on 12-29-2023 06:27 AM
The portuguese version of this document can be found at: Cisco Umbrella DNS - Integração com Cisco Meraki MX
The integration of the Meraki network with Cisco Umbrella allows customers connected to Meraki MX (firewall) or Meraki MR (access-point) to obtain all the DNS traffic protection provided by Cisco Umbrella DNS services.
Note: This article will be focused on integrating Cisco Umbrella with Meraki MX.
This integration allows administrators to apply and modify filter rules for different groups of clients by assigning a filtering policy to a group policy or on a specific SSID/Wi-Fi network. Once assigned, all DNS requests from clients included in this policy within the Meraki network will be redirected to Cisco Umbrella, where the traffic sent will be analyzed by policies created in the Cisco Umbrella dashboard.
Even if the network is protected with Cisco Meraki, adding Cisco Umbrella brings an additional layer of protection, such as DNS traffic encryption, protection against eavesdropping and man-in-the-middle attacks, SSL decryption to identify files and malicious traffic, management of all policies for network components from one place on the Umbrella dashboard, among other features. Additionally, with Cisco Umbrella roaming, even if the device is not connected to the corporate LAN, it remains protected against all threats on the Internet.
The integration of Cisco Umbrella with Cisco Meraki MX is the beginning of the transformation and adaptation for the Secure Access Service Edge (SASE) journey, as it integrates an SD-WAN solution with a Cloud Security solution.
For integration between the solutions, it needs to attend the follow requirements:
To check the above requirements, within the Meraki dashboard, navigate to the Organization > Configure > License Info menu , and click on License , and check the type of License applied to the device you want to integrate. In this lab, we see the license applied is MX64-SEC (Advanced Security).
To check the firmware, use the Security & SD-WAN > Monitor > Appliance Status menu, Check Firmware Version at the bottom left side of the page.
Before policies and filters are pushed from Umbrella to the Meraki network, both dashboards must be connected via API key generated from inside Umbrella dashboard.
As a first step towards the integration between Umbrella and Meraki, it is necessary to create an API Key within the Umbrella dashboard. To create the Key and Secret, go to Admin > API Keys > Legacy Keys > Umbrella Network Devices and click on Generate Token .
Once the Key and Secret are generated, copy the text and store it in a safe place.
To add the API Key and secret in the Meraki dashboard, navigate to Network -wide > Configure > General . At the bottom of the page, there is the Cisco Umbrella Account option.
Once you have obtained the API Key and Secret, the next step is to integrate it into the Meraki dashboard. Click on New Credentials , add the key and secret previously created within Umbrella, and click on Save Changes.
After registering the Umbrella API in the Meraki dashboard, it is necessary to create a Group Policy on Meraki to synchronize the Umbrella policy with Meraki.
To create the policy, navigate to the Network-wide > Configure > Group Policies menu , and click Add a group .
Give a name for the policy and in the Firewall and traffic and shaping option, select Custom network firewall & shaping rules. The remaining settings can be left as default. Click Save changes at the bottom of the page.
Note: the other configurations were left default, as it is only being demonstrated how to integrate Meraki with Umbrella, however, depending on the needs of the network, customizations can be applied..
Only after creating the policy it is possible to add the Umbrella policy that will be used in this Group Policy. Therefore, it is necessary to edit the policy that was created minutes ago. Click on the created policy, in this case Umbrella_Policy .
Within the Group policy settings, click on the Enable Umbrella Protection button, a button that was not available when the group policy was created.
When the notification message appears, click Yes. This message is informative saying that Umbrella protection will be activated on the Meraki dashboard. Soon after, it is possible to observe that all policies that are available in Cisco Umbrella will appear within the group policy. In this example, we only have the Default. Click Save Changes at the bottom of the page.
When clicking on Save Changes , return to the Umbrella dashboard in the Deployment > Core Identities > Network Devices menu , and a few minutes later the Meraki device will appear.
Note: In this case, as there are MX (firewall) and MR (access-point) in the Meraki network used for this lab, both appear in Network Devices, however in this article the integration is shown only with the MX, and in another opportunity the integration with MR will be demonstrated.
The Device Status is shown as Offline because traffic from the Meraki network to Umbrella has not yet been generated, which will be demonstrated in the next topic.
Group Policy can be applied in different ways:
To apply the policy, navigate to Security & SD-WAN > Configure > Addressing & VLANs . Go to the Routing option and select the VLAN you want to apply the Group policy, and in Group policy, select the previously created policy. Click Next > Preview > Update , and the Save button at the bottom of the page.
From this moment on, any device that is connected to the VLAN with the Group policy applied will be redirected to Cisco Umbrella and you can see the traffic in the Reporting > Core Reports > Activity Search menu on the Umbrella dashboard.
Also note that in Network Devices, the Appliance MX is already Active, as the Umbrella cloud is receiving traffic from the Meraki MX.
An important point is that in the integration between Meraki MX and Umbrella, which is applied by VLAN, the policies will work properly if the device is connected via a wired network, that is, on a LAN port on the MX itself or on the MS. If the device is connected to the VLAN with the applied group applied, however via Wi-Fi, the traffic will not porpely receive the Umbrella policies enforcement.
For this reason, when using a Wi-Fi network, it is necessary that the group policy is also applied to the SSID, and not just to the VLAN, a topic that will be covered in another article.
If it is necessary that some traffic is not handled by the Umbrella cloud, it is possible to create an exclusion in the Meraki dashboard.
To do this, navigate to Security & SD-WAN > Configure > Threat Protection, and click on Enable Umbrella Protection, click Yes and you are ready. Note that the Default Policy policy is selected and you can now specify domains not to route to Cisco Umbrella, in this case meraki.com.
Note: DNS traffic exclusion is only possible when Umbrella protection is active.
This exclusion aims to prevent traffic from safe/trusted domains from being directed to Umbrella, and thus, the amount of traffic to the Umbrella cloud is reduced. Example of traffic, meraki.com, office365, among others.
Please note that before applying the domain exclusion, traffic is redirected to the Umbrella cloud, after the exclusion, traffic is handled by the local DNS.
Check for this in the Umbrella dashboard on Reporting > Core Reports > Activity.
Therefore, it was demonstrated how to integrate a Meraki MX with the Cisco Umbrella DNS feature.
I hope you enjoyed reading.
Leave your like or kudo.
Thanks!
Jonas Resende
According to your article we need to enable Umbrella protection group policies on the VLAN for wired traffic on the SSID for wireless traffic and for DNS exclusion include the domains in the exclusion list under Threat Protection? All three need to be done, is that correct and have you tested it?
I was under the impression that when you enable Umbrella protection at the Threat Protection level under SD-WAN settings, it enables umbrella protection for the entire Meraki Network, whether wired or wireless and you do no need to assign Group policies to the VLAN or SSID and you can also include DNS exclusions under Threat Protection. Can you please clarify?
@WaqasRaza8704 , after you create the policy, and enable Umbrella protection, you need to select to which VLAN you want to apply that policy. Applying group policy can be done by three ways, on VLAN create in the MX, or Network-connected client or on Wi-Fi network SSID. In this article is demonstrated only on VLAN, directly on MX. In case where you do not have MX in the network, you can apply the policy on SSID directly.
The DNS exclusion is a part of policy configuration, this is used in case you want to create some DNS exclusion, to avoid some domain being handled by Umbrella DNS. If you don't want to have exclusion, all traffic in the VLAN you enabled protection, will be handled on Umbrella cloud.
Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: