Skip to main content

 

Cisco Meraki Documentation

Access Manager

Cisco Access Manager is an access control product that enables organizations to effortlessly manage network access to their users and endpoints without the need for an external RADIUS integration. As part of the Cisco Meraki dashboard, Access Manager empowers IT teams to enforce, monitor and troubleshoot identity and context-based access seamlessly, eliminating complex configuration and troubleshooting workflows eliminating complex configuration and troubleshooting workflows across different management interfaces. Organizations can now quickly and easily scale their network security as their needs evolve by cutting down on infrastructure costs while easing deployment and maintenance efforts.

 

Early Access 

Cisco Access Manager is available in Early Access and General Availability (GA) is planned for November 2025. 

Enable Early Access for your Meraki organizations by opting in under the Organizations > Early Access menu.

Early Access will end at GA then the Access Manager menu and your configurations will be removed unless you purchase Access Manager licenses. To continue using Access Manager as trial, please contact your Sales Representative, reach out to the Sales Team, or complete a trial form to register for a free evaluation.

 

Configuration 

Certificates 

Download the Cisco Access Manager certificate and provision to your clients' trusted certificates list for the 802.1X authentication process.

Upload any public or private certificate authority (CA) digital certificates that Cisco Access Manager should use for client authentication.

 

Devices 

Cisco Access Manager (CAM) currently requires all network access devices to communicate with the Cisco Meraki Dashboard's secure management tunnel. Any devices (Cisco or non-Cisco) that do not support the Meraki management tunnel are not supported.

Model 802.1X MAB VLAN GPACL* Adaptive Policy URL Redir
MR20, MR70 (MR 30.7+) -
MR28/30H/33/42/42E/52/53/53E/74/84 MR36/36H/44/45/46/46E/55/56/57/76/78/86 CW91xx (MR 30.7+)
802.11ac Wave2+
MS120, MS125, MS130 (MS17+) - - -
MS130X/R, MS150 (MS17+) MS18 -
MS210, MS225, MS250, 

MS350, MS355 (MS17+)

-
MS390, C9K-M (CS17.1+)

 *GPACL = Meraki Network Group Policy Access Control Lists

 

Clients 

Cisco Access Manager (CAM) can authenticate any clients (endpoints) using IEEE 802.1X, iPSK, or MAC Authentication Bypass (MAB). There is no limits to the number of clients a single set of username+password credentials may be used for.

 

Mobile Device Managers (MDMs)  

MDMs like Meraki System Manager (SM) are highly recommended for configuring 802.1X and certificates on client computers. Compliance checking against MDMs is not supported by Cisco Access Manager.

Meraki Minute > Meraki SM - Endpoint management

 

Users

Cisco Access Manager (CAM) only supports Microsoft Entra ID as an Identity Provider (IdP).

Support for additional identity providers is planned.

 

Meraki Organization Users 

Organization local users are not supported for 802.1X username + password authentication.

 

Microsoft Entra ID   

Cisco Access Manager (CAM) supports user authentication and group lookup.
Endpoint authentication with EAP-TLS (certificate authentication) is supported but not Entra ID group lookup.

 

Policy

MAC Authentication Bypass (MAB) 
iPSK (Identity Pre-Shared Key) 

Identity Pre-Shared Key allows you to create a unique wireless pre-shared key per MAC address. You may specify an iPSK when provisioning clients.

⚠ iPSK import via CSV is not supported.

 

Rule Groups

Cisco Access Manager (CAM) has a single, Default Rule Group. You cannot create any additional Rule Groups.

 

Attribute Sources 
Certificate Attributes Endpoints Network Access  Meraki (Device)  Radius
Issuer - Common Name
Issuer - Country Name
Issuer - Distinguished Name
Issuer - Domain Component
Issuer - Email Address
Issuer - Locality
Issuer - Organization
Issuer - Organizational Unit
Issuer - Serial Number
Issuer - State Or Province Name
Issuer - Street Name
Issuer - User Id
Serial Number
Subject - Common Name
Subject - Country Name
Subject - Distinguished Name
Subject - Domain Component
Subject - Email Address
Subject - Locality
Subject - Organization
Subject - Organizational Unit
Subject - SAN
Subject - SAN - DNS
Subject - SAN - RFC822
Subject - Serial Number
Subject - State Or Province Name
Subject - Street Name
Subject - User Id
Template Name
Valid To
Client group
Description
MAC address
Private MAC
Source
Authentication Method
Connection Method
EAP Protocol
Network
SSID
Meraki-Ap-Name
Meraki-Ap-Tags
Meraki-Device-Name
Meraki-Network-Name
Called-Station-Id
Calling-Station-Id
NAS-IP-Address
NAS-IPv6-Address
NAS-Identifier
NAS-Port
NAS-Port-Type
Service-Type
User-Name

 

Operators

Most attributes are strings with the default string operators: [Starts with, Ends with, Contains ]

Number type operators are: [Equals, Greater than, Greater than or Equal, Less than, Less than or Equal]

Some attributes offer specific, enumerated values to choose:

Attribute Source Attribute Values
Endpoints    
  Client Group [Match all, Match any]
  Private MAC [True, False]
  Source [Discovered, Provisioned]
Network Access    
  Authentication Method [EAP, MAB]
  Connection Method [Wired, Wireless]
  EAP Protocol [EAP-TLS, EAP-TTLS]
  Network [choose one or more network names]
  SSID [choose one or more SSID names]
RADIUS    
  NAS-Port-Type [Ethernet, IEEE 802.11, Virtual]
  Service-Type [Call Check, Framed, Login]
  NAS-Port-Type [Ethernet, IEEE 802.11, Virtual]

 

Authorization  

Each Access Rule allows you to customize the Access Permissions from the following choices:

Permission Value
Deny Access Default: RADIUS Access-Reject. No session.
Allow Access RADIUS Access-Accept: use the default access permissions on the device.
Allow Restricted Access Allow Access and override the device defaults with one or more of these:
- VLAN ID/Name VLAN number or name (dynamic VLAN assignment)
- Voice Domain Cisco Vendor-Specific Attribute to use the Voice VLAN Domain
- Adaptive Policy Apply this Adaptive Policy (TrustSec Security Group Tag) to this session
- Identity PSK Require this iPSK value for this endpoint session
- Group Policy Apply this Meraki Network Group Policy to this session

 

Scale 

Feature Scale
Users  
Maximum Identity Providers (IdPs) 10
Maximum Users synced from Entra ID 150,000
Maximum Groups 100,000
Maximum Entra ID User Attributes 15
Clients  
Maximum Clients (MACs) 500,000
Max client sessions per user Not configurable
Policy  
Maximum Rule Groups 1
Maximum Rules 50
Certificates  
Maximum Trusted Certificates 10
Maximum CRLs 10

 

Licensing  

Cisco Access Manager (CAM) is not yet orderable in Cisco Commerce Workspace (CCW). It will be orderable upon General Availability (GA) in November 2025.

Cisco Access Manager (CAM) will have a separate license from all other Meraki products.

Cisco Access Manager license consumption is counted by the number of concurrent, active, client sessions. A session is active from the time when Access Manager receives a RADIUS Accounting Start until it receives an Accounting Stop for the session.