Cisco Meraki MX L7 Firewall gives administrators complete control over the users, content, and applications on their network. This connector facilitates automated operations to fetch firewall rules, update the firewall rules etc.
This document provides information about the Cisco Meraki MX L7 Firewall Connector, which facilitates automated interactions, with a Cisco Meraki MX L7 Firewall server using FortiSOAR™ playbooks. Add the Cisco Meraki MX L7 Firewall Connector as a step in FortiSOAR™ playbooks and perform automated operations with Cisco Meraki MX L7 Firewall.
Connector Version: 1.1.0
Authored By: Fortinet
Certified: No
Following enhancements have been made to the Cisco Meraki MX L7 Firewall Connector in version 1.1.0:
Use the Content Hub to install the connector. For the detailed procedure to install a connector, click here.
You can also use the yum command as a root user to install the connector:
yum install cyops-connector-cisco-meraki-mx-l7-firewall
For the procedure to configure a connector, click here
In FortiSOAR™, on the Connectors page, click the Cisco Meraki MX L7 Firewall connector row (if you are in the Grid view on the Connectors page) and in the Configurations tab enter the required configuration details:
| Parameter | Description |
|---|---|
| Server URL | Service based URI to which you will connect and perform the automated operations. |
| API Key | API key configured for your account for using the Cisco Meraki API. |
| Verify SSL | Specifies whether the SSL certificate for the server is to be verified. By default, this option is selected, i.e., set to true. |
The following automated operations can be included in playbooks and you can also use the annotations to access operations:
| Function | Description | Annotation and Category |
|---|---|---|
| Get Network L7 Firewall Rules | Retrieves a list of MX L7 firewall rules for a specific MX network based on the Network ID you have specified. | get_network_firewall_rules Investigation |
| Update Network L7 Firewall Rules | Updates the MX L7 firewall rules for a specific MX network based on the Network ID and rules you have specified. | update_firewall_rules Investigation |
| Get Network L7 Firewall Rules Application Categories | Retrieves the L7 firewall application categories and their associated applications for a specific MX network based on the Network ID you have specified. | get_network_firewall_rules Investigation |
| Parameter | Description |
|---|---|
| Network ID | Specify the ID of the MX network for which to retrieve the list of MX L7 firewall rules. |
The output contains the following populated JSON schema:
{
"rules": [
{
"policy": "",
"type": "",
"value": ""
}
]
}
| Parameter | Description |
|---|---|
| Network ID | Specify the ID of the MX network whose L7 firewall rules are to be updated. |
| Rules | Specify an ordered array of the MX L7 firewall rules to update on the specified MX network. Fox example:
{
"rules": [
{
"policy": "deny",
"type": "application",
"value": {
"id": "meraki:layer7/application/67",
"name": "Xbox LIVE"
}
},
{
"policy": "deny",
"type": "host",
"value": "google.com"
},
{
"policy": "deny",
"type": "blacklistedCountries",
"value": [
"AX",
"CA"
]
}
]
}
|
The output contains the following populated JSON schema:
{
"rules": [
{
"policy": "",
"type": "",
"value": ""
}
]
}
| Parameter | Description |
|---|---|
| Network ID | Specify the ID of the MX network for which to retrieve the L7 firewall application categories and their associated applications. |
The output contains the following populated JSON schema:
[
{
"applicationCategories": [
{
"id": "",
"name": "",
"applications": [
{
"id": "",
"name": ""
}
]
}
]
}
]
The Sample - Cisco Meraki MX L7 Firewall - 1.1.0 playbook collection comes bundled with the Cisco Meraki MX L7 Firewall connector. These playbooks contain steps using which you can perform all supported actions. You can see bundled playbooks in the Automation > Playbooks section in FortiSOAR™ after importing the Cisco Meraki MX L7 Firewall connector.
Note: If you are planning to use any of the sample playbooks in your environment, ensure that you clone those playbooks and move them to a different collection since the sample playbook collection gets deleted during connector upgrade and delete.
Cisco Meraki MX L7 Firewall gives administrators complete control over the users, content, and applications on their network. This connector facilitates automated operations to fetch firewall rules, update the firewall rules etc.
This document provides information about the Cisco Meraki MX L7 Firewall Connector, which facilitates automated interactions, with a Cisco Meraki MX L7 Firewall server using FortiSOAR™ playbooks. Add the Cisco Meraki MX L7 Firewall Connector as a step in FortiSOAR™ playbooks and perform automated operations with Cisco Meraki MX L7 Firewall.
Connector Version: 1.1.0
Authored By: Fortinet
Certified: No
Following enhancements have been made to the Cisco Meraki MX L7 Firewall Connector in version 1.1.0:
Use the Content Hub to install the connector. For the detailed procedure to install a connector, click here.
You can also use the yum command as a root user to install the connector:
yum install cyops-connector-cisco-meraki-mx-l7-firewall
For the procedure to configure a connector, click here
In FortiSOAR™, on the Connectors page, click the Cisco Meraki MX L7 Firewall connector row (if you are in the Grid view on the Connectors page) and in the Configurations tab enter the required configuration details:
| Parameter | Description |
|---|---|
| Server URL | Service based URI to which you will connect and perform the automated operations. |
| API Key | API key configured for your account for using the Cisco Meraki API. |
| Verify SSL | Specifies whether the SSL certificate for the server is to be verified. By default, this option is selected, i.e., set to true. |
The following automated operations can be included in playbooks and you can also use the annotations to access operations:
| Function | Description | Annotation and Category |
|---|---|---|
| Get Network L7 Firewall Rules | Retrieves a list of MX L7 firewall rules for a specific MX network based on the Network ID you have specified. | get_network_firewall_rules Investigation |
| Update Network L7 Firewall Rules | Updates the MX L7 firewall rules for a specific MX network based on the Network ID and rules you have specified. | update_firewall_rules Investigation |
| Get Network L7 Firewall Rules Application Categories | Retrieves the L7 firewall application categories and their associated applications for a specific MX network based on the Network ID you have specified. | get_network_firewall_rules Investigation |
| Parameter | Description |
|---|---|
| Network ID | Specify the ID of the MX network for which to retrieve the list of MX L7 firewall rules. |
The output contains the following populated JSON schema:
{
"rules": [
{
"policy": "",
"type": "",
"value": ""
}
]
}
| Parameter | Description |
|---|---|
| Network ID | Specify the ID of the MX network whose L7 firewall rules are to be updated. |
| Rules | Specify an ordered array of the MX L7 firewall rules to update on the specified MX network. Fox example:
{
"rules": [
{
"policy": "deny",
"type": "application",
"value": {
"id": "meraki:layer7/application/67",
"name": "Xbox LIVE"
}
},
{
"policy": "deny",
"type": "host",
"value": "google.com"
},
{
"policy": "deny",
"type": "blacklistedCountries",
"value": [
"AX",
"CA"
]
}
]
}
|
The output contains the following populated JSON schema:
{
"rules": [
{
"policy": "",
"type": "",
"value": ""
}
]
}
| Parameter | Description |
|---|---|
| Network ID | Specify the ID of the MX network for which to retrieve the L7 firewall application categories and their associated applications. |
The output contains the following populated JSON schema:
[
{
"applicationCategories": [
{
"id": "",
"name": "",
"applications": [
{
"id": "",
"name": ""
}
]
}
]
}
]
The Sample - Cisco Meraki MX L7 Firewall - 1.1.0 playbook collection comes bundled with the Cisco Meraki MX L7 Firewall connector. These playbooks contain steps using which you can perform all supported actions. You can see bundled playbooks in the Automation > Playbooks section in FortiSOAR™ after importing the Cisco Meraki MX L7 Firewall connector.
Note: If you are planning to use any of the sample playbooks in your environment, ensure that you clone those playbooks and move them to a different collection since the sample playbook collection gets deleted during connector upgrade and delete.