Implementing & Configuring Cisco Meraki Solutions Workshops (ICCMS)

Sunset Learning Exclusive

This 5-day boot camp provides students with the skills to configure, optimize, and troubleshoot all-important Cisco Meraki products like the security appliance platform (MX), the switching platform (MS), the wireless platform (MR), Meraki Cameras (MV), Meraki Sensors, and Meraki Insight Network Visibility & Traffic Analytics. Students will also gain detailed knowledge of the Meraki dashboard and will learn how to automate Meraki networks.


This workshop is based on real-world use cases and deployment experiences that will also be discussed with the students. We will point out real-life deployments whenever discussing topics or performing practical exercises. This will enable students to conduct POV / POC events to verify business cases after attending this workshop.

Course Information

Price: $4,295.00
Duration: 5 days
Certification: 
Exam: 
Learning Credits:
Course Delivery Options

Check out our full list of training locations and learning formats. Please note that the location you choose may be an Established HD-ILT location with a virtual live instructor.

Train face-to-face with the live instructor.

Access to on-demand training content anytime, anywhere.

Attend the live class from the comfort of your home or office.

Interact with a live, remote instructor from a specialized, HD-equipped classroom near you. An SLI sales rep will confirm location availability prior to registration confirmation.

All Sunset Learning dates are guaranteed to run!

Register

Prerequisites:

Before taking this course, you should have earned CCNA certification or be familiar with:

  • Network Fundamentals
  • IP Addressing and Subnets
  • Routing and Switching Technology
  • Wireless Networking Concepts and Terminology

 

Target Audience:

IT staff, network, and systems engineers interested in a comprehensive knowledge of all Meraki products and solutions.

 

Course Objectives:

After completing this course, students will be able to:

  • Understand various use cases and design the best solution for a given enterprise customer
  • Conduct a related POV / POC to allow the customer to verify their particular business case
  • Design, deploy, and monitor Cisco Meraki switches and wireless products
  • Integrate with other Cisco solutions like Identity Service Engine (ISE), Cisco Umbrella, etc.
  • Diagnose and resolve most user and network issues in enterprise-scale deployments

 

Course Outline:

Introduction to Meraki

  • Why Cisco Meraki
    • The Meraki Mission
    • Cloud-Managed Networking Architecture
    • Benefits of a Cloud-Based Solution
    • The Meraki Full Stack: New and Unique Value Proposition
    • Meraki Deployment
    • Use Cases: Why Customers choose Meraki
  • Meraki Product Overview
    • Meraki MS Switches
    • Meraki MR Wireless Access Points
    • Meraki MX Security and SD-WAN Appliances
    • Meraki MV Vision Security Cameras
    • Meraki System Manager (SM)
    • Meraki MT Sensors Access Points
    • Cisco Meraki Insight
  • Meraki API Overview
  • Meraki Licensing and Support

Cloud Management with the Meraki Dashboard

  •  Overview of the Meraki Dashboard
    • The Cisco Meraki Dashboard
    • Dashboard: Organizational Structure
    • Out-of-Band Cloud Management
    • Loss of Connectivity to the Cisco Meraki Cloud
    • Meraki Dashboard Logins
    • Create Dashboard Accounts and Organization
    • MSP Logins – Manage Multiple Organizations
    • Modify an Organization
    • View Organizations Health
    • Meraki Dashboard Best Practices
    • Dashboard Search
    • Meraki Help
  • Organization-Wide Settings
    • Configuring Organizational-Wide Settings
    • Using Configuration Sync to View and Copy Settings
    • Administrators
    • Configuring and Monitoring Licensing
    • Creating Bulk Networks
    • Creating and Managing Networks (Sites)
    • Managing the Meraki Inventory
  • Monitoring
    • Change Log, Login Attempts
    • Monitoring the Security Center
    • Using Location Analytics
    • Monitoring VPN Status
    • Scheduling and Managing Firmware
    • Using the Summary Report
  • Creating and Managing Configuration Templates
  • Configuring Network-Wide Settings
    • Traffic Analysis
    • Location and Scanning
    • Configuring CloudShark for Capturing Traffic
    • Manage the Local Status Page
    • Manage Syslog, SNMP, Location, and NetFlow Services
    • Managing Network Admins and Guest Ambassadors
    • Managing Network Users
    • Managing Port Management Privileges
    • Configuring Group Policies
    • Adding Devices to the Network
  • Monitoring Networks

Meraki MX Security

  • Meraki MX Overview
    • One Unified Platform
    • Complete Connectivity and Threat Management Solutions
    • Security Integrations / Interoperability
    • SD-WAN Solutions
    • MX Appliance Licensing
    • MX Sizing Guide
  • Basic Settings
    • Configuring the Local Status Page
    • Adding the Appliance to the Network
    • Device Configuration
    • Device Tags and Notes
    • Configuring Addressing and VLANs
    • DHCP Server Configuration and Options
  • Meraki Firewall Configuration
    • Firewall Basics
    • Layer 3 vs Layer 7 Firewall
    • Firewall Outbound Rules
    • Security Appliance Services
    • Layer 7 Firewall Rules
    • Content Filtering
    • Geo-IP Based Firewalling
    • Nat Configuration
  • Meraki Site-to-Site VPN
  • One-Arm VPN Concentrator Configuration
  • SD-WAN and Traffic Shaping
  • Meraki Client VPN
    • Enable Client VPN
    • Configure Client VPN
    • Client VPN Authentication Methods
    • VPN Clients
    • Enable the AnyConnect Client VPN
    • AnyConnect Client VPN Authentication Methods
  • Meraki Active Directory Integration
  • Meraki Threat Protection

 Meraki MS Switching

  •  Overview and Features
    • Avoiding Downtime, Client Disruption
    • Cloud Managed from Access through Aggregation
    • Ongoing Feature Updates Delivered from the Cloud
    • MS Feature: Multigigabit Ethernet
    • Integrated Event Logs, Alerts, and Anomaly Detection
    • Advanced Network-Wide Security
  • Meraki Switching Platforms
  • Switch Configuration
    • Using Tags to Search, Monitor, and Configure Meraki Switches
    • Add a Switch to the Network
    • Meraki Switch Settings
    • VLAN Configuration
    • Configuring Layer 2 and Layer 3
    • Configuring Static Routing
    • Configuring Access Control Lists (ACL)
    • Configuring Access Policies (802.1X)
    • Integrating Radius and ISE with Access Policies
  • Switch Stacks
    • Stacking Mechanisms and Availability
    • Meraki Stacking: Virtual and Physical
    • Cloud-Managed Physical Stacking
    • Flexible Stacking
    • Provisioning Switch Stacks
    • Create the Switch Stack
    • Delete the Switch Stack
    • View the Stack
    • Configuring Ports on a Stack Switch Ports
    • Blink the Switch
    • Add and Remove Members to the Stack
    • Clone and Replace a Member of the Stack
  • Port Configuration
    • Configuring Ports on a Switch
    • Configuring Ports using Ranges and Search Criteria
    • Configure Link Aggregation on a Switch
    • Configuring Port Schedules
    • Configuring Access Policies
    • Configure Port Mirroring
  • Meraki Multicast Configuration
    • How Does IP Multicast Work?
    • Internet Group Management Protocol
    • Enable Multicast Routing
    • IGMP Snooping Querier
    • Multicast Routing
  • Open Shortest Path First (OSPF)
    • OSPF Areas
    • OSPF LSA Types
    • Normal Area
    • Stub Area
    • Not-So-Stubby Areas (NSSA)
    • Open Shortest Path First (OSPF) Routing
    • Create OSPF Areas
    • Configure Interfaces into OSPF Areas
    • OSPF for Static Routes
    • OSPF Timers
    • OSPF Authentication
    • View OSPF Routes and OSPF Neighbors
  • Switch Monitoring
    • Monitoring Switch Status
    • Monitoring Switch Port Status
    • Monitoring Real-time and Historical Data
    • Monitoring DHCP on the Switch
    • Monitoring Power
    • Monitoring DHCP
    • Monitoring Event Logs
  • Firmware Upgrades

Meraki MR Wireless

  •  Overview and Features
    • MR Wireless Access Points
    • Meraki Built-In Location Analytics
    • Granular Control Over Bandwidth, Apps, and Client Devices
    • MR Feature: Multigigabit Ethernet
    • MR Feature: Mesh Routing
    • MR Dedicated Scanning Radio
    • Secure Guest Wireless
    • Built-In Bluetooth Beacons
    • Bluetooth Beacons
    • Built-In Meraki Location Heatmap
    • High-Density Support
    • ISE Integration
    • Guest Self-Registration
    • Cisco Umbrella and Cisco Meraki
    • DNS/Web-Layer Security
    • Zero Touch Provisioning
    • Meraki Application Program Interfaces (APIs)
    • Licensing and Support
  • Meraki Product Portfolio
    • Meraki MR Wireless Access Point Models Indoor
    • Meraki MR Wireless Access Point Models Outdoor
    • Directional Antennas
    • AP Adapter Options
    • Multi-Color LED Access Points
  • Designing a Meraki Wireless Architecture
    • Wireless Standards
    • Meraki RF WLAN Design
    • Site Survey / Site Survey Tools
    • Mounting APs Best Practices
    • Meraki Design Principles
    • Meraki Roaming Design
    • Switch Design for Meraki Wireless Networks
    • Designing Meraki Network Services
    • Organization and Network Design
    • Migrating Cisco DNA APs to Meraki Dashboard
  • Wireless Configuration
    • Connecting Access Points to the Network
    • Configuring Basic information including Tags
    • Configuring Wireless RF Radio Settings
    • Configuring Floor Plans
    • Placing Access Points on the Floor Plans
    • Configuring RF Channel and Power Settings
  • SSID Configuration
    • Provisioning SSIDs
    • Open with Splash Pages
    • Using Pre-Shared Keys with WPA2
    • Using WPA2-Enterprise SSIDs with 802.1X
    • Configuring Layer 3 Roaming
    • Configuring ISE Integration with Access Policies
    • Configuring Access Policies for Wireless
    • MAC-Based Access Control Filtered SSIDs
    • Firewall & Traffic Shaping Configuration
    • Traffic Shaping Rules per SSID
  • Bluetooth Settings
  • Wireless Radio Settings
    • Radio Settings
    • Channel Planning
    • Auto RF – Channel Changes
    • RF Profile
    • Client Balancing
  • Monitoring
    • Monitoring AP Status
    • Using Meraki Wireless Health
    • Monitoring Clients
    • Monitoring RF Metrics
    • Monitoring the RF Spectrum
    • Monitoring SSID Availability
  • Troubleshooting
    • Using Heatmaps to Troubleshoot RF Issues
    • Identify Problematic Areas
    • Signal Attenuation
    • Ping and Traceroute
    • Reboot Device
    • Blink LEDs
    • Throughput
    • Checking PCI Compliance
    • Using the Event Log for Troubleshooting

 Meraki MV Camera

  •  Meraki MV Security Cameras Product Family
    • Use Cases
    • Video Surveillance Solutions
    • Meraki Mobile App
    • Licensing
    • Architecture
    • Camera Video Display
    • Object Detection
    • Meraki Sense
    • Camera Intelligence Training
    • Cloud Archive
    • Secure Encrypted Video
  • Meraki MV Camera Models
  • Meraki MV Camera Accessory
  • Network Wide Settings for NV Cameras
  • Security Role Configuration for MV Cameras
  • Switch Configuration for MV Cameras
  •  Monitoring MV Cameras
  • Wireless Role Configuration for MV Cameras
  • Viewing Video
    • Retroactive Video Search
    • Video Viewing
    • Motion Search
    • Export / Screen Shot
    • Video Analytics – People Count
    • Video Analytics – Motion Heatmaps
  • MV Camera Intelligence Training
  • MV Camera Initial Configuration
    • Camera Name
    • Analytics
    • Physical Address
    • Network Settings
    • Location Map
    • Video Settings
    • Quality and Retention
    • Low Light Mode
    • Motion Alerts
    • Wireless Profiles
  • MV Video Access
  • Meraki Export
  • MV Video Wall
  • Meraki Vision
  • MV Cameras APIs
    • Use Cases
    • MV Sense
    • MV Sense Data Types
    • REST vs MQTT (MQ Telemetry Transport) APIs
    • Zones
    • Optimized Video Retention
    • Full Frame Snapshots via API
  • Meraki Magic

 Meraki Sensors

  • What is – Meraki Sensors?
    • Meraki Sensors family
    • Physical Spaces
    • Use Cases – Consuming Telemetry at Scale
    • Connectivity
    • Device Security
    • Room Usage
    • Sensor Sight
    • Volatile Organic Compounds (VOC)
    • Particulate Matter (PM2.5)
    • Smart Automation Button

 Meraki Insight Network Visibility & Traffic Analytics

  •  Meraki Insight Introduction
  • Meraki Insight Licensing
  • Meraki Insight Web App Health
    • Configure Web Application
    • Web Application Performance
    • WAN Health
    • VoIP Health
  • Meraki Insight Alerting

Automating Meraki Networks 

  • Introducing Meraki Automation
    • Dashboard APIs
    • Setting up Postman for Meraki


Lab Exercises

Generic Configuration Tasks

  • Creating a Dashboard Account
  • Configure Organizational Settings
  • Add Devices to Your Organization
  • Create Networks
  • Manage Network-Wide Settings
  • Create Group Policies
  • Manage Firmware Upgrades
  • Create Templates
  • Manage VLAN Templates
  • Bind Templates to Networks

Configuring MX Appliances

  • Basic Configuration Tasks
    • Viewing / Verifying License Information
    • Bootstrapping the Local Status Page
    • Creating a Network
    • Claiming / Adding Devices
    • General Settings
    • Ensuring WAN Connectivity using PING
    • Rebooting the Meraki Security Appliance and other useful Tools
  • Configuring the MX Appliance
    • Configuring VLANs and Layer 3 Interfaces
    • Configuring Layer 3 Firewall Rules
    • Configuring Layer 7 Firewall Rules
    • Configuring Content Filtering
    • Configuring Traffic Shaping
    • Configuring SD-WAN Policies for Traffic Preference
    • Configuring Client VPN against Meraki Cloud Directory
    • Configuring Client VPN against Active Directory
    • Configuring Site-to-Site VPN
    • Integrating Meraki MX Appliance with Active Directory
    • Identity Based Group Policies
    • Create / Configure Splash Pages
  • Content Filtering and Threat Protection
    • Adult Content Filtering
    • Gaming Content Filtering
    • Social Site Content Filtering
    • Threat Protection – AMP
    • Threat Protection – IDS/IPS
  • MX Verification and Troubleshooting
    • Appliance Status
    • Site-to-Site VPN
    • Firewall Settings
    • Routing Table
    • Using Packet Capture

Configuring MS Switches

  • Switch Configuration
    • Basic Switch Settings
    • Spanning Tree
    • DHCP Servers and ARP
    • Routing and DHCP Servers
    • OSPF Routing
    • Access Control List (ACL)
    • Access Policies
    • Packet Captures
    • Port Policies
  • Configure Switches Using a Network Template
  • Configuring Ports
    • Trunk Ports, Access Ports
    • Link Aggregation
    • Port Schedules
    • Port Mirroring
  • Switch Monitoring
    • Switch Status, Port Status
    • Real-Time and Historical Data
    • DHCP and Routing
    • Event Logs
  • Troubleshooting Tools
    • Packet Captures, Cable Tests, Port Reset
    • Throughput
    • ARP and Route Tables
    • Ping and Traceroute
  • Managing Firmware Upgrades

Configuring MR Wireless Devices

  • Configuring Meraki Access Points
    • Claiming your Devices and adding Devices to your Organization
    • MR Access Point Management
    • Accessing Meraki MR Devices – Local Status Page
    • Troubleshooting the Local Status Page
    • Checking Status of Meraki MR Devices Health and Connectivity
    • Configuring Templates and Deploying / Managing Meraki MR Devices through Templates
    • Unbinding Networks from a Template
    • Deleting a Configuration Template
    • Configuring Access Point Tags
    • Organizing a Wireless Network with Multiple Access Points
    • VLAN Tagging on Specific Access Points
  • Configuring SSIDs
    • Provisioning SSIDs
    • Open with Splash Pages
    • Using Pre-Shared Keys with WPA2
    • Using WPA2-Enterprise SSIDs with 802.1X
    • MAC-based Access Control Filtered SSIDs
  • Firewall & Traffic Shaping Configuration for Wireless
    • Blocking the Local Network for Guests
    • Layer 3 Firewall Rules
    • Blocking Applications
    • Traffic Shaping Rules per SSID
    • Configuring Layer 3 Roaming
    • Configuring ISE Integration with Access Policies
    • Configuring Access Policies for Wireless
    • Configuring Wireless RF Radio Settings
    • Configuring Bluetooth for Analytics
    • Guest Self-Registration
    • Configuring Splash Pages
    • Configuring Floor Plans
    • Placing APs on the Floor Plans
    • Configuring RF Channel and Power Settings
    • Configure Air Marshall to Isolate Rogue APs and Clients
  • Monitoring Meraki Access Points
    • Monitoring AP Status
    • Using Meraki Wireless Health
    • Monitoring Clients
    • Monitoring RF Metrics
    • Monitoring the RF Spectrum
    • Monitoring SSID Availability
  • Troubleshooting
    • Using Heatmaps to Troubleshoot RF Issues
    • Identify Problematic Areas
    • Signal Attenuation
    • Ping and Traceroute
    • Throughput
    • Checking PCI Compliance
    • Using the Event Log for Troubleshooting

Automation using Meraki APIs

  • Meraki Dashboard API with Postman
  • Meraki Organization and Networks Import into Postman
  • Meraki Devices into the appropriate Networks using APIs
  • Troubleshooting Meraki using APIs

Meraki MV Cameras

  • Adding Cameras to a dedicated Network
  • Configuring Users and Admins
  • Camera Settings
  • View Camera Events
  • Searching Videos for Events
  • Creating / Configuring Video Wall Boards
  • Troubleshooting Camera Connectivity

Meraki Insight

  • Configuring Web Application Health
  • Configuring Alert Management for WAN Packet Loss
  • Configuring Alert Management for WAN Utilization
  • Configuring Alert Management for Uplink Latency
  • Monitor WAN Health