashboard

Add the data connector in Radiant Security

1.   Log in to Radiant Security.    
2.   From the navigation menu, click Settings > Data Connectors and click + Add Connector.    

3.   Search for and select the Cisco Meraki option from the list and then click Data Feeds.



 

Screenshot 2024-04-26 at 15.49.59

 

 

4.   Under Select your data feeds, select Cisco Meraki and click Credentials.

Screenshot 2024-04-26 at 15.50.38

 

 

5.   Under Credential Name, give the credential an identifiable name (e.g. Cisco Meraki Credentials).

 

 

6.   Under Required Credentials, in the Connector tag field enter a value. This value will act as the salt to randomize the unique Token you’ll download in the next step.

Screenshot 2024-04-26 at 15.51.47

 

 

7.   Click Add Connector.

 

 

8.   Copy and save the connector Token value using the clipboard option or download the Token file. You will need this token to complete the configuration.

Screenshot 2024-04-26 at 15.54.58

 

 

9.   Click Done to save your changes.

 

 

Configure a local Radiant Security Syslog Collector

Refer to the Deploy a Radiant Security Syslog Collector guide to set up a local Radiant Syslog Collector.

Configure Cisco Meraki to forward logs to the Radiant Security Log Collector

  1. Log into Cisco Meraki Dashboard.

  2. Navigate to Network-Wide > Configure > General.

  3. On the Reporting section, click Add a syslog server.

  4. Enter the Server IP and Port of the Radiant Security Syslog Collector.

    Untitled

  5. On Roles, select URL, Flows and Security Events.

  6. Navigate to Security & SD-WAN > Configure > Firewall.

  7. Under Logging, from the drop-down menu select Enabled for each firewall rule to allow the device to register the network connections.Untitled(1)

We value your opinion. Did you find this article helpful? Share your thoughts by clicking here or reach to our Product and Customer Success teams at support@radiantsecurity.ai 

 

Last updated: 2024-08-23