Associated Certifications
Cisco Meraki Solutions Specialist
Required Exam(s)
500-220 ECMS
Instructorctclc admin
TypeOnsite Course
Duration
3 Days
Methods of Delivery
ILT, VIRTUAL/WEBEX, ON-SITE
Prerequisites
Engineering Cisco Meraki Solutions Part 1 (ECMS2)
Price$3495.00 / 35 CLCs
Buy NowBook Now

This 3 Day Cisco course elevates your knowledge of Cisco® Meraki™ technology. In this advanced technical training course, you’ll learn how to plan for network deployments and integrations using the Cisco Meraki platform. Through practical hands-on instruction and experiences, you will learn how to operate Meraki networks and troubleshoot complex network incidents using the Meraki Dashboard and analytics. You will also learn how to design Meraki architectures for redundancy, high-density, and scalability by implementing comprehensive Meraki product features to meet design objectives. This course is the second of two courses that prepares you for Cisco Meraki certification.

Why Attend With Current Technologies CLC

  • Our Instructors are the top 10% rated by Cisco
  • Our Lab has a dedicated 500 Mbps Fiber Connection
  • Our Lab Run up to Date version of Code on our Servers

Course Objectives

Who Should Attend

Prerequisites

Course Outline

Labs

Download Outline

After taking this course, you should be able to:

  • Plan for network deployments and integrations using the Meraki platform
  • Design Meraki architectures for redundancy, high-density, and scalability
  • Implement comprehensive Meraki product features to meet design objectives
  • Operate Meraki networks and troubleshoot complex network incidents using the Meraki Dashboard and analytics

The primary audience for this course is as follows:

  • Field deployment technicians
  • Network administrators
  • Pre-/Post-sales engineers
  • Service provider engineers
  • Systems engineers
  • IT professionals

Before enrolling in the ECMS2 course, it is highly recommended that you have already attended and completed the ECMS1 course before attending this training. You should also have general networking understanding, Meraki-specific proficiency, and knowledge in the following areas:

General network:

Basic network fundamentals and building simple LANs

  • Be actively engaged in the design, deployment, scaling, and management of enterprise networks
  • Strong fundamental knowledge of IP addressing and subnetting schemas necessary to build local area networks
  • Strong fundamental knowledge of dynamic routing protocols (focus/emphasis on Open Shortest Path First [OSPF] and Border Gateway Protocol [BGP])
  • A foundational understanding of wired and wireless Quality of Service (QoS) mechanisms, packet queue operations, and practical implementations
  • Be experienced with the design and configuration of IPsec and associated Virtual Private Network (VPN) technologies
  • A foundational understanding of network security controls/protocols, network management best practices, and data security
  • A foundational understanding of best practice Radiofrequency (RF) design principles and practical implementations
  • A foundational knowledge of wireless security best practices centered around access control (802.1x) and spectrum security through Wireless Intrusion Detection Systems (WIDS) and Wireless Intrusion Prevention Systems (WIPS)
  • A foundational command of standard logging/monitoring protocols (focus/emphasis on Simple Network Management Protocol [SNMP], syslog, and webhooks) and related implementation components or tools
  • Be familiar with and have basic knowledge of Application Programming Interfaces (APIs) and related languages/formats (REST, JavaScript Object Notation [JSON])

Meraki knowledge:

  • Fundamental understanding of Dashboard’s organizational structure, delineation of privileges, and overarching administrative processes
  • Be able to outline the key components of Meraki licensing (co-termination model and expiration grace period)
  • Have the knowledge and ability to deploy advanced security features on MX security appliances (intrusion detection/prevention, Advanced Malware Protection [AMP], Layer 3 & 7 firewall rules)
  • Fundamental understanding of Auto VPN and its purpose when utilized in a Software-Defined Wide Area Network (SD-WAN) deployment
  • Be able to describe the concepts behind a cloud-based WLAN solution and the features that can be delivered including Layer 7 traffic shaping and various guest access authentication methods
  • Fundamental understanding of device profile containerization and remote management capabilities as managed through the Systems Manager platform
  • Fundamental understanding of the edge architecture as implemented by Meraki MV security cameras and its implications on video retention through various configurable options

 

Course Overview

Module 1: Planning new Meraki architectures and expanding existing deployment

Module 2: Designing for scalable management and high availability

Module 3: Automating and scaling Meraki deployments

Module 4: Routing design and practices on the Meraki platform

Module 5: Implementing Quality of Service (QoS) and traffic shaping design

Module 6: Architecting VPN and WAN topologies

Module 7: Securing, expanding, and shaping the network

Module 8: Switched network concepts and practices

Module 9: Understand wireless configuration practices and concepts

Module 10: Understand Endpoint management concepts and practices

Module 11: Implement physical security concepts and practices

Module 12: Gaining additional network insight through application monitoring

Module 13: Preparing monitoring, logging, and alerting services

Module 14: Setting up Dashboard reporting and auditing capabilities

Module 15: Gaining visibility and resolving issues using Meraki features and built-in troubleshooting tools

Lab Outline

LABS

  • Creating and Applying Tags
  • Configuring Link Aggregation
  • Setting Up Port Mirroring
  • Establishing Auto VPN
  • Configuring Virtual Interfaces and Routing
  • Configuring Routes and Redistribution
  • Configuring Quality of Service
  • Configuring Traffic Shaping
  • Configuring Load Balancing
  • Defining Firewall Rules
  • Enabling Advanced Malware Protection
  • Enabling Intrusion Detection and Protection
  • Enabling Content Filtering
  • Configuring and Applying Access Policies
  • Configuring Wireless Guest Access
  • Configuring Service Set Identifiers (SSIDs)
  • Implementing RF Profiles
  • Implementing Air Marshal
  • Creating System Manager (SM) Configuration Profiles
  • Defining Security Policies
  • Enforcing End-to-End Security
  • Setting Up Motion Alerts
  • Managing Video Retention
  • Deploying Wireless Cameras
  • Enabling Alerts
  • Adding Monitoring and Reporting
  • Generating Summary Reports
  • Managing Firmware
  • Peripheral Component Interconnect (PCI) Reporting
  • Troubleshooting an Offline Device
  • Troubleshooting Content Filtering
  • Troubleshooting Remote Site Connectivity

 

Engineering Cisco Meraki Solutions Part 2 (ECMS2)