Introducing the Cloud and the Cisco Meraki Dashboard
- Single Pane of Glass Management
- Cisco Meraki Full-Stack Capabilities
- Cisco Meraki Devices and the Cloud
- Benefits of a Cloud-Based Solution
- Cisco Meraki Dashboard Organizational Structure
- Multiorganizational Structure
- Licensing
- Cisco Meraki Dasboard Demo
Introducing Cisco Meraki Products and Administration
- Cisco Meraki MX Security and SD-WAN Appliance
- Cisco Meraki MS Switches
- Cisco Meraki MR Wireless APs
- Cisco Meraki Systems Manager Endpoint Management
- Cisco Meraki MV Security Cameras
- Cisco Meraki Insight Web-Based Application Analytics
- Advanced Use of Cisco Meraki Dashboard Demo
Introducing Cisco Meraki Troubleshooting
- Cisco Meraki Dashboard Sync
- Cisco Meraki Monitoring and Troubleshooting Tools
- Integration of Cisco Meraki Monitoring and Troubleshooting Tools into existing systems
- Application Programming Interfaces
- How to Work with Cisco Meraki Support
- Cisco Meraki Troubleshooting Demo
Planning New Cisco Meraki Architectures and Expanding Existing Deployment
- Cisco Meraki Soluton Sizing
- Explore Various Dashboard User Interface Features Demo
- Licensing
- Reference
Designing for Scalable Management and High Availability
- Role-Based Access
- Tag Design and Structure
- Cisco Meraki MX Security Appliance High-Availability
- Cisco Meraki MS Switch High Availability
- High-Density Wireless Design
- References
Automating and Scaling Cisco Meraki Deployments
- RBAC with SAML
- Configure SAML and Create SAML Roles Demo
- Network Cloning
- Clone a Network and Synchronize a Configuration Demo
- Configuration Templates
- Explore Configuration Template Demo
- Network Provisioning with APIs
- Use Google Sheets and Script Editor with the Cisco Meraki Dashboard API Demo
- References
Designing Routing on the Cisco Meraki Platform
- Routing Across Cisco Meraki Networks
- Explore Layer 3 Routing Including Creating, Editing and Moving SVIs Demo
- Dynamic Routing with OSPF
- BGP for Scalable WAN Routing and Redundancy
Introducing QoS and Traffic Shaping Design
- Wireless and Wired QoS Design
- Prepare the Network for Voice
- Traffic Shaping and Prioritizing on the Cisco Meraki MX Platform
Building VPN and WAN Topologies
- Cisco Meraki MX VPN Operation Modes
- VPN Design and Topologies
- Auto VPN
- Design a Scalable VPN Topology
- Explore the Cisco Meraki MX Sizing Guide Demo
- Integrate Cisco Meraki vMX into an Auto VPN Architecture
- SD-WAN Fundamentals
- SD-WAN Design
- Explore CIsco Meraki vMX and SD-WAN Configurations in the Dashboard Demo
Securing, Expanding, and Shaping the Network
- Cisco Meraki Security Overview
- Default Behavior and Rule-Processing Order
- Advanced Security Services
- Content Filtering
- Cisco Umbrella Integration
Introducing Switched Network Concepts and Practices
- Access Policies Using Cisco Meraki Authentication
- Cloning of Switch Settings
- Switch Templates and Profiles
- Explore Switch Profiles Demo
- LAN and WLAN Guest Access Best Practices
- References
Implementing Wireless Configuration Practices and Concepts
- Cisco Meraki Dashboard Maps and Floor Plans
- RF Profiles
- Wireless Encryption and Authentication
- SSID Modes for Client IP Addressing
- Bluetooth Low Energy
- BLE Scanning and Bluetooth Clients Demo
- Wireless Threats
Introducing Endpoint Management Concepts and Practices
- Cisco Meraki Systems Manager Platform Overview
- Cisco Meraki Systems Manager Overview Demo
- Device Deployment Methodologies
- Deployent of Application and Containerization Profiles
- Security Policies and Devices Out of Compliance Demo
- Pairing Network Group Policies with Systems Manager Demo
- Agentless Onboarding with Trusted Access
Introducing Physical Security Concepts and Practices
- Cisco Meraki MV Architectures
- Flexible Camera Deployments with Wireless
- Cisco Meraki MV Product Portfolio, Features and Functionalities
- Motion Search, Motion Recap, Motion Heat Maps, and Person Detection Demo
- Business Intelligence
-
Gaining Network Insight by Monitoring Applications
- Cisco Meraki Insight Overview
- Cisco Meraki Insight Scaling and Licensing
- Cisco Meraki Insight Overview: A Closer Look at Tracked Applications and WAN Health Demo
Preparing, Monitoring, Logging, and Alerting Services
- Logging Capabilities
- Examine Event, Change, and Video Access Logs Demo
- Monitoring Tools and Services
- Examine Monitoring Tools and Features Demo
- Supported Alerts
- Cisco Meraki Dashboard API
- References
Setting Up Reporting and Auditing Capabilities in the Cisco Meraki Dashboard
- Cisco Meraki Reports
- Manage Firmware Through the Dashboard
- PCI Auditing
- References
Gaining Visibility and Resolving Issues Using Cisco Meraki Tools
- Troubleshooting Methods
- Logging Capabilities
- Cisco Meraki Security Center Overview Demo
- Wireless Troubleshooting
- Explore Wireless Troubleshooting Tools Demo
- Troubleshoot Cisco Meraki Cloud Application Performance
- Troubleshoot Cisco Meraki Auto VPN
- Explore VPN Status, Firewall, and Static Port Forwarding
- Local Status Page
- References
Labs
- Discovery Lab 1; Configure the Cisco Meraki Dashboard
- Discovery Lab 2: Enable Advanced Features and Optimize Networking
- Discovery Lab 3: Troubleshoot the Network Using the Cisco Meraki Dashboard
- Discovery Lab 4: Configure Tags, Link Aggregation, Port Mirroring, and High-Density SSIDs
- Discovery Lab 5: Establish Auto VPN
- Discovery Lab 6: Configure Virtual Interfaces and Routing on Cisco Meraki MS Switches
- Discovery Lab 7: Configure Routes and Redistribution
- Discovery Lab 8: Configure QoS,
- Discovery Lab 9: Configure Traffic Shaping
- Discovery Lab 10: Configure Load Balancing
- Discovery Lab 11: Define Firewall Rules
- Discovery Lab 12: Enable Advanced Malware Protection
- Discovery Lab 13: Enable Content Filtering
- Discovery Lab 14: Configure and Apply Access Policies
- Discovery Lab 15: Configure Wireless Guest Access
- Discovery Lab 16: Configure SSIDs
- Discovery Lab 17: Implement RF Profiles
- Discovery Lab 18: Implement Air Marshal
- DIscovery Lab 19: Create Cisco Meraki Systems Manager Configuration Profiles
- Discovery Lab 20: Define Security Polices
- Discovery Lab 21: Enforce End-to-End Security
- Discovery Lab 22: Setup Motion Alerts
- Discovery Lab 23: Deploy Wireless Cameras
- Discovery Lab 24: Manage Video Retention
- Discovery Lab 25: Enable Alerts
- Discovery Lab 26: Add Monitring and Reporting
- Discovery Lab 27: Generate and Analyze Summary Reports
- Discovery Lab 28: Manage Firmware
- Discovery Lab 29: Generate a PCI Compliance Report
- Discovery Lab 30: Troubleshoot an Offline Device
- Discovery Lab 31: Troubleshoot Content Filtering
- Discovery Lab 32: Troubleshoot Remote Site Connectivity