Skip to content

techmore/Meraki-Security-Baseline

 
 

Repository files navigation

Meraki Security Baseline

This Python script helps you check if your Meraki MX firewalls are configured according to Cisco Meraki's best practice design. The script checks for implementation of the best practices according to the following document: General MX Best Practices

Prerequisites

To use this script, you'll need:

  • Python 3.x installed on your computer
  • A Cisco Meraki account
  • API keys for the Meraki Dashboard
  • Python Meraki Library

Getting Started

  • Clone the repository to your local machine.
  • Install the required dependencies
pip install meraki
pip install prettytable
  • Open the api_keys_org_ids.txt file and add your Meraki Dashboard API key and organization ID in the following format:
<api_key>,<org_id>
  • Run the script using the following command:
python Meraki-Baseline-Security.py

The script will output a table with the following information for each MX firewall in your Meraki organization:

  • Organization name
  • Network name
  • License edition
  • Anti-malware status
  • Intrusion prevention status
  • Spoof protection status
  • Open Ports from the Internet
Organization Network License Edition Anti-Malware Intrusion Prevention Spoof Protection Open Ports
Org A Org A Net A Advanced Security enabled prevention block 80
Org B Org B Net A Advanced Security enabled prevention block 25,443
Org C Org C Net A Enterprise disabled disabled log None

License

This script is licensed under the GPL-3.0 License. See the LICENSE file for more information.

About

Check Meraki MX for best practice security configuration

Resources

License

GPL-3.0, Unknown licenses found

Licenses found

GPL-3.0
LICENSE
Unknown
license.py

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Python 99.3%
  • Shell 0.7%