The Meraki dashboard is amazing, but (at the moment) locating rogue APs and SSIDs is not very user-friendly. The dashboard aggregates BSSIDs under the same SSID making it hard to get an idea for the location of each BSSID.
This script will use the Meraki API to query all rogue BSSIDs on a given Meraki network, and return detailed information for any given BSSID.
- Clone the repo
git clone https://github.com/obrigg/meraki-rogue-investigator.git
- cd into directory
cd meraki-rogue-investigator
- Create the virtual environment in a sub dir in the same directory
python3 -m venv venv
- Start the virtual environment and install requirements.txt from the <fmc_find_nat_rules>
source venv/bin/activate
pip install -r requirements.txt
- Access the Meraki dashboard.
- For access to the API, first enable the API for your organization under Organization > Settings > Dashboard API access.
Once the API key is obtained, you'll need to store the Meraki dashboard API key as an environment variable:
export MERAKI_KEY = <YOUR MERAKI API KEY>
Now you're ready. Good luck!
python run.py
Copyright (c) 2020 Cisco and/or its affiliates.
This software is licensed to you under the terms of the Cisco Sample Code License, Version 1.1 (the "License"). You may obtain a copy of the License at
https://developer.cisco.com/docs/licenses
All use of the material herein must be in accordance with the terms of the License. All rights not expressly granted by the License are reserved. Unless required by applicable law or agreed to separately in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.