Adaptive Policy configuration in Meraki organizations provides administrators with comprehensive dynamic security capabilities, enabling Security Group Tag (SGT) based network segmentation, policy-driven access control, contextual security enforcement, and automated security group assignment. This functionality supports zero-trust network architectures, micro-segmentation strategies, identity-based access control, threat containment, and dynamic policy enforcement based on user identity, device type, location, and behavioral analysis. Adaptive Policy is essential for advanced network security, regulatory compliance, data protection, insider threat mitigation, and maintaining granular security controls across distributed enterprise networks while supporting software-defined perimeter concepts and continuous security assessment.
Example-1: The example below demonstrates adaptive policy configuration.
This configuration enables adaptive policy across the organization for identity-based access control, defining Security Group Tags (SGTs) for “USERS” (SGT 30) and “IOT” (SGT 40), and applying the “Corp Policy” that permits TCP traffic from ports 4000–6000 using the “Permit Corp” ACL, denies TCP traffic from ports 4001–6001 using the “Deny Corp” ACL, and allows all remaining traffic by default, providing granular zero-trust network segmentation and enforcement between corporate users and IoT devices.