Cisco Meraki Dashboard Access vs API Access Explained
When configuring Cisco Meraki monitors in Site24x7, the API endpoint used determines whether the request is treated as API access or Dashboard access. If the incorrect allowlist is configured, API requests may fail even though authentication details are valid.
This article explains the difference and how to correct the configuration.
Understanding the difference between Dashboard Access and API Access
In Cisco Meraki environments, IP allowlisting is typically separated into two categories:
Dashboard Access
If the endpoint is configured as a dashboard node (such as n123.meraki.com):
- Requests are treated as Dashboard Access.
- The monitoring system’s IP addresses must be allowlisted under Dashboard Access.
These endpoints are typically associated with dashboard sessions or node-specific access.
API Access
If the monitoring configuration uses the base API endpoint (api.meraki.com):
- Requests are treated as REST API calls.
- Only API Access allowlisting is required.
- Dashboard Access allowlisting is not required
This endpoint is commonly used by monitoring tools, automation scripts, and integrations that interact with the Meraki REST API.
Common misconfiguration
A common issue occurs when:
- Monitoring is configured using a link (like n123.meraki.com).

- However, the monitoring system IPs are allowlisted only under API Access.
In this case, API calls fail because the requests are evaluated against the API Access allowlist.
Impact of incorrect configuration
When IPs are added only under Dashboard Access:
- Web portal login works as expected.
- API calls from external systems fail.
- Data collection or synchronization does not occur.
- Errors such as authentication failure or connection timeout may appear.
Resolution steps
To correct the configuration:
- Log in to the Site24x7 application.
- Navigate to SDN > Meraki. Then, click the required monitor.
- Click the hamburger icon
beside the monitor name, then click Edit.

- Click Change Meraki API Endpoint.

- Update the Meraki API URL and click Test.
- Close the pop-up window, then click Save.
Best practices
- Always confirm which endpoint is used in the monitoring configuration.
- Ensure monitoring system IPs are added to the correct allowlist based on the endpoint type.
- Test API connectivity after updating IP allowlists to confirm successful communication.
Related Articles
How do I generate the Meraki REST API key?
To discover and monitor Meraki organizations and devices in Site24x7, obtain an API key by following the steps below: Open your Cisco Meraki dashboard. Once logged in, navigate to Organizations > Settings. Ensure the option Enable access to the Cisco ...
Why is the monitor status shown as Down in the Meraki dashboard while shown as Up in Site24x7?
Test the Meraki REST API response and compare the monitor status with Site24x7 to determine the correct status of the Meraki devices monitored in Site24x7. Case 1: Different statuses for the REST API response and the Site24x7 monitor. Follow the ...
What are the Meraki APIs used for monitoring in Site24x7 ?
Meraki REST API API details https://developer.cisco.com/meraki/api-v1/get-organization-devices-availabilities/ Fetch the status of all Meraki devices https://developer.cisco.com/meraki/api-v1/#!get-organization-devices-statuses-overview Fetch the ...
Why aren't my Meraki devices being discovered?
If your Meraki devices aren't being discovered, ensure: The API key is entered correctly. Learn more. The Meraki API has read-only access to your Site24x7 account to discover devices and organizations. Site24x7's IP range must be added to the allowed ...
What happens if the Meraki organization's REST API key exceeds the limit?
Data collection in Site24x7 will be skipped for that particular Meraki organization and its associated devices if the REST API key exceeds the prescribed limit. To prevent this, enable alerting by following the steps below: Log in to your Site24x7 ...