Day 1
SDN Basics
Module 1: Introduction to Meraki
• The Meraki Mission
• Cisco Meraki: Bringing the Cloud to Enterprise Networks
• Cloud-Managed Networking Architecture
• Benefits of a Cloud-Based Solution
• The Meraki Full Stack: New and Unique Value Proposition
• Meraki Deployment – How it works
• Why Customers Choose Meraki
• Meraki MS Switches Overview
• Meraki MX Security Appliances Overview
• Meraki MR Wireless Access Points Overview
• Meraki API Overview
• Meraki Licensing
• Enterprise Support
• Cisco Meraki Documentation
Module 2: Cloud Management with the Meraki Dashboard
• The Cisco Meraki Dashboard
• Dashboard: Organizational Structure
• Out-of-band Cloud Management
• Loss of Connectivity to the Cisco Meraki Cloud
• Meraki Dashboard Logins
• Create Dashboard Accounts and Organization
• MSP Logins – Manage Multiple Organizations
• Modify an Organization
• View Organizations Health
• Meraki Dashboard Best Practices
• Dashboard Search
• Meraki Help
• Organizational Wide Settings
o Configure
§ Configuring Organizational Wide Settings
§ Using Configuration Sync to View and Copy Settings
§ Administrators
§ Configuring and Monitoring Licensing
§ Creating Bulk Networks
§ Creating and Managing Networks (sites)
§ Managing the Meraki Inventory
o Monitor
§ Overview
§ Monitoring the Change log
§ Monitoring Login Attempts
§ Monitoring the Security Center
§ Using Location Analytics
§ Monitoring VPN Status
§ Scheduling and Managing Firmware
§ Using the Summary Report
o Create and Manage Configuration Templates
§ Understand Configuration Templates
§ VLAN Templates
• Network Wide Settings
o Configure
§ Configuring Network Wide General Settings
§ Traffic Analysis
§ Location and Scanning
§ Configuring CloudShark for Capturing Traffic
§ Manage the Local Status Page
§ Manage Syslog, SNMP, Location, and NetFlow Services
§ Managing Network Admins and Guest Ambassadors
§ Managing Network Users
§ Managing Port Management Privileges
§ Configuring Group Policies
§ Adding Devices to the Network
§ Monitoring Networks
§ Monitoring Clients
§ Monitoring Traffic Analytics
§ Displaying and Exploring the Meraki Topology
§ Performing Packet Captures
§ Using the event Log to Perform Troubleshooting
Day 2
• Module 3: Meraki MX Security
• Configuring the Local Status Page
• Adding Appliance to Network
• Device Configuration
• Device Tags & Notes
• Configuring Addressing & VLANs
o Pass-Through or VPN Concentrator Mode vs NAT Mode
o Creating VLANs
• DHCP Server Configuration and Options
• Meraki Firewall Configuration
o Firewall Basics
o Layer 3 vs Layer 7 Firewall
o Firewall Outbound Rules
o Security Appliance Services
o Layer 7 Firewall Rules
o Content Filtering
§ Adult Content Filtering
§ Gaming Content Filtering
§ Social Site Content Filtering
o Geo-IP Based Firewalling
o Nat Configuration
Day 3
• Meraki Site-to-Site VPN
o What is VPN
o Site-to-Site Hub Configuration
§ Hub Configuration
§ Hub Configuration with an Exit Hub
§ Spoke Configuration
§ Split Tunnel vs Full Tunnel
§ VPN Firewall Rules
§ Monitor VPN Status
• One Arm VPN Concentrator Configuration
o OSPF Configuration
• Meraki WarmSpare
• SDWAN and Traffic Shaping
o Uplink configuration
o Uplink selection
o Policy based routing
o Performance based routing
o Traffic shaping rules
• Meraki Client VPN
o Enable Client VPN
o Configure Client VPN
o Client VPN Authentication Methods
o VPN Clients
• Meraki Active Directory Integration
o Active Directory Authentication
o Active Directory integration with Group Policy
• Meraki Templates
• REST API usage
• Configuring Access Policies
Day 4
1. Module 4: Meraki Switching
• MS Switch Platforms and Features
• MS Feature: Multi-gigabit Ethernet
• Cisco Meraki MS Access Switches
• Meraki MS 120/220 Switch Family
• Meraki MS 210/225 Switch Family
• Meraki MS 250/250X Switch Family
• Using Tags to search, monitor and configure Meraki Switches
• Meraki Switch Configuration
• Add a Switch to the Network
• VLAN Configuration
• Configuring Layer 2 and Layer 3
• Configuring Static Routing
• Configuring Access Control Lists (ACL)
• Configuring Access Policies (802.1X)
• Integrating Radius and ISE with Access Policies
• Port Configuration
o Configuring Ports on a Switch
o Configuring Ports using Ranges and Search Criteria
o Configure Link Aggregation on a Switch
o Configuring Port Schedules
o Configuring Access Policies
o Configure Port Mirroring
• Meraki Switch Monitoring
o Monitoring Switch Status
o Monitoring Switch Port Status
o Monitoring Real-time and Historical Data
o Monitoring DHCP on the Switch
o Monitoring Power
o Monitoring DHCP
o Monitoring Event Logs
• Troubleshooting Tools
o Turn on Switch Blinking for Switch Identification
o Performing Packet Captures
o Performing Port Reset
o Performing Throughput Test
o Performing device Reboots
o Using ARP and Route Tables for Troubleshooting
o Troubleshoot using Ping and Traceroutes
• Managing Firmware Upgrades
Module 5: Meraki MR Wireless
• Meraki MR Wireless Overview
• Meraki 2.5G Multigigabit (MGig) Wireless
• Meraki’s solution for RF Environments
• Securing Guest Wireless
• Bluetooth Integrated Analytics
• Meraki Location Heatmap
• High Density Wireless
• Zero-Touch Provisioning for Wireless
• Dedicated Scanning Radio for Rouges and Interferences
• Meraki MR Licensing
• IEEE 802.11 Wireless LAN Standards
o 802.11b/g 2.4 Spectrum
o 802.11b/g 2.4 Channel Plan
o 802.11a/ac 5 GHz
o Channel Planning
• Configuring Meraki APs
o Connecting APs to the Network
o Configuring Basic information including Tags
o Configuring Wireless RF Radio Settings
Auto RF
Transmit Power Control
Channel Selection
Band Steering
Client Balancing
o Configuring Floor Plans
o Placing APs on the FloorPlans
o Configuring RF Channel and Power Settings
o Configure Air Marshall to Isolate Rougue APs and Clients
Day 5
• Configuring SSIDs
o Provisioning SSIDs
o Open with Splash Pages
§ Click-Through
§ Systems Manager Sign-in
§ Facebook Sign-in
§ Google Sign-in
§ SMS Authenticated
§ Billing Configuration for SSIDs
o Using Preshared Keys with WPA2
o Using WPA2-Enterprise SSIDs with 802.1X
§ RADIUS
§ Cisco ISE
o Configuring Layer 3 Roaming
o Configuring ISE Integration with Access Policies
o Configuring Access Policies for Wireless
o MAC-based Access Control Filtered SSIDs
• Firewall & Traffic Shaping Configuration for Wireless
o Block local network for Guests
o Layer 3 Firewall Rules
o Block Applications
o Traffic Shaping Rules per SSID
• Monitoring Meraki APs
o Monitoring AP Status
o Using Meraki Wireless Health
o Monitoring Clients
o Monitoring RF Metrics
o Monitoring the RF Spectrum
o Monitoring SSID Availability
• Trouble Shooting
o Using Heatmaps to Troubleshoot RF Issues
o Identify Problematic Areas
o Signal Attenuation
o Ping and Traceroute
o Reboot Device
o Blink LEDs
o Throughput
o Checking PCI Compliance
o Using the Event Log for Troubleshooting