This article details steps to import your Meraki networks into Cloudi-Fi and enable splash page directly in your Meraki MR/MX.


  • Meraki API enablement, 

  • Use Cloudi-Fi wizard to import any existing Meraki network,

  • Configure Meraki SSID and Splash page manually (optional)

1) Enable API access to Meraki portal

Go to Meraki administration page, go to Organization > Settings Menu, 

Tick the box « Enable access to the Cisco Meraki Dashboard API and save changes.

2) Generate the API Key

Edit your profile and scroll down to the « API access » section.

Click on Generate a new API key and save it on your workstation.

Tick the box to confirm that you saved the key and click on Done.

3) Import the API key In Cloudi-Fi portal

Go to Cloudi-Fi administration UI > Settings > Integrations > Select "Meraki" in the integration list

From the Meraki integration screen, create a new Activation by clicking on "Enable this activation" button.

As of today, only Automatic synchronization mode is available. A manual mode will be added for companies which don't want to share an API key. Click on Automatic to continue.

  • ( 1 ) Select Meraki cloud ( World or China )

  • ( 2 ) Paste the API key generated on the Meraki portal

It could be useful to create multiple activation if you have devices connected to different Meraki Clouds.

4) Run the wizard to configure your Cloudi-Fi locations

The wizard is used to automatically import Meraki networks. They will be available as Cloudi-Fi locations.

  • Click on connect to start the synchronization process.

  • The wizard will directly retrieve networks and devices details from Meraki.

  • Define the synchronization target on the following screen by choosing the device type to import ( MX / MR )

  • Restrict synchronized Networks or Devices by selecting Networks or Tags to sync in the Scan section

  • The last step allows you to enable Cloudi-Fi on a chosen SSID. If you don't want to let Cloudi-Fi change your Meraki configuration you can select "Manual" in order to get information required to setup your Meraki Splash page / ACLs with Cloudi-Fi.

5) Verify Cloudi-Fi locations creation

Verify that Meraki networks are successfully imported as Cloudi-Fi locations in the LOCATIONS menu :

If you edit the location, you can see that the Wizard has automatically imported the MAC-addresses of the Meraki devices. This parameter is used to identify the location.

6) Create the Guest SSID ( optional / when Manual SSID configuration is selected )

Note that menus are differents between MR and MX devices 

For MX devices, go to Security & SD-WAN > Wireless settings

Enable an available SSID, fill a name and choose Security : Open

For MR devices, go to Wireless > SSIDs

Enable an available SSID, fill a name and save changes.

Then go to Wireless > Acces control  and select "Open (no encryption)" in Association requirements
And select "Click-through" method for the Splash page

You also have to authorize unauthenticated users to access to "" domain in order to allow them to access to the Cloudi-Fi captive portal.
For MX devices, go to Security & SD-WAN > Access control
For MR devices, go to Wireless > Access control

In the Walled garden ranges, add *

Depending the authentification methods you have enabled on your captive portal, you may have to add additional domains in the Walled garden ranges.
Cloudi-Fi support will provide you the needed extra domains.

For MR and MX: Configure how WiFi clients will retrieve an IP:

This settings depends of your network architecture, for instance if you already have a DHCP server and dedicated DHCP range for Guest users.

For an easy deployement, we recommand to use the "NAT mode" option.
The Access-Point will act as DHCP server and all WiFi client will be see outside of the wireless network with the Access Point LAN IP.


7) Configure the Splash page in Meraki administration

On the Meraki Portal,
For MX devices, go to Security & SD-WAN > Splash page
For MR devices, go to Wireless > Splash page

Choose to use a Custom splash URL and fill the Cloudi-Fi URL

8) Prevent Guest users to access your internals networks

Go to Wireless > Firewall & Traffic Shaping > Select your SSID

And modify the existing rule in order to deny Guest users to access private IP ranges.


Did this answer your question?