This Python script helps you check if your Meraki MX firewalls are configured according to Cisco Meraki's best practice design. The script checks for implementation of the best practices according to the following document: General MX Best Practices
To use this script, you'll need:
- Python 3.x installed on your computer
- A Cisco Meraki account
- API keys for the Meraki Dashboard
- Python Meraki Library
- Clone the repository to your local machine.
- Install the required dependencies
pip install meraki
pip install prettytable
- Open the api_keys_org_ids.txt file and add your Meraki Dashboard API key and organization ID in the following format:
<api_key>,<org_id>
- Run the script using the following command:
python Meraki-Baseline-Security.py
The script will output a table with the following information for each MX firewall in your Meraki organization:
- Organization name
- Network name
- License edition
- Anti-malware status
- Intrusion prevention status
- Spoof protection status
- Open Ports from the Internet
| Organization | Network | License Edition | Anti-Malware | Intrusion Prevention | Spoof Protection | Open Ports |
|---|---|---|---|---|---|---|
| Org A | Org A Net A | Advanced Security | enabled | prevention | block | 80 |
| Org B | Org B Net A | Advanced Security | enabled | prevention | block | 25,443 |
| Org C | Org C Net A | Enterprise | disabled | disabled | log | None |
This script is licensed under the GPL-3.0 License. See the LICENSE file for more information.