Instructorctclc admin
TypeOnline Course
Duration
5 Days
Methods of Delivery
ILT, VIRTUAL, On-Site
Price$4295.00
Buy NowBook Now

This course familiarizes individuals with networking concepts and demonstrates how to effectively use Meraki products to build a comprehensive network.

Why Attend With Current Technologies CLC

  • Our Instructors are the top 10% rated by Cisco
  • Our Lab has a dedicated 500 Mbps Fiber Connection
  • Our Lab Run up to Date version of Code on our Servers

Course Objectives

Who Should Attend

Prerequisites

Course Outline

Download Outline

  • Course Overview
  • Cisco/Meraki Cloud Management with the Meraki Dashboard
  • Cisco/Meraki MX Security
  • Cisco/Meraki  Switching
  • Cisco/Meraki MR Wireless
  • System Manager
  • Meraki MV Camera
  • SDWAN

The primary audience for this course is as follows:

  • IT Staff and Managers
  • Network and systems personnel and engineers
  • Small to mid-sized organizations that require fundamental knowledge on networking terms/concepts and configuration guidance for Meraki equipment.
  • This also includes organizations looking to implement remote sites, provide a guest wireless solution, and collect user analytics.

None required

Course Overview

Module 1: Introduction to Meraki

  • Simplifying IT with Cloud Management
  • The Meraki Mission is to Create…
  • Designed for Performance and Analytics
  • Cisco Meraki: Bringing the Cloud to Enterprise Networks
  • Cloud-Managed Networking Architecture
  • Benefits of a Cloud-Based Solution
  • Feature Velocity and Steady Products Expansion
  • The Meraki Full Stack: New and Unique Value Proposition
  • Meraki Deployment – How it works
  • Cisco Meraki MS Switches: Product Overview
    o Why Customers Choose Meraki Switches
    o Meraki MS Switches: Feature Highlights
    o MS Switches: Models
  • Cisco Meraki MX Security Appliances: Product Overview
    o MX Security Appliances: Feature Highlights
    o Models from the Branch to the Campus
    o Licensing that Fits the Business Needs
    o Meraki SD-WAN
  • Cisco Meraki MR Wireless Access Points: Product Overview
    o MR Wireless Access Points: Feature Highlights
    o MR Wireless Access Points: Indoor Models
    o MR Wireless Access Points: Outdoor Models
  • Cisco Meraki Systems Manager
     Systems Manager Enterprise Mobility Management
     Cisco Meraki MC Cloud Managed Communications
     Crafted and Robust Hardware
     Meraki MC Telephony Feature Sets
     Cisco Meraki MV Vision Security Cameras
     Meraki MV Security Cameras
     MV Security Cameras: Models
     Cisco Meraki Insight
     Web-based Application Analytics
     Solutions built on Meraki APIs
     Meraki Licensing
     Enterprise Support
     Meraki – Product End of Life
     Warranty & Returns
     Return Policy and Requesting a RMA
     Meraki Solution
     Meraki Now Comparison
     Cisco Meraki Documentation

Module 2: Cloud Management with the Meraki Dashboard

  • The Cisco Meraki Dashboard
     Dashboard: Organizational Structure
     Meraki Dashboard Best Practices – Campus
     Dashboard Compliance and Data Protection
     Out-of-band Cloud Management via Dashboard
     Loss of Connectivity to the Cisco Meraki Cloud
     Meraki Dashboard Login
     Create Dashboard Account
     Create Dashboard Account and Organization
     Verify Created Account
     Accounts Associated with Multiple Organizations
     First Login to New Organization
     Modify Organization Name
     Delete an Organization
     Account Login with Multiple Assigned Organizations
     Manage Multiple Organizations
     View Health Status for Multiple Organizations
     Meraki Dashboard Demo
     Meraki Dashboard Best Practices – Multiple Locations
     Dashboard Search
     Logged in User Profile
     Modify User Profile
     Meraki Help
    o Dashboard – Help – Get Help
    o Dashboard – Help – Community
    o Dashboard – Help – Cases
    o Dashboard – Help – New Features
    o Dashboard – Help – Firewall Rules Info
    o Dashboard – Help – API Docs
    o Dashboard – Help – Hardware Replacement
    o Dashboard – Help – Make a Wish
     Announcements
     Organizational Wide Settings
     Organization > Configure > Settings
    o Settings – Org Name and Security Settings
    o Settings – SAML
    o Configuring SAML SSO with ADFS
    o Configuring SAML SSO with OneLogin
    o Settings – Administration and Privacy Settings
    o Settings – SNMP Configuration
    o Settings – Threat Grid
    o Settings – Dashboard API Access
    o Settings – Delete This Organization
     Organization > Configure > Configuration Sync
    o Configuration Sync
     Organization > Configure > Administrator
    o Create Administrator Account
    o Verify Administrator Account
     Organization > Configure > License
    o License Information
    o Add Licenses to Organization
    o License History
     Organization > Configure > Create Network
    o Create Network – Setup Network
    o Create Network – Select Devices from Inventory
    o Delete Networks
    o Create Network – Add Devices
     Finding Meraki Order Number
     Organization > Configure > Inventory
    o Organization > Inventory – Searching for Devices
    o Organization > Inventory – Claiming Devices
    o Organization > Inventory – Unclaiming Devices
     Organization > Add a Device to a Network
     Organization > Overview > Networks
    o Organization > Overview > Network Tags
     Organization > Overview > Devices
     Organization > Overview > Change Log
     Login Attempts
     Organization > Overview > Security Center
     Organization > Overview > Location Analytics
     Organization > Overview > VPN Status
     Organization > Overview > Firmware Upgrades
     Firmware Upgrades – Scheduling Firmware Upgrades
    o Organization > Overview > Firmware Roll Back
    o Organization > Overview > Firmware Release Notes
     Organization > Overview > Summary Report
    o Organization > Summary Report – Usage Stats
    o Organization > Summary Report – Top Devices
     Organization > Top SSIDS by Usage
     Organization > Summary Report – Top Clients by Usage
     Clients
     Organization – Top Client Device Manufacturers
     Organization – Top Applications by Usage
     Organization – Application Detail
     Network-Wide
    o Network-Wide > General Settings
     Network-Wide > General > Traffic Analysis
     Network-Wide > General > Location and Scanning
     Network-Wide > General > SMS Auth with Twilio
     Network-Wide > General > CloudShark
     Network-Wide > General > Device Configuration
     Network-Wide > General > Reporting > Syslog
     Network-Wide > General > SNMP
     Network-Wide > General > Reporting > Location
     Network-Wide > General > NetFlow
     Network-Wide > General > Firmware Upgrades
     Network-Wide > General > Status & APIs
    o Network-Wide > Administration > Org Admins
    o Network-Wide > Administration > Network Admin
    o Network-Wide > Administration > Guest Ambassadors
    o Network-Wide > General > Guest Access
    o Network-Wide > Users
    o Network-Wide > Admin > Port Management Privileges
    o Network-Wide > General > Camera-Only Admins
    o Network-Wide > Alerts
    o Network-Wide > Group Policy
     Network-Wide > Group Policy > New Group
     Network-Wide > Group Policy > Schedule
     Network-Wide > Group Policy > Hostname Visibility
     Network-Wide > Group Policy > Firewall
    • Firewall – Layer 7 Rules
     Network-Wide > Group Policy > Traffic Shaping
     Network-Wide > Group Policy > Wireless
    o Network-Wide > General > Add Devices
    o Network-Wide > Monitor > Clients
     Network-Wide > Monitor > Clients > Applications
     Network-Wide > Monitor > Clients > Ports
     Network-Wide > Monitor > Clients > HTTP Content
     Network-Wide > Monitor > Clients > Custom Pie Chart
     Filtering Clients
     Searching for Clients
     Modifying Columns
     Changing the Policies Applies to a Client
     Adding a Client
     Display Client Information
     Network-Wide > Monitor > Traffic Analytics
    o Traffic Analytics
     Packet Capture for Multiple Devices
     Event Log
     Configuration Templates
    o Organization > Overview > Configuration Templates
    o Templates
    o Configuration Templates > Create New Template
    o Configuration Templates
    o Unbinding Networks from a Template
    o Splitting Configuration Templates
    o Combining Configuration Templates
    o Deleting a Configuration Template
    o MR – Wireless network Templates
    o MX/Z3 – Template VLAN IP Address Range Allocations
    o VLAN Templates
    o Configuration Templates
     Recovering a Missing or Stolen Device

Module 3: Meraki MX Security

 Benefits of a Cloud Managed Solution
 Complete Connectivity and Threat Management Solution
 Cisco Meraki MX
 Ironclad Security
 Backed by Cisco Tabs Threat Intelligence
 Advanced Malware Protection for Meraki MX
 How does it work?
 Reliable, Cost Effective Connectivity with Meraki SD-WAN
 Automated Site-to-Site VPN (Auto VPN)
 High Availability and Path Redundancy
 Connections that Fit your Business and Location Needs
 Application-Aware Intelligent Path Control
 Traffic Monitoring and Analytics
 URL Logging
 SPN Health, Bandwidth, and Performance Monitoring
 Email Alerts from the Cloud
 Licensing that Fits the Business’ Needs
 MX Sizing Guide
 Models from the Branch to the Campus
 Small Branch MX64/MX64W
 Small Branch MX65/MX65W
 Medium Branch
 MX250/MX450 New Design
 Large Branch, Campus / Concentrator
 Virtual MX for Amazon Web Services & Microsoft Azure
 Teleworker
 Loss of Connectivity to the Cisco Meraki Cloud
 New MX Appliance Overview
 Meraki MX – Local Status Page
o MX Local Status Page – Connection
o MX Local Status Page – Configure
o MX Local Status Page – Set Interface Addresses
o MX Local Status Page – Ethernet
 Claim the MX Appliance
 MX Create a Network For MX Appliance
 Create Combined Network for MX in HQ
 Check Newly Added Appliance Status
 Change Name of Device
 Set Location Data for Maps
 Configure Warm Spare
 Device Tags & Notes
 Remove MX From Network
 Addressing & VLANs
o Mode: Pass-Through or VPN Concentrator Mode
o Mode: Network Address Translation (NAT)
o Addressing & VLANs – Client Tracking
o Addressing & VLANs – Enabling VLANs
o Addressing & VLANs – Adding a VLAN
o Addressing & VLANs – Static Routes
o Addressing & VLANs – Dynamic DNS
 Security Appliance – Configure – DHCP
o DHCP Turn up and Lease Time
o DHCP – DNS Name Servers
o DHCP – Boot Options
o DHCP – Options
o DHCP – Fixed IP Assignments (Reservations)
o DHCP – Reserved IP Ranges (Excluded Addresses)
 Meraki Firewall Configuration
o Security Appliance – Configure – Firewall
o Layer 3 vs Layer 7 Firewall
o Firewall Outbound Rules
o Firewall – Cellular Failover Rules
o Firewall – Security Appliance Services
o Firewall – Layer 7 Rules
o Geo-IP Based Firewalling
o Forwarding Rules – Port Forwarding
o Forwarding Rules – 1:1 NAT
o Forwarding Rules – 1: Many NAT
o Bonjour Forwarding
 Meraki Site-to-Site VPN
 What is a VPN
o Site-to-Site VPN
o Configuring Site-to-Site VPN AutoVPN
 Site-to-Site Hub Configuration
o Site-to-Site VPN – Hub Configuration with an Exit Hub
o Site-to-Site VPN –  Spoke Configuration Split Tunnel
o Site-to-Site VPN –  Spoke Configuration Full Tunnel
o Site-to-Site VPN –  Local Networks
o Site-to-Site VPN –  NAT Traversal
o Site-to-Site VPN –  Remote VPN Participants
o Site-to-Site VPN –  VPN Subnet Translation
o Site-to-Site VPN –  Non-Meraki VPN Peers
o Site-to-Site VPN –  Non-Meraki IPSEC Policy
o Site-to-Site VPN –  VPN Firewall Rules
o Site-to-Site VPN –  Monitor Status
 One Arm VPN Concentrator Configuration
o OSPF Configuration
o BGP Configuration
 Meraki Client VPN
o Enable Client VPN
o Configure Client VPN
o Client VPN Authentication Methods
o VPN Clients
 Meraki Active Directory
o Active Directory Integration
o Active Directory Authentication
o Apply Group Policy to Active Directory Groups
o Create a Group Policy for Admins
o Create a Group Policy for Guests
 Meraki Access Control
o Access Control
o Access Control > Network Access
o Network Access > Access Control > Radius (2)
o Access Control > Network Access > Facebook
o Network Access > Access Control > Third Party > Google
o Network Access > Access Control > Google (2)
 Meraki Splash Page
o Splash Page
o Customize Splash Page
o Preview Splash Page
o Create Custom Themed Splash Page
 Teleworker VPN / L3 Roaming
o Creating Teleworker Networks

Module 4: Meraki Switching

  • Avoiding downtime, client disruption
     Cloud Managed from Access through Aggregation
     MS Feature: Topology
     Ongoing Feature Updates Delivered from the Cloud
     MS Feature: Multigigabit Ethernet
     Cisco Meraki MS Switches
     Meraki Access Switching Portfolio
    o Meraki Access and Aggregation Portfolio
    o MS220-8-HW
    o MS220-8P-HW
    o MS 120 Compact Switch
    o MS120-8-HW
    o MS120-8LP-HW
    o MS120-8FP-HW
    o MS 120 Switch Family
    o MS120-24-HW
    o MS120-24P-HW
    o MS120-48-HW
    o MS120-48LP-HW
    o MS210 Switch Family
    o MS210-24-HW
    o MS210-24P-HW
    o MS210-48-HW
    o MS210-48LP-HW
    o MS210-48FP-HW
    o MS225 Switch Family
    o MS225-24-HW
    o MS225-24P-HW
    o MS225-48-HW
    o MS225-48LP-HW
    o MS225-48FP-HW
    o MS250 Switch Family
    o MS250-24-HW
    o MS250-24P-HW
    o MS250-48-HW
    o MS250-48LP-HW
    o MS250-48FP-HW
    o MS350 Switch Family
    o MS350-24-HW
    o MS350-24P-HW
    o MS350-24X-HW
    o MS350-48-HW
    o MS350-48LP-HW
    o MS350-48FP-HW
    o MS410 Switch Family
    o MS410-16 Fiber Aggregation Switch
    o MS410-32 Fiber Aggregation Switch
    o MS425 10 GB Switch Family
    o MS425-16 Fiber Aggregation Switch
    o MS425-32 Fiber Aggregation Switch
     Integrated Event Logs, Alerts, and Anomaly Detection
     Advanced Network-wide Security
     Meraki Switch Configuration
     MS Switch > Default Configuration
     Switch – Monitor – Switch
     Add a Switch to the Network
     Move or Remove MS Switch from the Network
     Switch Overview
    o Switch Status
     Cisco Meraki MS Switches
    o Switch > Switch Settings
    o Switch > Switch Settings > VLAN Configuration
    o Switch > Spanning Tree (STP, RSTP)
    o Switch > Spanning Tree > Port Configuration
    o Switch > Spanning Tree > STP Configuration
    o Switch > Spanning Tree > Quality of Service
     Class of Service (CoS) Weight
     Switch Settings > Quality of Service
     Switch Settings > MTU Configuration
     Switch Settings > Multicast Settings
     Basic Switch Configuration & Monitoring
     Provision Switch Stacks
     Stacking Mechanisms and Availability
     Stacking with Virtual Stacking
     Cloud-Managed Physical Stacking
     Flexible Stacking
     Provision Switch Stack
     Create the Switch Stack
     Delete the Switch Stack
     View the Stack
     Blink the Switch
     Add and Remove Members to the Stack
     Clone and Replace a Member of the Stack
     Switch > Monitor > Switch
    o Summary Tab > Change Name of Device
    o Summary Tab > Set Location Data for Maps
    o Summary Tab > Device Tags & Notes
    o Summary Tab > Switch Settings
     Configuring Ports on a Switch
    o Configuring Ports on a Stack Switch Ports
    o Summary Tab > Historical Data
    o Summary or Port Tab > Switch Port Status
    o Summary or Port Tab > Port Status
    o Port Tab > Individual Port > Historical Data
    o Port Tab > Individual Port > Configuration
    o Port Tab > Port Configuration
    o Port Tab > Status
    o Port Tab > Troubleshooting > Packet Capture
    o Port Tab > Troubleshooting > Cable Test
    o Port Tab > Troubleshooting > Reset Port
     Switch > Ports Tab > Packet Counts
     Switch > Power Tab
     Switch > Event Log Tab
     Switch > DHCP Tab
     Switch > Location > Map
    o Location Tab > Switch Location > Map
    o Location Tab > Switch Location > Photo
    o Location Tab > Switch Location > Topology
     Tools Tab > Ping Devices
     Tools Tab > Ping the Switch
     Tools Tab > Reboot Device
     Tools Tab > Blink LEDs
     Tools Tab > Throughput
     Tools Tab > Traceroute
     Tools Tab > MTR Traceroute
     Tools Tab > Cable Test
     Tools Tab > Cycle Ports
     Tools Tab > MAC Forwarding Table
     Tools Tab > ARP Table
     Tools Tab > Routing Table
     Tools Tab > Multicast Routing
     Tools Tab > Wake Client
     Configuring Switch Ports ?
    o Edit and Monitoring Switch Ports
    o Searching for Switch Ports
    o Editing Switch Ports
    o Editing Multiple Switch Ports
     Link Aggregation  ?
    o Switch Ports > Aggregation
    o Switch Ports > Split the Aggregation
     Mirroring Switch Ports ?
    o Mirroring Switch Ports > Modify  Columns
    o UnMirror Ports
     DHCP Server Status
     DHCP Servers
     Switches > DHCP Servers
    o View SHCP Leases Provided by Switches
    o View DHCP Configuration
    o Switch – Configure – Routing & DHCP
    o Routing & DHCP – Initializing Layer 2 Switching
    o Routing & DHCP – Create Layer 2 VLAN
    o Layer 3 vs Layer 2 Switch for VLANs
    o MS Layer 3 Switching – Supported Models
    o Enable Layer 3 on Switch or Switch Stack
    o Routing & DHCP – Initializing Layer 3 Routing
    o Routing & DHCP – Create Layer 3 Interface
    o View, Edit, Move, Delete Layer 3 Interfaces
    o DHCP Turn up and Lease Time
    o DHCP – DNS Name Servers
    o DHCP – Boot Options
    o DHCP – Options
    o DHCP – Fixed IP Assignments (Reservations)
    o DHCP – Reserved IP Ranges (Excluded Addresses)
     Multicast Configuration
    o How Does IP Multicast Work?
    o Internet Group Management Protocol
    o Enable Multicast Routing
    o IGMP Snooping Querier
    o Multicast Routing
     MS Warm Spare Virtual Router Redundancy Protocol (VRRP) ?
    o MS Warm Spare (VRRP) Overview
    o MS Warm Spare (VRRP) Configuration
     Open Shortest Path First (OSPF) ?
    o OSPF Areas
    o OSPF LSA Types
    o Normal Area
    o Stub Area
    o Not-So-Stubby Areas (NSSA)
    o Open Shortest Path First (OSPF) Routing
    o Create OSPF Areas
    o Configure Interfaces into OSPF Areas
    o OSPF for Static Routes
    o OSPF Timers
    o OSPF Authentication
    o View OSPF Routes and OSPF Neighbors
     Access Control Lists
     Switch ACL Operation
     Switch ACL
     Explicit Allow with Explicit Deny
     Source VLAN ACL
     Explicit Deny
     Access Policies (802.1X)
     Host Models
     Access Policy Types
     Hybrid Authentication
     Change of Authorization (CoA)
     RADIUS Features
    o Add an ACCESS Policy
    o Add an Access Policy > Radius Settings
    o Access Policy
     Port Schedules
    o Apply Port Schedule to Ports
     Staged Upgrades
    o Schedule Multiple Firmware Switch Upgrade Windows
    o Switch > Configure > Staged Upgrades
    o Staged Upgrades > Scheduling
    o Switch > Configure > Staged Upgrades

Module 5: Meraki MR Wireless

  •  Meraki MR Wireless
     Granular Control Over Bandwidth, Apps, and Client Devices
     Meraki Multigigabit (Mgig) (Mbase-T)
     MR Feature: Mesh Routing
     MR Dedicated Radio Tames Hostile RF Environments
     Secure Guest Wireless in Seconds
     Bluetooth Beacons
     Built-in Bluetooth Beacons
     Integrated Analytics for Actionable Insights
     Seamless Bluetooth Integration for Context-Aware Apps
     Meraki Location Heatmap is Built-in
     High Density Support
     Zero-Touch Provisioning
     Meraki | Application Program Interfaces (APIs)
     Meraki Location Analytics are Built-in
     Licensing and Support
     Wireless Standards ?
    o IEEE 802.11 Wireless LANs
    o 802.11b/g 2.4 Spectrum
    o 802.11b/g 2.4 Channel Plan
    o 802.11a/ac 5 GHz Channels
    o 802.11ac Standard
    o 802.11ac Wave 1
    o 802.11ac Wave 2
    o 802.11ac Wave 1 vs Wave 2
     Site Survey
    o Site Survey & Design
    o Capacity Planning
    o Types of Site Surveys – Passive Survey
    o Types of Site Surveys – Active Survey
    o Types of Site Surveys – Predictive Surveys
    o Site Survey Tools
    o Site Survey – AP Selection
     MR Internal AP 2.4 GHz Radiation Pattern
     MR Internal AP 5 GHz Radiation Pattern
     Mounting MR Access Points
     Identify Problematic Areas
     Signal Attenuation
     Meraki MR Models
     Meraki Legacy APIs
     Meraki Indoor Aps for all use cases
    o MR20 Indoor AP
    o MR30H Indoor AP
    o MR-33 AP
    o MR42 Indoor AP
    o MR42E Indoor AP
    o MR52 Indoor AP
    o MR53 Indoor AP (M-Gig)
    o MR53E Indoor AP (M-Gig)
     Meraki Legacy Outdoor Aps for all use Cases
    o MR70 Outdoor AP
    o MR74 Outdoor AP
    o MR84 Outdoor AP
     Directional Antennas
     External Antennas for Indoor Aps
     External Antennas for Outdoor/Ruggedized Aps
     AP Power Options
     ISE Integration
     Guest Self-Registration
     Wireless Configuration
     Wireless > Access Points > Access Point Status Page
    o Set the AP Name
    o Set the AP Location Address
    o Default SSID and Channel Selection
    o Dynamic IP Addressing and CLAN Assignment for AP
    o Static IP Addressing for AP
    o Serial Number, Tags, and Notes
    o Firmware, Config, and Power
     Wireless > Monitor > Access Points > Summary
     Access Points > Summary > Current Clients
    o SUMMARY > Radius and CLAN Request Status
    o SUMMARY > Historical Data
    o Access Points > Event Log
    o Access Points > Full Event Log
    o Access Points > Location > Map
    o Access Points > Location > Satellite
    o Access Points > Location > Photo
    o AP > Tools Tab > Ping
    o AP > Tools Tab > Reboot Device
    o AP > Tools Tab > Blink LEDs
    o AP > Tools Tab > Throughput
    o AP > Tools Tab > Traceroute
    o AP > Tools Tab > ARP Table
    o AP > LAN Tab > Radius Request Status
    o AP > RF > Wireless Troubleshooting
     Wireless > Configuring > SSID Configuration
    o Configuring SSIDs
    o Provision SSIDs
     Access Control
    o Wireless Encryption and Authentication
    o Access Control > Open
    o Access Control Pre-Shared Keys
    o Access Control > MAC-based Access Control
    o WPA2-Enterprise with 802.1X Authentication
    o Access Control – Supported EAP Types
     Configuring > Wireless Access Control Splash Page Configuration
    o Access Control > Splash Page
    o Access Control > Splash Page > None
    o Access Control > Splash Page > Click-through
    o Access Control > Splash Page
    o Access Control > Splash Page > SMS Auth.
    o Access Control > Splash Page > ISE Splash Page
    o Access Control > Splash Page > Systems Manager
    o Access Control > Splash Page > Billing
    o Access Control > Network Access Control
    o Access Control > Assign Group Policies by Device Type
    o Access Control > SSID Modes for Client IP Assignment
    o Distributed L3 Roaming in a Nutshell
    o Access Control > Wireless Options
    o Access Control > Wireless Options – Band Steering
     Per SSID – Firewall & Traffic Shaping
    o Firewall & Traffic Shaping > Block IPs and Ports
    o Firewall & Traffic Shaping > Layer 3 Firewall Rules
    o Firewall & Traffic Shaping > Block Applications
    o Firewall & Traffic Shaping > Traffic Shaping SSIDs
    o Firewall & Traffic Shaping > Traffic Shaping Rules
     Configuring > Splash Page Configurations
    o Splash Page
    o Customize Splash URL for Payment Vendors
    o Customize Splash Page
    o Preview Splash Page
    o Create Custom Themed Splash page
     Configuring > SSID Availability
    o SSID Availability
     Configuring > Bluetooth Settings
    o Bluetooth Low Energy (BLE)
    o Bluetooth Settings > Enable Bluetooth Scanning
    o Bluetooth Clients
    o Bluetooth Beaconing
     Asset Tracking
     Configuring > Wireless RF Radio Settings
    o Radio Settings
    o Auto RF – Dedicated Scanning Radio
    o Channel Planning
    o Radio Settings > Transmit Power Control (Current)
    o Radio Settings – Exclude DFS (Current)
    o Radio Settings – Radio Channel Width (Current)
    o RF Metrics
    o Radio Settings > Client Balancing (Current)
    o Client Balancing
    o Radio Settings – 2.4 GHz List View (Current)
    o Radio Settings – 2.4GHz List View (Current)
    o Radio Settings – 5 GHz List View (Current)
    o Radio Settings – 5 GHz View (New-Beta)
    o Radio Settings – 5 GHz Channel Selection (New-Betta)
    o Radio Settings – 2.4 GHz View (New-Beta)
     Auto RF – Channel Changes
    o Radio Settings – 5 GHz Transmit Power (New-Beta)
    o Radio Settings – 2.4 GHz View (New-Beta)
    o Auto RF – TX Power Considerations
    o Auto RF – TX Power Changes
     Map View 5 Ghz Map (Current)
    o Map View 5 GHz Satellite Map (Current)
    o Map View 2.4 GHz Satellite Map (Current)
     Configuring > Prepaid Cards
    o Configuring a Prepaid Card Billing SSID
    o Generating Prepaid Codes
    o Prepaid Card Numbers
     Monitoring > Maps and Floor Plans
    o Map and Floor Plans
    o Uploading and Aligning Custom Floor Plans
    o Floor Plan Added
    o Place Floor Plans on Map
    o Floor Plans
    o Add Aps to Floor Plans
     Wireless Threats and Air Marshal
     Network Impersonation
     Wired Network Compromise Via Rouge AP
     Wireless Threats
     Air Marshal Containment
     Wireless > Air Marshal
    o Configuring Meraki’s Air Marshal WIDS/WIPS Platform
     Air Marshal – Hybrid vs Dedicated
     Air Marshal > Configure
    o Clients Connecting to Rogue SSIDs Settings
     Air Marshal > Configure > SSID Blacklist
     Air Marshal > Configure > SSID Whitelist
     Air Marshal > Configure > SSID Alerting
     Air Marshal > Configure > Rogue SSID
    o Rogue SSID Containment Types and Status
     Containment of Rogue SSIDs
     AIR Marshal > Rogue SSID > Contain
     Air Marshal > Other SSID > Alerts
    o Air Marshal > Spoofs
    o Air Marshal > Malicious Broadcasts
    o Air Marshal > Packet Floods
     Location Heat Map
     Splash Logins
     Heat Map
     PCI Compliance
    o PCI Compliance > Run Report
    o PCI Compliance Report
    o PCI Compliance Remediation
     Bluetooth Clients
    o Wireless > Bluetooth Clients
    o Wireless > Monitor > RF Spectrum
     RF Spectrum
    o RF Spectrum Overview
    o RF Overview > 2.4 GHz Spectrograms
    o RF Overview > 2.4 GHz Utilization
    o RF Overview > 2.4 GHz Interfering APs
    o RF Overview > 5 GHz Spectrograms
    o RF Overview > 5 GHz Utilization
    o RF Overview > 5 GHz Interfering APs

Module 6: System Manager

  • Deployment Considerations
     Core Concepts
    o Access Rights
    o Tags
    o Enrollment
     SM Enrollment Authentication
     Fully Automated Enrollment
     Partially Automated Enrollment
     Manual Enrollment
     App Management
    o Adding Apps in Dashboard
    o Assigning VPP licenses for use with Apple App Store apps
     Profiles
    o Settings
    o Restrictions
    o ActiveSync
    o Passcode
    o VPN
     Summary

Module 7: Meraki MV Camera

  • MV12 vs MV21 vs MV71
    • Installing Cameras
    • Adding Cameras to the Dashboard
    • Managing MV Cameras
    o Focusing Cameras
    o Motion-based Retention
    o Troubleshooting IR Reflection
    o HTTP Live Streaming
    o Video Retention
    o Scheduled Recording
    • Troubleshooting Cameras

Module 8: SD-WAN

  • What is SD-WAN?
     Concentrator Mode
    o One-Armed Concentrator
    o NAT Mode Concentrator
     VPN Topology
    o Split Tunnel
    o Full Tunnel
    o Hub and Spoke
    o VPN Mesh
    o Datacenter Redundancy (DC-DC Failover)
     Warm Spare (High Availability) for VPN concentrators
     Connection Monitor
     SD-WAN Technologies
    o Dual-Active VPN uplinks
    o Policy-based Routing
    o Dynamic Path Selection
     Performance Probes
     High-level architecture
    o SD-WAN Objectives
    o Example Topology
    o High Level Traffic Flow
     Failover Times
     Datacenter Deployment
    o Deploying a one-armed concentrator
    o Dashboard Configuration
     NAT traversal
     Adding warm spare
    • Topology
    • Behavior
    • Dashboard Configuration
     Configuring OSPF Route Advertisement
    • Behavior
    • Dashboard Configuration
    o Other Datacenter Configuration
     MX IP Assignment
     Upstream Considerations
    • Routing
    • Firewall considerations
    o Datacenter Redundancy (DC-DC Failover)
     Branch Deployment
    o Configuring AutoVPN at the branch
     Prerequisites
    • WAN Interface Configuration
    • Subnet Configuration
     Configuring AutoVPN
    • Configuring Hub and Spoke VPN
    • Configuring Allowed Networks
    • NAT Traversal
    o Adding performance and policy rules
     Best for VoIP
     Load Balance Video
     PbR with Performance Failover for Web traffic
     Layer 7 Classification
    • Best for VoIP

Implementing and Configuring Meraki Technologies (ICMT-CT)