Welcome to Cisco Meraki Dashboard API Integration

Last Updated: May 12, 2026

Tenable for Cisco Meraki allows you to synchronize your Meraki inventory with Tenable Vulnerability Management. By integrating these platforms, you can ensure comprehensive visibility into your cloud-managed network infrastructure.

This integration uses API keys to establish a secure connection between your Cisco Meraki dashboard and Tenable. Once configured, Tenable automatically imports asset data from your Meraki organizations and networks, allowing you to track vulnerabilities across your distributed environment without manual data entry. Synchronizing your Meraki inventory with Tenable provides a unified view of your attack surface. This ensures that newly added devices in your Meraki environment are automatically accounted for in your vulnerability management workflows, reducing the risk of "shadow IT" and forgotten assets.

This document provides information and steps for integrating Tenable Vulnerability Management or Tenable Nessus with Cisco Meraki Dashboard API. For more information, refer to the following product documentation:

What information does the Cisco Meraki integration collect?

Tenable integration Cisco Meraki integration offers access management support for the following credential types: Cisco Meraki. For this credential type, the integration collects organization name, network name, product type, tag, device name, device model, device serial number, device MAC address, host, port and API keys. The scanner utilizes these values to access Cisco Meraki for collecting information from the target(s) specified in the scan's settings. The integration collects following information:

  • Device IP: IP address of the device

  • Device Type: Types of the device

  • Device Name: The name of the device

  • Device Model: The model of the device

  • Serial Number: The serial number of the device

  • Device MAC: The device MAC address

  • Firmware Version: The firmware version of the device

  • Running Software Version: The running software version of the device

Cisco Meraki integration limitations

  • When using Auto-Discovery, The maximum number of devices that can be imported into Tenable Vulnerability Management in a single scan is 10,000.