Skip to main content

Cisco Meraki - C2C


The Sumo Logic app for Cisco Meraki - C2C provides real-time insights into the events and helps you to identify potential network events along with admin activities. This app can effectively manage and optimize your network performance, enhance security, and proactively respond to potential threats. The comprehensive insights and monitoring capabilities enable efficient network administration and contribute to a robust and secure network infrastructure.

Key features and benefits of the Cisco Meraki - C2C app include:

  • Comprehensive Organization Insights. Gain valuable insights into your organizational configuration and operations, including API adoption, configuration template usage, and product distribution. Stay updated on the overall organization landscape and monitor key metrics for efficient management and optimization.
  • Real-time Security Monitoring. Monitor network security in real-time with insights on security events, blocked events, threat severity, and infected hosts. Identify potential threats, track attack origins and targets, and take proactive measures to enhance network security.
  • Event Analysis and Trend Identification. Analyze network events based on type, client associations, and SSIDs. Identify event patterns and trends to understand network activity and potential security risks.
  • Client and SSID Monitoring. Monitor your client activity and their association with specific SSIDs. Identify your client's geographical distribution to assess potential risks associated with the specific locations and keep track of your client's behaviour and network usage for effective management.
  • Air Marshal Security Overview. Provide wireless intrusion detection and prevention by monitoring security status and identifying potential vulnerabilities in the network.
  • Enhanced Security Measures. Monitor blocked connections, file scans, and malicious files to ensure a secure network environment. Prioritize your security efforts by identifying top clients and destinations based on security events and take proactive steps to protect the network and mitigate potential threats.
  • Visualization and Reporting. Provides visual representations of network data, making it easy for you to understand and interpret key metrics. Generate reports and share insights with your stakeholders to facilitate decision-making and drive network improvements.

Log types

This app uses Cisco Meraki source to collect the data from Cisco Meraki.

Sample log messages

Sample queries

Total Organizations
_sourceCategory=cm_con2006 licensing
| json "id", "name", "url", "api.enabled", "licensing.model", "", "management.details.[*].name", "management.details.[*].value" as id, name, url, enabled, model, region, management_name, management_value nodrop
| count_distinct(id)
Total Network Logs
_sourceCategory=cm_con2006 organizationId
| json "id", "organizationId", "name", "productTypes", "timeZone", "tags", "enrollmentString", "url", "notes", "isBoundToConfigTemplate" as id, organization_id, name, product_types, time_zone, tags, enrollment_string, url, notes, is_bound_to_config_template nodrop
| count_distinct(id)
Total Events
_sourceCategory=cm_con2006 eventType
| json "ts", "eventType", "clientName", "clientMac", "clientIp", "srcIp", "destIp", "protocol", "uri", "canonicalName", "destinationPort", "fileType", "fileSizeBytes", "disposition", "action", "deviceMac", "priority", "classification", "message", "signature", "ruleId" as date_time, event_type, client_name, client_mac, client_ip, src_ip, dest_ip, protocol, uri, canonical_name, dest_port, file_type, file_size_bytes, disposition, action, device_mac, priority, classification, message, signature, rule_id nodrop
| if(priority matches "1", "High", if(priority matches "2", "Medium", if(priority matches "3", "Low", if (priority matches "4", "Very Low", "-")))) as severity
| where event_type matches "{{event_type}}"
| where client_name matches "{{client_name}}"
| where severity matches "{{severity}}"
| count(event_type)
Network Activity
_sourceCategory=cm_con2006 networkId
| json "occurredAt", "networkId", "type", "description", "category", "clientId", "clientDescription", "clientMac", "deviceSerial", "deviceName", "ssidNumber", "", "eventData.vap", "eventData.client_mac", "eventData.client_ip", "", "eventData.rssi", "eventData.aid" as occurredAt, networkId, type, description, category, clientId, clientDescription, clientMac, deviceSerial, deviceName, ssidNumber, radio, vap, client_mac, client_ip, channel, rssi, aid nodrop
// filters
| where type matches "{{event_type}}"
| count_distinct(networkId)
Total Activities
_sourceCategory=cm_con2006 wiredMacs
| json "ssid", "channels", "firstSeen", "lastSeen", "wiredMacs", "wiredVlans", "wiredLastSeen","bssids[*].bssid","bssids[*].detectedBy[*].device","bssids[*].detectedBy[*].rssi" as ssid, channels, first_seen, last_seen, wired_macs, wired_vlans, wired_last_seen,bssids,devices,rssi_values nodrop
| count

Set up collection

To set up data ingestion for the Cisco Meraki - C2C app, follow the instructions provided at Cisco Meraki Source. These instructions will guide you through the process of creating a source using the Cisco Meraki source category, which you will need to use when installing the app. By following these steps, you can ensure that your Cisco Meraki - C2C app is properly integrated and configured to collect and analyze your Cisco Meraki data.

Installing the Cisco Meraki - C2C app

To install the app, do the following:

  1. From the Sumo Logic navigation, select App Catalog.
  2. In the Search Apps field, search for and then select your app.
    Optionally, you can scroll down to preview the dashboards included with the app.
  3. To install the app, click Install App.
  4. Click Next in the Setup Data section.
  5. In the Configure section of the respective app, complete the following fields.
    1. Key. Select either of these options for the data source.
      • Choose Source Category, and select a source category from the list for Default Value.
      • Choose Custom, and enter a custom metadata field. Insert its value in Default Value.
  6. Click Next. You will be redirected to the Preview & Done section.

Your app will be installed in the Installed Apps folder and dashboard panels will start to fill automatically.

Each panel slowly fills with data matching the time range query and received since the panel was created. Results will not immediately be available, updating with full graphs and charts over time.

Viewing Cisco Meraki - C2C dashboards​

All dashboards have a set of filters that you can apply to the entire dashboard. Use these filters to drill down and examine the data to a granular level.

  • You can change the time range for a dashboard or panel by selecting a predefined interval from a drop-down list, choosing a recently used time range, or specifying custom dates and times. Learn more.
  • You can use template variables to drill down and examine the data on a granular level. For more information, see Filter with template variables.
  • Most Next-Gen apps allow you to provide the scope at the installation time and are comprised of a key (_sourceCategory by default) and a default value for this key. Based on your input, the app dashboards will be parameterized with a dashboard variable, allowing you to change the dataset queried by all panels. This eliminates the need to create multiple copies of the same dashboard with different queries.

Organization Overview

The Cisco Meraki - Organization Overview dashboard provides valuable insights and essential metrics concerning your organizational configuration and operations. It provides a comprehensive understanding of your network through various panels, including Total Organizations, API Enabled Organizations, Organizations by Product Type, and Organizations by Cloud Region, allowing you to stay updated on the overall organization landscape, monitor API adoption, track configuration template usage, and analyze product distribution within the network. Additionally, the dashboard provides insights on Active Admins, Configuration Change Summary, Geo Locations of Top Threats, and Configuration Change Frequency. By leveraging this dashboard, you can efficiently manage and optimize your organization's performance and enhance its security.

Appliance Security Events

The Cisco Meraki - Appliance Security Events dashboard provides real-time insights and important metrics for monitoring network security. It provides a comprehensive view of the security environment through various panels, including Total Events, Blocked Events, Threat Severity, Events by Type, Infected Hosts, Geo Locations of Attack Origins, Geo Locations of Attack Targets, Trend Analysis, Top Clients by Events, Top Destinations by Events, File Scanned, Blocked Connections, and Malicious Files. Analyze events based on the types, track infected hosts, and visualize the geographical locations of attack origins and targets. Utilize trend analysis to identify patterns and potential threats, prioritize security efforts by identifying top clients and destinations based on events, monitor file scans, blocked connections, and malicious files to enhance security. This dashboard enables proactive management of network security and protection against potential threats.

Network Events and Air Marshal

The Cisco Meraki - Network Events and Air Marshal dashboard provides you with a comprehensive overview of network activity, event timelines, and event type breakdown. It offers insights into associated clients and their respective SSIDs, highlighting recent association events. The geo locations of clients are displayed, allowing for easy identification of their geographical distribution. Additionally, this dashboard presents information on the SSID associated with clients and an Air Marshal overview to monitor security. Risky geo locations are highlighted to help you to identify potential threats and vulnerabilities. With these panels, the dashboard offers a holistic view of network performance, event analysis, client activity, and security monitoring.

Privacy Statement
Terms of Use

Copyright © 2024 by Sumo Logic, Inc.