# Cisco Meraki

Cisco Meraki integration is based on the [iPSK without RADIUS](https://documentation.meraki.com/MR/Encryption_and_Authentication/IPSK_Authentication_without_RADIUS) feature, with support of [Wi-Fi Personal Network](https://documentation.meraki.com/MR/Encryption_and_Authentication/Wi-Fi_Personal_Network_\(WPN\)) (WPN) capabilities. It also relies on Group Policies to differentiate Tenant services (such as VLAN and bandwidth).&#x20;

{% hint style="info" %}
Cusna relies on iPSK without RADIUS and WPN is supported only on MR devices with 29.4.1+ firmware. However, to benefit form the possibility to manage up to 5,000 iPSK per SSID, you need to use firmware versions **MR 30.1 and newer**.

All APs in your network must be **Wi-Fi 5 Wave 2** (MR20, MR30H, MR33, MR42, MR42E, MR52, MR53, MR53E, MR70, MR74. MR84), **Wi-Fi 6** (MR28, MR36, MR36H, MR44, MR46, MR46E, MR56, MR76, MR78, MR86, MR45/55), **Wi-Fi 6E** (MR57, CW9162I, CW9164I, CW9166I) or newer.
{% endhint %}

## Meraki setup

Each **Location** in Cusna is associated to a **Network** in the Meraki dashboard.&#x20;

1. Create a Network in Meraki as described in the official [Meraki documentation](https://documentation.meraki.com/General_Administration/Organizations_and_Networks/Creating_and_Deleting_Dashboard_Networks).

2. Next, you need to create an SSID configured to support iPSK. Navigate to **Wireless** > **Configure** > **SSIDs**, enable an SSID from the list and rename it with your desired network name, e.g. "*Tenant WiFi" (note: you cannot change the SSID name once you linked it to a Cusn aNetwork)*. Click **Save Changes** at the bottom of the page.

3. On the desired SSID, click "**edit settings**" link to navigate to the **Access Control** page for this SSID.

4. On the Access control Page, Select **Identity PSK without RADIUS** under **Security** and click on **Add an Identity PSK**

5. Configure a name and passphrase; select a group policy.

   \
   ![](/files/mw9IGJUNQi3J1yDDwM8m)

6. Set **Wi-Fi Personal Network (WPN)** to **Enabled**

   \
   ![](/files/sQ1WEGhXeDYBcXanUtYI)\
   \
   \&#xNAN;*Note: The "Enabled/Disabled WPN" option is only displayed when at least one iPS group is configured.*

7. Click **Save changes** on the bottom of the page.

<details>

<summary>IoT SSID - optional</summary>

If you need to support [IoT Devices Authentication](/service-management/wifi-portal-and-onboarding/iot-devices-authentication.md) via MAC authentication, you need to add an additional dedicated SSID in each of the Networks configured for the service.

1. Navigate to **Wireless** > **Configure** > **SSIDs**, enable an SSID from the list and rename it with your desired network name, e.g. "*IoT Devices*". Click **Save Changes** at the bottom of the page.
2. On the above SSID, click "**edit settings**" link to navigate to the **Access Control** page for this SSID.
3. On the Access Control page, select **Identity PSK without RADIUS** under **Security** \
   ![](/files/GWbunrfpy5FafzbQDSKN)
4. Select "None (direct Access)" in the Splash Page section\
   ![](/files/UsloW154G2cQ9NHFSB9R)
5. Finally, expand the **RADIUS** section and add Primary and Secondary RADIUS data for both the **RADIUS servers** and **RADIUS Accounting servers** sections.\
   The RADIUS data (IP addresses, Ports and Secrets are delivered as part of your onboarding email).<br>

   <figure><img src="/files/WZkNhbJkopAtqPp7ryPU" alt=""><figcaption></figcaption></figure>

</details>

## Cusna setup

{% hint style="info" %}
Check the guide for the [integration using oAuth](/wifi-integration/summary-of-supported-wifi-vendors/cisco-meraki/meraki-oauth-integration.md)
{% endhint %}

To connect Cusna to your Meraki account, you need to generate an API Key in your Meraki account:

1. Navigate to **Organizations** > **Settings**.
2. Ensure the option **Enable access to the Cisco Meraki Dashboard API** is **enabled**.
3. Navigate to your profile by clicking your account email address in the upper-right > **My profile** to generate the API key.
4. Save this key in a secure location as it represents your admin credentials.

Once the key is generated from the Cisco Meraki dashboard:

* Log in to your Cusna account and click **Setting**.&#x20;
* Expand the **WiFi setup** card, select **Meraki** and enter your **API Key.**&#x20;
* The Organization menu will load the list of Meraki Organizations enabled on your API Kay; select the Organization that you want to link to your Cusna account.&#x20;
* Click **Save**.

<figure><img src="/files/qVLLfSrYzI84jf5hSjgm" alt=""><figcaption></figcaption></figure>

Next, you need to setup at least one **Network Policy**.  Once you have set up the Meraki integration, the **Network Policy** section appears.

{% content-ref url="/pages/Xwf29ezjdhAgu9OvXO59" %}
[Network Policies](/service-management/network-policies.md)
{% endcontent-ref %}

{% hint style="info" %}
When using Meraki, Cusna does not allwo to manually or automatically set the VLAN on the individual tenant, since the VLAN is handled by the assigned Group Policy.
{% endhint %}

## Operating Cusna

### Creating Networks

When you create or edit a Property in the Cusna dashboard, in the WiFi configuration section, you have to pick the **Network** and **SSID** related to the Network and the Network Policy you want to assign by default to the new tenant accounts (you can select a custom Network Policy while creating a new Tenant)

![](/files/Dgid68R9lkllRSrpisfb)

Note: when selecting the SSID, Cusna verifies in real-time if the SSID is properly configured with work with iPSK without RADIUS and the other settings required by Cusna. If not compliant, you'll see a notification message. You can still select the SSID and save the Network and fix the SSID configuration later or.

<div align="left"><figure><img src="/files/iwDCRE3gdoZa4uyBPe5N" alt="" width="375"><figcaption></figcaption></figure></div>

### Managing Units

Meraki support Cusna Units management, where each unit can be associated with a Wired access point. Cusna configure the ETH ports to be in the same personal area network as the device connecting with the iPSK of the Account associated to the Unit.

{% hint style="info" %}
This feature is currently supported only on MR36H
{% endhint %}

{% content-ref url="/pages/y1n7wDDQiX9JxZy76QDh" %}
[Units](/service-management/units.md)
{% endcontent-ref %}

### Creating Accounts

When you create a new Account, a new iPSK user will be created in your Meraki account with a predefined WiFi Passphrase.&#x20;

In the Account setup page, you need to chose a **Network Policy** to assign to the user in the related menu. Select "**Default**" to assign the Network Policy that has been selected as the default one for the Network where you are activating the Account

![](/files/VSwC3RNZTocYjy9XveZc)

The Account of type Tenant and Visitors receive an activation email with the default passphrase and QR code, and a link to the Tenant Portal where can change the passphrase.

{% hint style="danger" %}
To avoid synchronization problems, please do not manage manually the iPSKs in the Meraki dashboard.
{% endhint %}

## Meraki WPN Limitations

* 5,000 iPSK groups per SSID and 2x SSIDs with WPN enabled per dashboard network are supported.
* Wireless devices connected to a WPN-enabled SSID *cannot* communicate with wired devices on the *same* VLAN (L2 domain) except for the default gateway.&#x20;
* Wireless devices connected to a WPN-enabled SSID *can* communicate with wired devices on a *different* VLAN through L3 routing.
* **Meraki AP assigned (NAT mode)** is not supported on an SSID with WPN enabled. **External DHCP server assigned** mode must be used instead.
* Wired AP ports using [port profiles](https://documentation.meraki.com/MR/Client_Addressing_and_Bridging/Port_Profiles) do not support WPN.


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://docs.cusna.io/wifi-integration/summary-of-supported-wifi-vendors/cisco-meraki.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
