ECMS2 - Engineering Cisco Meraki Solutions Part 2

Introdução

The course, Engineering Cisco Meraki Solutions Part 2 (ECMS2) elevates your knowledge of Cisco® Meraki™ technology.

In this advanced technical training course, you’ll learn how to plan for network deployments and integrations using the Cisco Meraki platform. Through practical hands-on instruction and experiences, you will learn how to operate Meraki networks and troubleshoot complex network incidents using the Meraki Dashboard and analytics. You will also learn how to design Meraki architectures for redundancy, high-density, and scalability by implementing comprehensive Meraki product features to meet design objectives. This course is the second of two courses that prepares you for Cisco Meraki certification.

This course will help you:
* Acquire the advanced skills and techniques to plan, design, implement, and operate the complex Cisco Meraki platform for cloud-based network management;
* Prepare you to take the upcoming Meraki certification(s).

Calendário
Próximas Datas
Data
Solicitar mais informaçõess
Baixar PDF
Carga Horária:
24 horas
Investimento:
Preço sob consulta
Solicitar Cotação
Formatos de Entrega

Público Alvo

This course is ideal for those who regularly deploy or manage Meraki networks and want to deepen their technical expertise and understanding of the full Meraki product suite and features.

Objetivo

After completing the course, you should be able to:
* Plan for network deployments and integrations using the Meraki platform;
* Design Meraki architectures for redundancy, high-density, and scalability;
* Implement comprehensive Meraki product features to meet design objectives;
* Operate Meraki networks and troubleshoot complex network incidents using the Meraki Dashboard and analytics.

Pré Requisitos

Before enrolling in the ECMS2 course, it is highly recommended that you have already attended and completed the ECMS1 course before attending this training.

Recommended foundational understanding:
* Wired & Wireless Networks
* Routing & Switching
* Security (802.1X, Firewall, VPN and IPS/IDS)
* Basic Knowledge API/REST/JSON


Conteúdo Programatico

Course Introduction
Course Goals & Objectives

Planning new Meraki architectures and expanding existing deployments
Identify optimal Meraki networks architectures (organization/network sizing and limitations)
Plan for and complete license renewals through the Dashboard

Designing for scalable management and high availability
Design Meraki organization administrative structure using tags (network and device tags)
Design highly available and redundant networks through the use of MX warm-spare and MS physical stacking technology
Design high density wireless networks (access point calculations and SSID configurations)

Automation and scaling Meraki deployments
Utilize SAML for scalable role-based access control
Explain the capabilities and limitations of Templates and Network Cloning
Explain and identify ideal use cases for the Dashboard API

Routing design and practices on the Meraki platform
Design proper static and dynamic routing topologies based on network needs
Explain dynamic routing capabilities on the MX appliance platform
Explain dynamic routing capabilities on the MS switch platform
Configure OSPF across the network as the dynamic routing protocol
Leverage BGP to expand networks and improve WAN performance

QoS and traffic shaping design
Identify the configurable quality of service (QoS) mechanisms across the LAN and WLAN
Prepare for VoIP and video traffic using class of service (CoS), DSCP tags, and wireless traffic shaping
Configure policy and performance-based routing on the MX appliance platform

Architecting VPN and WAN topologies
Design highly scalable VPN architectures (full mesh, hub-and-spoke)
Explain the underlying mechanisms of Meraki Auto VPN (VPN registry, UDP hold punching)
Explain the fundamentals of Meraki SD-WAN and its processing algorithm
Design Meraki SD-WAN architecture with performance-based routing
Extend networks and services into the public cloud (Azure and AWS)

Securing the network with Advanced Security features
Explain the default traffic flow and layer 3/layer 7 rules processing order of the MX appliance platform
Identify the security intelligence engines and definition databases the MX appliance platform leverages for network protection services (Cisco AMP, Threat Grid, Snort)
Identify and enable content filtering at various levels for desired traffic refinement

Switched network concepts and practices
Prepare access policies (802.1x) using Meraki authentication
Properly utilize templates, cloning, and switch profiles
Design guest access for LAN/WLAN utilizing Meraki best practices

Wireless concepts and practices
Configure Dashboard maps and floor plans
Formulate RF profiles to prepare for challenging/variable RF deployments
Configure WLAN access control options based on design requirements
Enable the network for Bluetooth scanning and BLE beaconing
Utilize Air Marshal for intrusion detection and mitigation

Endpoint management concepts and practices
Explain the different device enrollment and profile deployment methods
Design a native containerization strategy to separate work from personal data on endpoints
Identify and implement various application deployment methods
Assemble and implement security policies which cater to various restriction requirements
Construct a network deployment that leverages SM Sentry

Physical security concepts and practices
Explain the MV platform’s edge architecture and underlying video delivery mechanism (local vs. remote video access)
Design a retention policy using various local or cloud-based storage strategies
Configure MV cameras for wireless deployments
Explain and demonstrate how to effectively utilize advanced analytics and MV camera APIs

Gaining additional network insight through application monitoring
Explain how Meraki Insight is able to provide network assurance through the use of performance metrics and scores
Qualify and properly size Meraki Insight licenses
Configure, monitor, and track predefined and custom web application thresholds

Preparing and setting up monitoring, logging, and alerting services
Explain Dashboard’s integrated historical log databases (event vs. change logs) to be leveraged for effective activity analysis
Identify the various monitoring tools within Dashboard (native analytics, Topology)
Demonstrate effective network-wide alerting best practices
Utilize the Dashboard API to monitor and maintain Meraki networks

Setting up Dashboard reporting and auditing capabilities
Generate and interpret on-demand or recurring Summary Reports for key performance metrics
Track and manage firmware releases and prepare for staged upgrades
Recommend proper actions to meet PCI DSS (2.0 and 3.0) compliance

Gaining visibility and resolving issues using Meraki features and built-in troubleshooting tools
Interpret event and change logs to troubleshoot client and network issues
Classify and compare security threats via the Security Center
Assess wireless intrusions, failures, and network access issues through Dashboard’s RF tools (Wireless Health, Air Marshal)
Assess root cause of application performance issues with Meraki Insight
Explain the detailed VPN tunnel information and the VPN Registry found on the VPN Status page
Utilize the Local Status Page as an alternate connectivity method to perform local troubleshooting

Lab Outline
Lab 1: Creating and Applying Tags
Lab 2: Configuring Link Aggregation
Lab 3: Setting Up Port Mirroring
Lab 4: Establishing Auto VPN
Lab 5: Configuring Virtual Interfaces and Routing
Lab 6: Configuring Routes and Redistribution
Lab 7: Configuring Quality of Service
Lab 8: Configuring Traffic Shaping
Lab 9: Configuring Load Balancing
Lab 10: Defining Firewall Rules
Lab 11: Enabling Advanced Malware Protection
Lab 12: Enabling Intrusion Detection and Protection
Lab 13: Enabling Content Filtering
Lab 14: Configuring and Applying Access Policies
Lab 15: Configuring Wireless Guest Access
Lab 16: Configuring Service Set Identifiers (SSIDs)
Lab 17: Implementing RF Profiles
Lab 18: Implementing Air Marshal
Lab 19: Creating System Manager (SM) Configuration Profiles
Lab 20: Defining Security Policies
Lab 21: Enforcing End-to-End Security
Lab 22: Setting Up Motion Alerts
Lab 23: Managing Video Retention
Lab 24: Deploying Wireless Cameras
Lab 25: Enabling Alerts
Lab 26: Adding Monitoring and Reporting
Lab 27: Generating Summary Reports
Lab 28: Managing Firmware
Lab 29: Peripheral Component Interconnect (PCI) Reporting
Lab 30: Troubleshooting an Offline Device
Lab 31: Troubleshooting Content Filtering
Lab 32: Troubleshooting Remote Site Connectivity