Meraki Mx Ssl Vpn



The Meraki MX64 provides unlimited VPN users We love the Cisco Meraki VPN at Telnexus. The MX security appliance is a powerful guardian and gateway between the wild Internet and your private Local Area Network (LAN). Meraki Client VPN uses the Password Authentication Protocol (PAP) to transmit and authenticate credentials. PAP authentication is always transmitted inside an IPsec tunnel between the client device and the MX security appliance using strong encryption. The MX appliances elegantly create a framework for Cisco SD-WAN powered by Meraki by securely auto-provisioning IPsec VPN tunnels between sites. The Meraki dashboard automatically negotiates VPN routes, authentication and encryption protocols, and key exchange for all Meraki MX appliances in an organization to create hub-and-spoke or mesh VPN.

About the connector

Cisco Meraki MX VPN Firewall gives administrators the ability to add firewall rules to restrict the traffic flow through the VPN tunnel for a Cisco Meraki MX Security Appliance.

This document provides information about the Cisco Meraki MX VPN Firewall connector, which facilitates automated interactions, with a service-based URI of Cisco Meraki MX VPN Firewall using FortiSOAR™ playbooks. Add the Cisco Meraki MX VPN Firewall connector as a step in FortiSOAR™ playbooks and perform automated operations, such as retrieving a list of firewall rules for an organization's site-to-site VPN and updating the firewall rules of an organization's site-to-site VPN.

Version information

Connector Version: 1.0.0

Authored By: Fortinet

Certified: No

Installing the connector

From FortiSOAR™ 5.0.0 onwards, use the Connector Store to install the connector. For the detailed procedure to install a connector, click here.
You can also use the yum command to install connectors. Connectors provided by FortiSOAR™ are delivered using a FortiSOAR™ repository. Therefore, you must set up your FortiSOAR™ repository and run the yum command as a root user to install connectors:

yum install cyops-connector-cisco-meraki-mx-vpn-firewall

Prerequisites to configuring the connector

  • You must have the Service-based URI of Cisco Meraki MX VPN Firewall to which you will connect and perform automated operations and the API key configured for your account for using the Cisco Meraki API.
  • To access the FortiSOAR™ UI, ensure that port 443 is open through the firewall for the FortiSOAR™ instance.

Configuring the connector

For the procedure to configure a connector, click here

Configuration parameters

In FortiSOAR™, on the Connectors page, click the Cisco Meraki MX VPN Firewall connector row (if you are in the Grid view on the Connectors page) and in the Configurations tab enter the required configuration details:

ParameterDescription
Server URLService-based URI to which you will connect and perform the automated operations.
API KeyAPI key configured for your account for using the Cisco Meraki API.
Verify SSLSpecifies whether the SSL certificate for the server is to be verified or not.
By default, this option is set as True.

Actions supported by the connector

The following automated operations can be included in playbooks, and you can also use the annotations to access operations from FortiSOAR™ release 4.10.0 and onwards:

FunctionDescriptionAnnotation and Category
Get Organization VPN Firewall RulesRetrieve a list of firewall rules for an organization's site-to-site VPN based on the Organization ID you have specified.get_vpn_firewall_rules
Investigation
Update Organization VPN Firewall RulesUpdates the firewall rules of an organization's site-to-site VPN based on the Organization ID and rules you have specified.update_firewall_rules
Investigation

operation: Get Organization VPN Firewall Rules

Input parameters

ParameterDescription
Organization IDID of the organization for which you want to retrieve the list of MX VPN firewall rules.

Output

The output contains the following populated JSON schema:
{
'policy': ',
'srcCidr': ',
'comment': ',
'srcPort': ',
'destCidr': ',
'destPort': ',
'protocol': ',
'syslogEnabled': '
}

Download

operation: Update Organization VPN Firewall Rules

Meraki Mx64 Ssl Vpn

Input parameters

ParameterDescription
organization IDID of the organization whose VPN firewall rules you want to update.
RulesAn ordered array of the MX VPN firewall rules that you want to update on the specified organization. You require to specify the following parameters:
  • Comment: (Optional) Description of the rule
  • Policy: 'allow' or 'deny' traffic is specified by this rule.
  • Protocol: Type of protocol to be used. Must be 'tcp', 'udp', 'icmp' or 'any'.
  • srcPort: Comma-separated list of source port(s). Value of this parameter must be an integer in the range 1-65535, or 'any'
  • srcCidr: Comma-separated list of source IP address(es). Value of this parameter myst be in IP or CIDR notation, or 'any'.
    Note: FQDN is not supported.
  • destPort: Comma-separated list of destination port(s). Value of this parameter must be an integer in the range 1-65535, or 'any'
  • destCidr: Comma-separated list of destination IP address(es). Value of this parameter myst be in IP or CIDR notation, or 'any'.
    Note: FQDN is not supported.
  • syslogEnabledLog: (Optional) Specify whether this rule applies to syslog. Value of this parameter is a boolean value, i.e., true or false. This is applicable only if syslog has been configured

Harry potter watch online usa. An example of a defined rule: {'rules': [{'comment': 'Allow TCP traffic to subnet with HTTP servers.', 'policy': 'allow', 'protocol': 'tcp', 'destPort': '443', 'destCidr': '192.168.1.0/24', 'srcPort': 'Any', 'srcCidr': 'Any', 'syslogEnabled': false}]}

Output

The output contains the following populated JSON schema:
{
'policy': ',
'srcCidr': ',
'comment': ',
'srcPort': ',
'destCidr': ',
'destPort': ',
'protocol': ',
'syslogEnabled': '
}

Included playbooks

The Sample - Cisco Meraki MX VPN Firewall - 1.0.0 playbook collection comes bundled with the Cisco Meraki MX VPN Firewall connector. These playbooks contain steps using which you can perform all supported actions. You can see bundled playbooks in the Automation > Playbooks section in CyOPsTM after importing the Cisco Meraki MX VPN Firewall connector.

  • Get Organization VPN Firewall Rules
  • Update Organization VPN Firewall Rules

Note: If you are planning to use any of the sample playbooks in your environment, ensure that you clone those playbooks and move them to a different collection since the sample playbook collection gets deleted during the connector upgrade and delete.

Syslog Configuration

A syslog server can be configured to store messages for reporting purposes from MX security appliances, MR access points, and MS switches. The MX Security Appliance supports sending four categories of messages/roles: Event Log, IDS Alerts, URLs, and Flows. MR access points can send the same roles with the exception of IDS alerts. MS switches currently only support Event Log messages.

To begin setting up a Syslog server on the Meraki dashboard, first, navigate to Network-Wide > Configure > General. Here you will see a section for Reporting, with the option for Syslog server configurations. Click on the Add a syslog server link to define a new server. Configure an IP address of your syslog server, the UDP port the server is listening on, and the roles you wish to be reported to the server.

If the Flows role is enabled for Meraki MX reporting, logging for individual firewall rules can be enabled/disabled on the Security appliance > Configure > Firewall page, under the Logging column as shown below:

Additional Considerations for Syslog

Storage Allocation

Syslog messages can take up a large amount of disk space, especially when collecting flows. When deciding on a host to run the syslog server, make sure to have enough storage space on the host to hold the logs. Consult the syslog-ng man page for further information on only keeping logs for a certain amount of time.

Expected Traffic Flow

Meraki Mx Ssl Vpn Free

Syslog traffic may flow to the syslog in one of three scenarios depending on the route type that is used to reach the syslog server. Samsung easy printer manager mac os. Below are example scenarios and a detailing of expected traffic behavior.

Scenario 1 - Reachable via LAN

Ssl Vpn Download

The MX will source traffic from the VLAN interface that the server resides in if the syslog server is located on the LAN of the MX. The transit VLAN interface would be used if the device is only accessible via static route.

Scenario 2 - Reachable via Public Interface

​​​​​​​The MX will source traffic from the public interface (WAN) if the syslog server is accessible via the WAN link.

Scenario 3 - Reachable via AutoVPN

Meraki Mx Ssl Vpn Login

​​​​​​​The MX will source traffic from the interface of the highest VLAN that is participating in AutoVPN if the syslog server is accessible via AutoVPN.

Meraki Vpn Client

If the traffic passes through the site-to-site AutoVPN connection the traffic will then be subject to the 'Site-to-site outbound firewall' rules and as such an allow rule may be required. This can be configured in Security appliance > Configure > Site-to-site VPN > Organization-wide settings > Add a rule as shown below.