Version 1.10.0 to 1.11.0

[ networks ]

Return the alert configuration for this network

GET /networks/{networkId}/alerts/settings

- Response property httpServerIds value added

- Response property httpServerIds value added


List the clients that have used this network in the timespan

GET /networks/{networkId}/clients

- Optional param statuses added

- Optional param ip added

- Optional param ip6 added

- Optional param ip6Local added

- Optional param mac added

- Optional param os added

- Description added: [object Object]

- Optional param recentDeviceConnections added

- Response property deviceTypePrediction value added


Return the settings for a network

GET /networks/{networkId}/settings

- Response property fips value added


[ sm ]

List the owners in an SM network with various specified fields and filters

GET /networks/{networkId}/sm/users

- Response property azureAdGroups value added


[ wireless ]

List the MR SSIDs in a network

GET /networks/{networkId}/wireless/ssids

- Response property openRoamingCertificateId value added


Return a single MR SSID

GET /networks/{networkId}/wireless/ssids/{number}

- Response property openRoamingCertificateId value added


Update the attributes of an MR SSID

PUT /networks/{networkId}/wireless/ssids/{number}

- Optional property radsecEnabled Added

- Optional property radsecEnabled Added


PATH /networks/{networkId}/wireless/ssids/{number}/eapOverride

- Path added

- New operation

Return the EAP overridden parameters for an SSID

GET /networks/{networkId}/wireless/ssids/{number}/eapOverride

{
    "eap_timeout_override": false,
    "eap_initial_timeout": 5,
    "eap_max_retries_override": false,
    "eap_max_retries": 5,
    "eap_identity_timeout_override": false,
    "eap_identity_timeout": 5,
    "eap_identity_retries_override": false,
    "eap_identity_retries": 5,
    "eapol_key_timeout_override": false,
    "eapol_key_timeout": 500,
    "eapol_key_retries_override": false,
    "eapol_key_retries": 4
}

- New operation

Update the EAP overridden parameters for an SSID.

PUT /networks/{networkId}/wireless/ssids/{number}/eapOverride

{
    "eap_timeout_override": false,
    "eap_initial_timeout": 5,
    "eap_max_retries_override": false,
    "eap_max_retries": 5,
    "eap_identity_timeout_override": false,
    "eap_identity_timeout": 5,
    "eap_identity_retries_override": false,
    "eap_identity_retries": 5,
    "eapol_key_timeout_override": false,
    "eapol_key_timeout": 500,
    "eapol_key_retries_override": false,
    "eapol_key_retries": 4
}


PATH /networks/{networkId}/wireless/ssids/{number}/hotspot20

- Path added

- New operation

Return the Hotspot 2.0 settings for an SSID

GET /networks/{networkId}/wireless/ssids/{number}/hotspot20

{
    "enabled": true,
    "operator": {
        "name": "Meraki Product Management"
    },
    "venue": {
        "name": "SF Branch",
        "type": "Unspecified Assembly"
    },
    "networkAccessType": "Private network",
    "domains": [
        "meraki.local",
        "domain2.com"
    ],
    "roamConsortOis": [
        "ABC123",
        "456EFG"
    ],
    "mccMncs": [
        {
            "mcc": "123",
            "mnc": "456"
        },
        {
            "mcc": "563",
            "mnc": "232"
        }
    ],
    "naiRealms": [
        {
            "format": 1,
            "name": "Realm 1",
            "methods": [
                {
                    "id": "1",
                    "authenticationTypes": {
                        "nonEapInnerAuthentication": [
                            "MSCHAP"
                        ],
                        "eapInnerAuthentication": [
                            "EAP-TTLS with MSCHAPv2"
                        ],
                        "credentials": [],
                        "tunneledEapMethodCredentials": []
                    }
                }
            ]
        }
    ]
}

- New operation

Update the Hotspot 2.0 settings of an SSID

PUT /networks/{networkId}/wireless/ssids/{number}/hotspot20

{
    "enabled": true,
    "operator": {
        "name": "Meraki Product Management"
    },
    "venue": {
        "name": "SF Branch",
        "type": "Unspecified Assembly"
    },
    "networkAccessType": "Private network",
    "domains": [
        "meraki.local",
        "domain2.com"
    ],
    "roamConsortOis": [
        "ABC123",
        "456EFG"
    ],
    "mccMncs": [
        {
            "mcc": "123",
            "mnc": "456"
        },
        {
            "mcc": "563",
            "mnc": "232"
        }
    ],
    "naiRealms": [
        {
            "format": 1,
            "name": "Realm 1",
            "methods": [
                {
                    "id": "1",
                    "authenticationTypes": {
                        "nonEapInnerAuthentication": [
                            "MSCHAP"
                        ],
                        "eapInnerAuthentication": [
                            "EAP-TTLS with MSCHAPv2"
                        ],
                        "credentials": [],
                        "tunneledEapMethodCredentials": []
                    }
                }
            ]
        }
    ]
}


[ organizations ]

PATH /organizations/{organizationId}/adaptivePolicy/acls

- Path added

- New operation

List adaptive policy ACLs in a organization

GET /organizations/{organizationId}/adaptivePolicy/acls

[
    {
        "aclId": 12345678,
        "name": "Block sensitive web traffic",
        "description": "Blocks sensitive web traffic",
        "ipVersion": "ipv6",
        "rules": [
            {
                "policy": "deny",
                "protocol": "tcp",
                "srcPort": "1,33",
                "dstPort": "22-30"
            },
            {
                "policy": "allow",
                "protocol": "any",
                "srcPort": "any",
                "dstPort": "any"
            }
        ],
        "createdAt": "2021-05-19T17:08:25Z",
        "updatedAt": "2021-05-19T17:11:54Z"
    }
]

- New operation

Creates new adaptive policy ACL

POST /organizations/{organizationId}/adaptivePolicy/acls

{
    "name": "Block sensitive web traffic",
    "description": "Blocks sensitive web traffic",
    "ipVersion": "ipv6",
    "rules": [
        {
            "policy": "deny",
            "protocol": "tcp",
            "srcPort": "1,33",
            "dstPort": "22-30"
        },
        {
            "policy": "allow",
            "protocol": "any",
            "srcPort": "any",
            "dstPort": "any"
        }
    ],
    "id": 123,
    "createdAt": "2021-05-19T17:08:25Z",
    "updatedAt": "2021-05-19T17:11:54Z"
}


PATH /organizations/{organizationId}/adaptivePolicy/acls/{id}

- Path added

- New operation

Returns the adaptive policy ACL information

GET /organizations/{organizationId}/adaptivePolicy/acls/{id}

{
    "aclId": 12345678,
    "name": "Block sensitive web traffic",
    "description": "Blocks sensitive web traffic",
    "ipVersion": "ipv6",
    "rules": [
        {
            "policy": "deny",
            "protocol": "tcp",
            "srcPort": "1,33",
            "dstPort": "22-30"
        },
        {
            "policy": "allow",
            "protocol": "any",
            "srcPort": "any",
            "dstPort": "any"
        }
    ],
    "createdAt": "2021-05-19T17:08:25Z",
    "updatedAt": "2021-05-19T17:11:54Z"
}

- New operation

Updates an adaptive policy ACL

PUT /organizations/{organizationId}/adaptivePolicy/acls/{id}

{
    "name": "Block sensitive web traffic",
    "description": "Blocks sensitive web traffic",
    "ipVersion": "ipv6",
    "rules": [
        {
            "policy": "deny",
            "protocol": "tcp",
            "srcPort": "1,33",
            "dstPort": "22-30"
        },
        {
            "policy": "allow",
            "protocol": "any",
            "srcPort": "any",
            "dstPort": "any"
        }
    ],
    "id": 123,
    "createdAt": "2021-05-19T17:08:25Z",
    "updatedAt": "2021-05-19T17:11:54Z"
}

- New operation

Deletes the specified adaptive policy ACL. Note this adaptive policy ACL will also be removed from policies using it.

DELETE /organizations/{organizationId}/adaptivePolicy/acls/{id}



PATH /organizations/{organizationId}/adaptivePolicy/settings

- Path added

- New operation

Returns global adaptive policy settings in an organization

GET /organizations/{organizationId}/adaptivePolicy/settings

{
    "enabledNetworks": [
        "L_11111111",
        "L_22222222",
        "N_33333333",
        "L_44444444"
    ]
}

- New operation

Update global adaptive policy settings

PUT /organizations/{organizationId}/adaptivePolicy/settings

{
    "enabledNetworks": [
        "L_11111111",
        "L_22222222",
        "N_33333333",
        "L_44444444"
    ]
}


[ Global ]

PATH /networks/{network_id}/insight/applications/{application_id}/healthByTime

- renamed to /networks/{networkId}/insight/applications/{applicationId}/healthByTime


PATH /organizations/{organization_id}/insight/applications

- renamed to /organizations/{organizationId}/insight/applications