A powerful Model Context Protocol (MCP) server that provides dynamic access to the entire Meraki Dashboard API plus advanced compliance and security auditing capabilities. Instead of creating hundreds of individual tools, Selent MCP uses intelligent discovery to find and execute any Meraki API endpoint on demand.
- Universal Access: Query any of 400+ Meraki API endpoints without pre-defined tools
- Single-Call Optimization: Common queries (organizations, device status, etc.) found instantly
- Intelligent Search: Natural language queries to find relevant endpoints
- Parameter Discovery: Automatic detection of required and optional parameters
- Smart Validation: Generic parameter validation with helpful error messages
- Multi-Framework Support: PCI DSS, HIPAA, SOC2, ISO 27001, NIST Cybersecurity Framework
- Automated Compliance Scanning: Comprehensive security assessments across your entire Meraki organization
- Critical Finding Detection: Identifies security gaps and compliance violations
- Actionable Recommendations: Specific remediation steps for each finding
- Detailed Reporting: Executive summaries and technical details for compliance documentation
- Organization Backup: Create complete backups of your Meraki organization
- Component Restore: Restore individual devices or networks from backups
- Status Monitoring: Real-time progress tracking for backup and restore operations
- Error Handling: Comprehensive error reporting and recovery guidance
- Network Topology Analysis: Comprehensive device relationships and connections
- Device Health Monitoring: Performance metrics and diagnostics
- Security Auditing: Network-wide security assessments
- Performance Analytics: Bottleneck identification and optimization recommendations
- Configuration Drift Detection: Identify inconsistencies across networks
Note: Advanced features (backup/restore, compliance auditing) require a Selent API key. Contact Selent to obtain access.
- Docker installed and running
- Meraki Dashboard API key (Get one here)
- Selent API key (optional, required for advanced features - contact Selent)
Option A: Use Public Docker Image (Recommended)
# Set your API keys
export MERAKI_API_KEY="your_meraki_api_key_here"
export SELENT_API_KEY="your_selent_api_key_here" # Optional, for advanced features
# Run directly from Docker Hub (always pulls latest)
docker run \
--pull=always \
-e MERAKI_API_KEY=$MERAKI_API_KEY \
-e SELENT_API_KEY=$SELENT_API_KEY \
-i --rm selentai/selent-mcp:latest
Option B: Build from Source
# Clone the repository
git clone <repository-url>
cd selent-mcp
# Set your API keys
export MERAKI_API_KEY="your_meraki_api_key_here"
export SELENT_API_KEY="your_selent_api_key_here" # Optional, for backup/restore
# Start the server
docker-compose up -d
Update your Claude Desktop configuration file:
Location: ~/Library/Application Support/Claude/claude_desktop_config.json
(macOS)
{
"mcpServers": {
"Selent MCP": {
"command": "docker",
"args": [
"run",
"-i",
"--rm",
"--pull=always",
"-e",
"MERAKI_API_KEY=your_meraki_api_key_here",
"-e",
"SELENT_API_KEY=your_selent_api_key_here",
"selentai/selent-mcp:latest"
]
}
}
}
Restart Claude Desktop to load the new MCP server.
Once Claude Desktop restarts, test your setup:
# Test basic API access
"What Meraki organizations do I have access to?"
# Test compliance tools (requires Selent API key)
"What compliance types are available?"
# Test a compliance scan (requires Selent API key)
"Run a PCI compliance test"
The --pull=always
flag ensures you automatically get the latest features and security updates without manual intervention.
# Get device information
"Get device Q4AB-WMAB-TAZU configuration for port number 4"
# List organizations
"Show me all my Meraki organizations"
# Get network clients
"List all clients in network N_12345"
# Firewall rules
"Get MX firewall rules for device Q2KN-Q6GH-CREQ"
# Get available compliance frameworks
"What compliance types are available?"
# Run PCI DSS compliance test
"Run PCI compliance test on my organization"
# Test SOC2 compliance
"Perform SOC2 compliance audit"
# NIST Cybersecurity Framework assessment
"Run NIST compliance check"
# Create organization backup
"Create a backup of my entire Meraki organization"
# Check backup status
"What's the status of backup abc123?"
# Restore a device
"Restore device Q2XX-XXXX-XXXX from backup abc123"
# Restore a network
"Restore network L_123456789 from backup abc123"
# Network topology analysis
"Analyze the topology of network N_12345"
# Device health check
"Check the health of device Q2XX-XXXX-XXXX"
# Security audit
"Perform security audit on network N_12345"
# Performance analysis
"Analyze performance of network N_12345"
# Check status
docker ps --filter name=selent-mcp-server
# View logs
docker logs -f selent-mcp-server
# Restart
docker-compose restart
# Stop
docker-compose down
# Rebuild and restart
docker-compose up -d --build
search_meraki_api_endpoints
- Find API endpoints using natural languageexecute_meraki_api_endpoint
- Execute any Meraki API callget_meraki_endpoint_parameters
- Get parameter requirements for endpoints
β
No Manual Tool Creation: Access 400+ endpoints without writing individual tools
β
Single-Call Efficiency: Common queries resolved instantly without multiple searches
β
Intelligent Discovery: Natural language queries find the right endpoints
β
Always Up-to-Date: Uses live Meraki API, automatically includes new endpoints
β
Production Ready: Docker deployment for consistency across environments
β
Multi-User Support: Scale across teams with individual API keys
β
Performance Optimized: Caching, error handling, and smart parameter validation
β
Compliance Ready: Built-in support for PCI DSS, HIPAA, SOC2, ISO 27001, NIST
β
Auto-Updates: --pull=always
ensures latest features and security patches
β
Enterprise Features: Backup/restore, security auditing, performance analytics
Variable | Required | Description |
---|---|---|
MERAKI_API_KEY |
Yes | Your Meraki Dashboard API key |
SELENT_API_KEY |
Optional | Your Selent API key (required for advanced features) |
- Never commit API keys to version control
- Use environment variables or secure secret management
- Scan Docker images for vulnerabilities in production
- Set appropriate resource limits for containers
- Use secure networks in production deployments