Hello everyone, I'm trying to retrieve information about rogue SSIDs and spoofed devices using the Meraki API, specifically through the Air Marshal feature. In the Meraki Dashboard, I can see detailed information about rogue SSIDs and spoofing events, but when I try to pull this data using the API, I only get a list of general SSIDs categorized as "Other SSIDs" without much detail. Here is the example of Python function I am currently using: import os
import requests
import json
def air_marshal(network_id):
air_marshal_events = []
meraki_api_key = os.getenv('MERAKI_API_KEY')
# Headers for authentication
headers = {
"Authorization": f"Bearer {meraki_api_key}",
"Accept": "application/json"
}
# API call to fetch Air Marshal events for the network
networks_url = f"https://api.meraki.com/api/v1/networks/{network_id}/wireless/airMarshal?timespan=2678400"
response = requests.get(networks_url, headers=headers).json()
print(response)
# Append the events to the list
for r in response:
air_marshal_events.append(r)
# Write the events to a JSON file
with open('meraki_am_events.json', 'w') as json_file:
json.dump(air_marshal_events, json_file, indent=4) Issue: The script successfully retrieves data, but it only shows "Other SSIDs" with limited details and does not include information about rogue SSIDs or spoofed devices. I am unsure how to adjust the API call or the filtering to obtain the detailed rogue and spoof information that I can see in the Meraki Dashboard. Question: How can I modify my script to correctly retrieve rogue SSIDs and spoof information from the Meraki API? Are there specific fields or endpoints I should be focusing on to get the same level of detail that appears in the Dashboard? Any guidance or suggestions would be greatly appreciated. Thank you!
... View more