Feature Overview
The Meraki Device Integration for Secure Access enables organizations to seamlessly use Meraki network devices as traffic sources within their Cisco Secure Access environment. This feature supports both new customers and those migrating from Umbrella DNS or Secure Internet Gateway (SIG), simplifying the integration of Meraki devices with Secure Access policies.
Note: the enforcement for this traffic only takes place at the DNS level, as it did in Umbrella previously and now again in Secure Access.
Key Benefits / Value Delivered
-
Effortless Integration: No changes or upgrades are required for existing Meraki hardware or software, enabling a frictionless transition.
-
Seamless Migration: Organizations moving from Umbrella DNS or SIG can continue leveraging their existing Meraki devices as policy traffic sources, preserving prior investments and minimizing operational disruption.
-
Streamlined Policy Management: Administrators can apply Secure Access policies directly to Meraki devices through the Secure Access dashboard, ensuring consistent security controls across the network.
-
Simplified Onboarding: Easy setup using API keys allows for quick registration and configuration of devices in just a few steps.
-
To begin using Meraki devices with Secure Access:
-
Generate an API key in the Secure Access dashboard if required.
-
Assign the API key to each Meraki device intended for integration.
-
Register the devices within Secure Access.
-
Apply the desired policy rules to each device or device group as appropriate. By default, devices send traffic with the default policy for unspecified traffic.
-
Access the Meraki Device Integration feature via the Secure Access dashboard under the network device management section.
Documentation and Resources
-
For customers migrating from Umbrella to Secure Access, utilize the “Traffic Switcher” to migrate existing Meraki devices from Umbrella deployments to Secure Access with minimal downtime.
-
After device registration, ensure that security policies are tailored for each device or group to maximize protection and compliance.
-
Regularly review and update policy assignments as your network evolves to maintain optimal security.
This feature is now Generally Available—empowering your organization to leverage Meraki devices within the Cisco Secure Access ecosystem for streamlined policy enforcement and seamless migration. For further details, refer to the documentation links above or contact your Cisco representative.