You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+2
Original file line number
Diff line number
Diff line change
@@ -218,6 +218,8 @@ This is important because when the radius.meraki.com cert is renewed, if devices
218
218
219
219
**removetemplate.py:** This is script to create a copy of a template-based network that preserves as many of the network's settings as possible, while not relying on a configuration template. The initial focus of the script is converting MX appliance networks.
220
220
221
+
**remoteAccessLogsAnalyzer.py:** This script fetches and analyzes Meraki Secure Connect remote access logs from the Meraki API and generates statistics for selected columns. The results are displayed in a color-coded table, and the data can be saved to a CSV file.
222
+
221
223
**set_client_tracking.py:** A script to set the client tracking method of a group of networks to a desired value.
222
224
223
225
**setlocation.py:** Sets the street address and optionally the map marker of all devices in a network or organization. To be more easily clickable, devices will be placed in a spiral around a seed location. There is an option to preserve marker location for MR access points, to avoid breaking wireless map layout.
This script fetches and analyzes Meraki Secure Connect remote access logs from the Meraki API and generates statistics for selected columns. The results are displayed in a color-coded table, and the data can be saved to a CSV file.
4
+
5
+
## Requirements
6
+
7
+
- Python 3.6+
8
+
-`pandas` library
9
+
-`termcolor` library
10
+
-`requests` library
11
+
12
+
Install required libraries using the following command:
13
+
14
+
```bash
15
+
pip3 install pandas termcolor requests
16
+
```
17
+
18
+
## Usage
19
+
20
+
Run the script from the command line:
21
+
22
+
```bash
23
+
python3 remoteAccessLogsAnalyzer.py
24
+
```
25
+
26
+
You will be prompted to enter your Meraki organization ID, API key, and the desired date range (in epoch time).
27
+
28
+
The script will fetch remote access logs from the Meraki API, parse them, and generate a DataFrame with the following columns:
29
+
30
+
- Timestamp
31
+
- Connect Timestamp
32
+
- Connection Event
33
+
- OS Version
34
+
- AnyConnect Version
35
+
- Internal IP
36
+
- External IP
37
+
38
+
The Connection Event and OS Version columns are color-coded for better readability. "connected" values are displayed in green, while "disconnected" values are displayed in red. Windows OS versions are displayed in yellow, and other OS versions are displayed in blue.
39
+
40
+
The script will also generate statistics for the following columns:
41
+
42
+
- OS Version
43
+
- AnyConnect Version
44
+
- Connection Event
45
+
- Internal IP
46
+
47
+
The generated data can be saved to a CSV file with the creation date in the file name.
-[Cisco Meraki](https://www.meraki.com/) for providing a robust and easy-to-use API
56
+
57
+
Please note that this script is provided "as is" without warranty of any kind, either expressed or implied, including limitation warranties of merchantability, fitness for a particular purpose, and noninfringement. Use at your own risk.
0 commit comments