Cisco Meraki Device Discovery

Overview

This feature allows you to discover Cisco Meraki devices and run vulnerability scans on them. This will use the Meraki ReST API to connect with your Meraki cloud and fetch device information including device models and firmware version.

Pre-requisites

Access to the Cisco Meraki ReST API is required through an active subscription and an API key with the required privileges.

The API endpoints that are currently accessed by this integration are:

https://api.meraki.com/api/v1/organizations

https://api.meraki.com/api/v1/organizations/<org id>/networks

https://api.meraki.com/api/v1/organizations/<org id>/devices

https://api.meraki.com/api/v1/organizations/<network id>/firmwareUpgrades

Please make sure the API key has access to the above endpoints. The API key can be obtained by following the steps here.

The base url is optional and defaults to https://api.meraki.com/api/v1. However you may override it as part of the –base_url command line option.

Steps involved

Run the twigs command as follows to connect to Cisco Meraki cloud console and discover the asset inventory:

twigs meraki [--base_url YOUR_MERAK_CLOUD_API_URL] --api_key MERAKI_REST_API_KEY

Once the discovery is complete, all relevant Meraki managed devices will be visible in the ThreatWorx console and an automated vulnerability scan will be initiated for these devices.