Getting Started with Cisco Workflows by Boundless

Learn what Boundless modules are, where to find them, and how to install your first workflow.
Written by Boundless
Updated 9 hours ago

What Are Boundless Workflow Modules?

Boundless builds production-ready automation modules that run natively inside Cisco Workflows — the low-code orchestration engine built into the Meraki dashboard. Each module is published on the Cisco Workflows Exchange and can be installed in your environment in minutes.

Unlike generic workflow templates, every Boundless module includes built-in topology discovery, pre-flight validation, and error handling. Changes are only applied after inputs have been verified against your live network state.

Where to Find Them

Boundless modules are available on the Cisco Workflows Exchange, accessible from the Meraki dashboard under Automation → Exchange.

Look for modules authored by Boundless Digital with the Cisco Verified badge.

How to Install a Module

  1. In the Meraki dashboard, navigate to Automation → Exchange
  2. Search for the module by name (e.g., "Meraki VLAN Management by Boundless")
  3. Click on the module to view details, prerequisites, and installation instructions
  4. Click Install to add it to your workspace
  5. Configure your Meraki API target if you haven't already (see Target Setup guide)
  6. Run the workflow from Automation → Workspace → Workflows

What You Need Before You Start

  • A Meraki dashboard account (free accounts work — no Meraki devices or licenses required to access Workflows)
  • Your Organization ID (Dashboard → Organization → Overview → bottom of page)
  • A configured Meraki API target in Workflows
  • The network name where your devices are onboarded

Design Principles

Every Boundless module follows the same safety-first design:

  • Pre-flight validation — Inputs are checked against live network state before any changes
  • Topology discovery — Existing configurations are discovered automatically to prevent conflicts
  • Error handling — Clear messages for risky or invalid operations
  • Idempotent execution — Safe to re-run without causing drift
  • Audit trail — Full traceability of what changed and when

Need Help?

Contact us at workflows@boundlessdigital.com for support, custom workflow development, or to discuss your automation use case.

Did this answer your question?