Overview
Boundless Audit and Compliance (A&C) is an advanced compliance toolkit that lets you quickly audit your networks against predefined compliance rules.
You can define constraints on settings such as Configuration settings, Security rules and content filters, Naming conventions around networks and devices, and also ensure any Tag compliance to keep your tagging organized.
Follow this article to learn about how the Boundless Audit and Compliance Security tool works.
Prerequisites
- Initial setup
Before using the Boundless Audit and Compliance tool, you must have previously setup your Boundless account and synchronized the Boundless Platform with your Meraki organization.
Using the Audit and Compliance Security Tool
Step 1 | Select your Compliance rule set
On the Network Management Dashboard, tap on the Audit and Compliance section.
Then select what kind of rule set you want to create - in this case it will be a Security rule, but you can choose amongst naming conventions, tags or wider configuration rule sets.
This will open an initial page, where you can find a summary of your previously deployed security rule set, and also create new ones.
Finally, click on the New Rule Set button (on the right side of your screen).
Step 2 | Create a Security rule set
Once you've gone through the first step, you'll get redirected to the Configuration Rule Set template. Here, you'll just need to fill in the fields as per your requirements.
- Rule set name
First of all, enter a name for your rule set.
- Targets
Select the network you'd like to audit. You can either select all networks, or type the name of the networks you'd like to audit.
- Define you configuration rule set
The Audit and Compliance Security template includes all network security parameters available through the Meraki API.
You can choose to define:
- Content filtering parameters
- Security appliance services
- Layer 3 outbound rules
- Cellular failover rules
- Layer 7 firewall rules
- Port forwarding rules
- 1:1 NAT rules
- 1:Many NAT rules
- SSID layer 3 outbound rules
If you want to include configuration parameters other than the Security ones within your rule set, we recommend you to directly create a Configuration rule set instead of a Security one.
- Save your Rule Set
Once you have your Security template ready, click on Save Changes and go back to the initial page.
Step 3 | Run a Compliance audit
Once the Security rule set is created the system will automatically audit your organization and alert you if any network isn't compliant with the new rule set.
The rule sets are a dynamic asset. This means that after deployed, they will continue to audit your Meraki organization and launch an alert when non-compliant changes take place.
When that happens, you can use the Boundless FlexTemplates for rapidly applying the necessary configuration changes to one or more networks.
You can also dismiss selected network alerts by clicking on the trash icon (on the right of the screen) or the dismiss button (included in each individual alert report).