The Complete Guide to Meraki Configuration Backup (2026)

The Complete Guide to Meraki Configuration Backup - network infrastructure diagram
  • Edit Column
 
 

If you manage Cisco Meraki networks, here is something that might surprise you: there is no native GUI backup feature in the Meraki Dashboard.

Your configurations live in the cloud, and Meraki will re-push them to replacement hardware. But that is not the same as a backup. If someone changes a firewall rule, misconfigures a VLAN, or pushes a bad SSID policy across 200 networks, there is no built-in way to see exactly what changed, compare it to what you had before, or roll it back with a click.

This guide covers everything you need to know about Meraki configuration backup: why the cloud model alone is not enough, the methods available to you today, and how enterprise teams are building real config protection into their network operations.

Why You Need Meraki Configuration Backup

The most common objection we hear from network teams is: “Meraki stores everything in the cloud, so why do I need a backup?”

Here is why that reasoning breaks down at scale.

The cloud protects hardware, not configuration decisions

When a Meraki device fails, you replace it in the same dashboard network and it inherits the existing config. That works well for hardware failures. But hardware failure is not the most common cause of network outages.

According to Gartner, human error accounts for roughly 80% of unplanned network downtime. A mistyped IP address, an incorrect VLAN assignment, or a botched access policy pushed across multiple sites can take down entire network segments. In these scenarios, the configuration in the cloud is the problem, not the solution.

Change visibility is limited in the native Dashboard

Meraki provides a Change Log (Organization > Change Log) that records who changed what and when. This is useful for simple auditing, but it has significant limitations for enterprise teams:

  • The Change Log shows that a change happened, but does not give you a complete snapshot of the configuration before and after the change
  • There is no way to compare two points in time side by side
  • There is no one-click rollback to a previous state
  • The Change Log does not cover all configuration elements consistently
  • At scale (hundreds of networks, dozens of admins), parsing the Change Log to reconstruct what happened becomes a forensic exercise

Compliance frameworks require configuration records

If your organization operates under PCI DSS, HIPAA, SOC 2, NIST, or ISO 27001, you likely need to demonstrate that network configuration changes are tracked, documented, and reversible. Meraki’s native Change Log may not meet the audit trail requirements of these frameworks, particularly around:

  • Time-stamped configuration snapshots
  • Before-and-after comparisons of configuration state
  • Evidence of controlled change management processes
  • Documented rollback capabilities
 

The 4 Methods for Backing Up Meraki Configurations

There are four approaches to Meraki configuration backup, ranging from manual scripts to fully automated platforms. Each has trade-offs around coverage, reliability, and the effort required to maintain it.

Method 1: Manual Dashboard Export (Limited)

You can manually export certain settings from the Meraki Dashboard, such as SSID configurations and client lists. However, there is no “Export Full Configuration” button. This method is:

  • Incomplete: only covers a subset of settings
  • Manual: requires someone to remember to do it before every change window
  • Not reversible: there is no corresponding “Import Configuration” for most settings

Best for: Small networks with infrequent changes where basic documentation is sufficient.

Method 2: API Scripts (DIY)

The Meraki Dashboard API provides REST endpoints that allow you to read (and write) configuration programmatically. Several open-source scripts exist on GitHub that use these APIs to export configuration as JSON files.

How it works: The Meraki API exposes configuration across dozens of endpoints. A backup script iterates through your organizations, networks, and devices, calling each relevant API endpoint and saving the response as a JSON file. A restore script reverses the process, reading the saved JSON and pushing it back via API PUT/POST calls.

Key considerations for API-based backup:

  • Coverage is partial. Most API-based backup tools cover roughly 75% of available configuration. Some settings are read-only via API, and some are not exposed at all.
  • Rate limiting is real. Meraki allows 10 API calls per second per organization. A full backup of a large organization (hundreds of networks) can take significant time and requires careful throttling.
  • Maintenance burden is ongoing. When Meraki adds new features or changes API endpoints, your backup scripts need updating. Someone on your team owns this code indefinitely.
  • Restore is risky without testing. Pushing JSON back via API is not the same as “rolling back.” Dependencies between settings, ordering of API calls, and error handling during restore all require careful engineering.
  • No change detection. Scripts run on a schedule (cron job, CI pipeline). They do not detect changes in real time. If someone makes a bad change at 2pm and your script runs at midnight, you have a 10-hour blind spot.

Best for: Technical teams with Python/API experience who need basic periodic snapshots and are comfortable maintaining custom code.

 

Method 3: Third-Party Backup Tools

Several third-party tools offer Meraki configuration backup as a service. These range from simple backup-only tools to comprehensive platforms with change tracking, compliance monitoring, and rollback capabilities.

What to evaluate in a third-party tool:

  • API coverage: What percentage of Meraki configuration does the tool capture? Look for tools that cover organization-level, network-level, and device-level settings.
  • Change detection frequency: Does the tool poll for changes every few minutes, or does it rely on scheduled daily backups? The difference matters when a misconfiguration happens at 3pm.
  • Comparison capabilities: Can you compare two configuration snapshots side by side to see exactly what changed? This is critical for troubleshooting and compliance.
  • Rollback granularity: Can you restore the full configuration, or selectively roll back specific settings? Full restore is a blunt instrument. Partial restore lets you fix one thing without overwriting everything else.
  • Multi-organization support: Enterprise teams often manage multiple Meraki organizations. Does the tool support centralized management across all of them?
  • Compliance reporting: Does the tool generate audit-ready reports showing configuration changes over time?

Best for: Teams that need reliable, automated backup without the maintenance burden of custom scripts.

 

Safeguard by Boundless Digital - Meraki configuration backup and change management platform

Method 4: Integrated Configuration Management Platform

The most comprehensive approach combines automated backup with real-time change detection, side-by-side comparison, selective rollback, and compliance monitoring in a single platform.

This is the approach Boundless Safeguard takes. Safeguard monitors the Meraki Change Log every 1 to 5 minutes. As soon as a change is detected, it captures a time-stamped snapshot of the affected configuration and stores it for future comparison or restoration. You can perform a full restore (all settings) or a partial restore (specific settings only) with a single click.

What makes this approach different:

  • Near-real-time change detection means you know about changes within minutes, not hours
  • Side-by-side comparison shows exactly what changed between any two points in time
  • Selective rollback lets you undo one setting without touching everything else
  • Compliance monitoring alerts you when configuration drifts from your defined baseline
  • Multi-organization dashboards give you visibility across your entire Meraki footprint

Enterprise Best Practices for Meraki Configuration Backup

Regardless of which method you choose, these practices will help you build a reliable configuration management process.

1. Establish a backup cadence that matches your change frequency

If your team makes configuration changes daily, a daily backup is the minimum. For organizations with active change windows, consider tools that detect changes in near-real-time rather than relying on scheduled backups.

Rule of thumb: Your maximum data loss window (the time between the last backup and a bad change) should be measured in minutes, not hours.

2. Test your restore process before you need it

A backup is only useful if you can restore from it. Schedule quarterly restore tests on a non-production network. Verify that:

  • The restore process completes without errors
  • All critical settings are correctly applied
  • The restored configuration produces the expected network behavior
  • Your team knows how to execute a restore under pressure
 

3. Track who changed what and when

Change tracking is not just a compliance requirement. It is the single most useful capability during incident response. When a network is down and you are trying to figure out what happened, being able to answer “who changed what, when, and what did it look like before” is the difference between a 10-minute fix and a 3-hour rebuild.

 

4. Define your configuration baseline

Establish a “golden configuration” for each network type (branch office, retail location, campus, data center). Use compliance monitoring to detect when networks drift from this baseline, whether from authorized changes that missed a step or unauthorized changes that should not have happened.

5. Build backup into your change management process

Every change window should include:

  • A pre-change backup (even if automated backups are running)
  • A defined rollback procedure
  • A post-change verification step
  • Documentation of what was changed and why

6. Plan for multi-organization complexity

Enterprise Meraki deployments often span multiple Dashboard organizations (by region, by business unit, by acquisition). Your backup strategy needs to cover all of them from a single pane of glass. A backup tool that only covers one organization at a time creates blind spots and operational overhead.

Meraki Configuration Backup by Device Type

Different Meraki device types have different configuration surfaces. Here is what you need to back up for each.

MX Security Appliances

MX configuration includes firewall rules (L3 and L7), site-to-site VPN settings, DHCP server configuration, 1:1 and 1:Many NAT rules, traffic shaping rules, content filtering policies, threat protection settings, and SD-WAN/performance class settings.

Why MX backup matters most: A misconfigured firewall rule can expose your network to the internet. A bad VPN change can sever connectivity between sites. MX misconfigurations tend to have the highest business impact.

 

MS Switches

MS configuration includes port configuration (VLAN assignments, PoE, link aggregation), access policies (802.1X, MAC whitelisting), STP settings, DHCP snooping, QoS policies, and stacking configuration.

Common MS risk: Pushing a VLAN change across all switch ports in a building can take down an entire floor. Selective rollback to specific switch port configurations is critical.

MR Wireless Access Points

MR configuration includes SSID settings (authentication, encryption, VLAN tagging), RF profiles, bandwidth limits, firewall rules (per-SSID), splash page configurations, and Bluetooth/IoT radio settings.

Common MR risk: Changing an SSID authentication method across a campus can lock out every wireless client simultaneously.

 

Additional Device Types

MT sensors, MV cameras, and MG cellular gateways each have their own configuration surfaces. A comprehensive backup strategy should cover all device types deployed in your environment.

Frequently Asked Questions

Does Meraki automatically back up my configurations?

Meraki stores your configuration in the cloud and will re-push it to replacement hardware. However, this is not the same as a versioned backup. If someone changes your configuration (intentionally or not), the cloud stores the new version. There is no built-in way to revert to a previous version of your configuration through the Dashboard GUI.

Can I export my Meraki configuration to a file?

There is no “Export Configuration” button in the Meraki Dashboard for a complete configuration export. You can export certain elements (like client lists and some reports), but a full configuration export requires using the Meraki Dashboard API or a third-party tool.

How often should I back up my Meraki configuration?

At minimum, before and after every planned change window. For enterprise environments, we recommend near-real-time change detection that captures configuration snapshots within minutes of any change. This minimizes your data loss window and gives you the most granular rollback options.

What happens if a Meraki configuration change causes an outage?

Without a backup tool, your options are limited: you can work backwards through the Dashboard Change Log to manually identify and reverse changes, or you can rebuild the configuration from documentation (if it exists). With a backup and rollback tool, you can compare the current configuration to a known-good state and selectively restore the specific settings that caused the issue.

Is the Meraki API sufficient for configuration backup?

The API covers roughly 75-80% of available configuration settings. Some settings are read-only or not exposed via API. For teams with Python experience, API scripts provide a workable solution for basic backups. For enterprise environments that need full coverage, real-time change detection, comparison, and selective rollback, a purpose-built tool is more reliable and significantly less maintenance overhead.

Does Meraki configuration backup help with compliance?

Yes. Frameworks like PCI DSS (Requirement 1), HIPAA, SOC 2, and NIST require organizations to document and control changes to network configurations. A configuration backup tool with change tracking and audit trail capabilities provides the evidence auditors need: time-stamped snapshots, before-and-after comparisons, and records of who changed what and when.

 

What to Do Next

If you are managing Meraki networks without configuration backup today, here is where to start:

  1. Audit your current risk. How many networks do you manage? How many admins have access? How frequently do changes happen? The answers determine your exposure.
  2. Choose your method. For small, simple environments, API scripts may be sufficient. For enterprise environments with compliance requirements, evaluate a purpose-built platform.
  3. Test a rollback. Whatever method you choose, verify that you can actually restore from a backup before you need to do it under pressure.

 

Stay up to speed.
Subscribe to our newsletter.