Description
Who should attend
The primary audience for this course is as follows:
- IT Staff and Managers
- Network and Systems Personnel and Engineers
- Small to mid-sized organizations that require fundamental knowledge on networking terms/concepts and configuration guidance for Meraki equipment
- This also includes organizations looking to implement remote sites, provide a guest wireless solution, and collect user analytics
Course Objectives
Following completion of this course, students will understand, Install, Configure, Monitor, and Troubleshoot the following:
- Navigate and Configure the dashboard
- Add MX/MR/MS/MV devices to the Dashboard
- Understand and Configure Configuration Templates
- Understand and Configure Group Policies
- Manage/Configure/Integrate Users and Radius Policies
- Configure, Monitor, and Troubleshoot MR Access Points
- Monitor Meraki Network Health
- Troubleshoot devices and Connectivity
Outline: Meraki MR Wireless Installing, Configuring, Monitoring, and Troubleshooting (MWA-ICMT)
Module 0: Introductions
- Module Introduction
- Topic List
- Lesson 1: Introductions
- Course Goal
- WebEx Basics
- General Administration
- Introductions
- The Integrated Cisco Network
- Module Summary
Module 1: Introduction to Meraki
- Module Introduction
- Topic List
- Lesson 1: Why Cisco Meraki?
- Cloud Management
- Lesson 2: Meraki Product Overview
- Meraki MS Switches
- Meraki MR Wireless Access Points
- Meraki MX Security and SD-WAN Appliances
- Meraki MV Vision Security Cameras (MG and MT)
- Meraki Systems Manager (SM)
- Meraki MT Sensors Access Points
- Cisco Meraki Insight
- Lesson 4: Meraki Licensing and Support
- Enterprise Support and Hardware Warranties
- Cisco Meraki Documentations
- Module Summary
Module 2: Cloud Management with the Meraki Dashboard
- Module Introductions
- Topic List
- Lesson 1: Overview of the Meraki Dashboard
- The Cisco Meraki Dashboard
- The Meraki Phone App
- Dashboard: Organizational Structure
- Meraki Dashboard Best Practices – Campus
- Dashboard Compliance and Data Protection
- Cloud Reliability
- Loss of Connectivity to the Cisco Meraki Cloud
- Safe Configuration
- Meraki Dashboard Login (1)
- Create Dashboard Account (1)
- Create Dashboard Account and Organization
- Verify Created Account
- First Login to New Organization
- Account Login with Multiple Assigned Organizations
- Manage Multiple Organizations
- View Health Status for Multiple Organizations (1)
- Meraki Dashboard Best Practices – Multiple Locations
- Dashboard Search
- Logged in User Profile
- Modify User Profile (1)
- Announcements
- Lesson 2: Help & Support
- Meraki Help
- Dashboard – Help – Get Help (1)
- Dashboard – Help – Community
- Dashboard – Help – Marketplace
- Dashboard – Help – Cases
- Dashboard – Help – Data Protection Requests
- Dashboard – Help – New Features
- Dashboard – Help – Firewall Rules Info
- Dashboard – Help – API Docs
- Dashboard – Help – Hardware Replacement
- Dashboard – Give Your Feedback
- Lesson 3: Organizational Wide Configure Settings
- Organizational Menu Settings
- Settings – Org Name and Security Settings
- Settings – Authentication (1)
- Configuring SAML SSO with ADFS
- Configuring SAML SSO with OneLogin
- Settings – Administration Settings
- Settings – Privacy and Support Access Settings
- Settings – SNMP Configuration
- Settings – Threat Grid
- Settings – Dashboard API Access
- Settings – Delete This Organization
- Organization > CONFIGURE > Configuration Sync
- Configuration Sync
- Organization > CONFIGURE > MDM
- Organization > CONFIGURE > Administrator
- Create Administrator Account – Org Access
- Create Administrator Account – Network Access
- Create Administrator Account – Camera Access
- Create Administrator Account
- Verify Administrator Account
- Deleting an Administrator Account
- Organization > Configure > Camera Roles
- Organization > Configure > License Info
- License Information – Co-Termination
- Add Licenses to Organization – Co-Termination
- License History – Co-Termination
- Converting to PDL (Per Device Licensing) (1)
- Licensing & Inventory Page – PDL (1)
- Organization > CONFIGURE > Create Network
- Create Network – Setup Network
- Create Network – Select Devices from Inventory
- Create Network – Add Devices
- Finding Meraki Order Number
- Delete Networks
- Organization > Configure > Inventory
- Organization > Inventory – Searching for Devices
- Organization > Inventory – Claiming Devices
- Organization > Inventory – Unclaiming Devices
- Organization > Add a Device to a Network
- Recovering a Missing or Stolen Device
- Organization > Monitor > Overview > Networks
- Organization > Monitor > Overview > Networks Tags
- Organization > Monitor > Overview > Devices
- Organization > Monitor > Change Log
- Organization > Monitor > Login Attempts
- Organization > Monitor > Security Center (1)
- Organization > Monitor > Location Analytics (1)
- Organization > Monitor > VPN Status
- Organization > Monitor > Firmware Upgrades
- Firmware Upgrades – Scheduling Firmware Upgrades (1)
- Organization > Monitor > Firmware Upgrades (1)
- Organization > Firmware Upgrades > Overview
- Organization > Firmware Upgrades > Firmware Status
- Organization > Firmware Upgrades > Firmware Release Notes
- Organization > Firmware Upgrades > Firmware Roll Back (1)
- Firmware Upgrades Through APIs
- Organization > Monitor > Summary Report (1)
- Organization > Summary Report – Anomalies
- Organization > Summary Report – Clients with High Usage
- Organization > Summary Report – Usage stats
- Organization > Summary Report – Sessions
- Organization > Top SSIDs by Usage
- Organization > Summary Report – Top Devices
- Top Device Models by Usage
- Top Security Appliances by Utilization
- Summary Report – Port Utilization Graph
- Summary Report – Client Stats
- Summary Report -Top Clients by Usage
- Clients
- Organization -Top Client Device Manufacturers
- Organization -Top Operating Systems By Usage
- Organization – Top Application Categories
- Organization – Top Applications by Usage
- Organization – Power Details
- Lesson 4: Network Wide Settings
- Network-Wide
- Network Wide > Configure > General (1)
- Network-Wide > General > Traffic Analysis
- Network-Wide > General > Location and Scanning
- Network-Wide > General > SMS Auth with Twilio
- Network-Wide > General > CloudShark
- Network-Wide > Wireless Multicast to Unicast Conversion
- Network-Wide > General > Device Configuration (1)
- Network-Wide > General > Reporting > Syslog
- Network-Wide > General > SNMP
- Network-Wide > General > Reporting > Location
- Network-Wide > General > NetFlow
- Network-Wide > General > Firmware Upgrades
- Network-Wide > General > Switch & Wireless Alternate Management Interface (1)
- Network-Wide > General > Status & APIs
- Network-Wide > General > Status
- Network-Wide > General > Umbrella
- Network-Wide > Administration > Org Admins
- Network-Wide > Administration > Network Admin
- Network-Wide > Administration > Guest Ambassadors
- Network-Wide > Admin > Port Management Privileges
- Network-Wide > General > Camera-Only Admins
- Network-Wide > Users > Guest Access
- Network-Wide > Users (1)
- Network-Wide > Group Policy
- Network-Wide > Group Policy > New Group
- Network-Wide > Group Policy > Schedule
- Network-Wide > Group Policy > Bandwidth
- Network-Wide > Group Policy > Hostname Visibility
- Network-Wide > Group Policy > Firewall
- Firewall – Layer 7 Rules
- Network-Wide > Group Policy > Umbrella
- Network-Wide > Group Policy > Traffic Shaping (1)
- Network-Wide > Group Policy > Wireless Only
- Network-Wide > Group Policy > Security Appliance Only
- Network-Wide > General > Add Devices
- Network Wide > Monitor > Clients (1)
- Searching for Clients
- Modifying Columns
- Network Wide > Monitor > Clients > Applications
- Network Wide > Monitor > Clients > Ports
- Network Wide > Monitor > Clients > HTTP Content
- Network Wide > Monitor > Clients > Custom Pie Chart
- Changing the Policies Applied to a Client
- Adding a Client
- Display Client Information – Overview (1)
- Display Client Information – Connections (1)
- Display Client Information – Performance (1)
- Display Client Information – Timeline
- Network-Wide > Monitor > Traffic Analytics (1)
- Network-wide > Monitor > Topology
- Topology – L2
- Topology – L3
- Lesson 5: Packet Captures
- Packet Capture for Multiple Devices (1)
- Event log (1)
- Lesson 6: Location / Mapping Devices
- Maps & Floor Plans (1)
- Maps & Floor Plans – Drag & Drop Devices
- Maps & Floor Plans – Assign Devices to…
- Maps & Floor Plans – Geolocate Devices (1)
- Maps & Floor Plans (1)
- Lesson 7: Configuring Templates
- Organization > Monitor > Configuration Templates
- Templates
- Configuration Templates > Create New Template (1)
- Configuration Templates
- Unbinding Networks from a Template
- Splitting Configuration Templates
- Combining Configuration Templates
- Deleting a Configuration Template
- MR – Wireless Network Templates
- MX/Z3 – Template VLAN IP Address Range Allocations
- MX/Z3 – Template VLAN IP Address Range Allocations
- VLAN Templates
- Configuration Templates (1)
- MS Templates
- Switch Profiles
- Configuration Templates > Local Overrides (1)
- Configuration Templates > Local Overrides
- Module Summary
Module 3: Meraki MR Wireless
- Module Introduction
- Topic List
- Lesson 1: Wireless Features
- MR Wireless Access Points
- Meraki Location Analytics are Built-in
- Granular Control Over Bandwidth, Apps, and Client Devices
- MR Feature: Multigigabit Ethernet
- MR Feature: Mesh Routing
- MR Dedicated Scanning Radio
- Secure Guest Wireless in Seconds
- Built-in Bluetooth Beacons
- Bluetooth Beacons
- Meraki Location Heatmap is Built-in
- High Density Support
- ISE Integration
- Guest Self-Registration
- Cisco Umbrella and Cisco Meraki
- DNS/Web-layer Security – Solution Overview
- Zero -Touch Provisioning
- Meraki | Application Program Interfaces (APIs)
- Licensing and Support
- Lesson 2: Wireless Standards
- IEEE 802.11 Wireless LANs
- 802.11b/g 2.4 GHz Spectrum
- 802.11b/g 2.4 GHz Channel Plan
- 802.11a/n/ac 5 GHz Channels
- 802.11a/ac 5 GHz Channels
- 802.11ac Standard
- 802.11ac Wave 1
- 802.11ac Wave 2
- 802.11ac Wave 1 vs Wave 2
- 802.11ax Wi-Fi 6
- Wi-Fi 6 Key Technologies
- Wi-Fi 6 Key Technologies – Backwards Compatible
- Wi-Fi 6 Key Technologies – Spatial Diversity and MU-MIMO
- Wi-Fi 6 Key Technologies – Orthogonal Frequency Division Multiple Access (OFDMA)
- Wi-Fi 6 Key Technologies – 1024 Quadrature Amplitude Modulation (QAM)
- Wi-Fi 6 Key Technologies – BSS Color
- Wi-Fi 6 Key Technologies – Target Wakeup Time (TWT) (1)
- Lesson 3: Site Survey
- Site Survey & Design
- Capacity Planning
- Types of Site Surveys – Passive Surveys
- Types of Site Surveys – Active Surveys
- Types of Site Surveys – Predictive Surveys
- Site Survey Tools
- MR Internal AP 2.4 GHz Radiation Pattern
- MR Internal AP 5 GHz Radiation Pattern
- Mounting Meraki MR Wireless APs
- Identify Problematic Areas
- Signal Attenuation
- Site Survey & Design
- Lesson 4: Meraki MR Models
- Meraki MR Wireless AP Models Indoor
- MR20 Indoor AP
- MR30H Indoor AP
- MR33 Indoor AP
- MR42 Indoor AP
- MR42E Indoor AP
- MR52 Indoor AP
- MR53 Indoor AP (M-Gig)
- MR53E Indoor AP (M-Gig)
- Meraki MR Wireless AP Models Indoor
- MR45 Indoor AP (M-Gig)
- MR55 Indoor AP
- MR36 Indoor AP
- MR36H Indoor AP
- MR44 Indoor AP (M-Gig)
- MR46 Indoor AP (M-Gig)
- MR46E Indoor AP (M-Gig)
- MR56 Indoor AP (M-gig)
- Meraki MR Access Point Models Outdoor
- MR70 Outdoor AP
- MR74 Outdoor AP
- MR84 Outdoor AP
- MR76 Outdoor AP
- MR86 Outdoor AP
- Directional Antennas
- External Antennas – Indoor Aps
- External Antennas for Outdoor/Ruggedized APs
- AP Adapter Options
- Multi-Color LED Access Points
- Meraki MR Wireless AP Models Indoor
- Lesson 5: Wireless Configuration
- Wireless > Access Points > Access Point Status Page (1)
- Set the AP Name
- Set the AP Location
- Default SSID and Channel Selection
- Dynamic IP Addressing and VLAN Assignment for AP
- Static IP Addressing for AP
- LAN IPv6 Addressing
- Serial Number, Tags, and Notes
- Firmware, Config and Power
- Wireless > Monitor > Access Points > Summary
- Access Points > Summary > Current Clients
- SUMMARY > Radius and VLAN Request Status
- SUMMARY > Utilization on Current Channels (1)
- SUMMARY > Live Mesh Neighbors
- SUMMARY > Historical Data (1)
- Access Points > Event Log (1)
- Access Points > Full Event Log
- Access Points > Location > Map
- Access Points > Location > Satellite
- Access Points > Location > Photo
- Access Points > Location > Topology
- Access Points > Connections (1)
- Access Points > Performance (1)
- AP > Tools Tab > Ping
- AP > Tools Tab > Reboot Device
- AP > Tools Tab > Blink LEDs
- AP > Tools Tab > Dashboard Throughput
- AP > Tools Tab > Traceroute
- AP > Tools Tab > ARP Table
- AP > LAN Tab > Radius Request Status
- AP > LAN Tab > VLAN Request Status
- Lesson 6: SSID Configuration
- Configuring SSIDS
- Provision SSIDS
- Access Control
- Wireless Encryption and Authentication
- Access Control (1)
- Access Control > Open
- Access Control > Pre-Shared Keys
- Access Control WPA versions
- Access Control 802.11w
- Access Control > MAC-based Access Control
- Access Control > Enterprise with…
- Access Control > Supported EAP Types
- Enterprise with 802.1X Authentication
- Enterprise with Meraki Authentication – SM
- Enterprise with Meraki Authentication – Trusted Access (1)
- Enterprise with…
- Access Control > Identity PSK with Radius
- Access Control > Splash Page
- Access Control > Splash Page > None
- Access Control > Splash Page > Click-through
- Access Control > Splash Page > Sponsored Guest Login
- Access Control > Splash Page > Sign-on
- Access Control > Splash Page > SMS Auth.
- Access Control > Splash Page > ISE Splash Page (1)
- Access Control > Splash Page > Systems Manager (1)
- Access Control > Splash Page > Billing
- Access Control > Network Access Control
- Access Control > Assign Group Policies by Device Type
- Access Control > Captive Portal Strength
- Access Control > Walled Garden
- Access Control > Controller Disconnection Behavior
- Access Control > SSID Modes for Client IP Assignment (1)
- Distributed L3 Roaming in a Nutshell
- Access Control > SSID Modes for Client IP Assignment (1)
- Teleworker VPN / L3 Roaming
- Access Control > SSID Modes for Client IP Assignment (1)
- Access Control > Wireless Options
- Per SSID – Firewall & Traffic Shaping (1)
- Firewall & Traffic Shaping > Block IPs and Ports
- Firewall & Traffic Shaping > Layer 3 Firewall Rules (1)
- Firewall & Traffic Shaping > Block Applications
- Firewall & Traffic Shaping > DNS Layer Protection
- Firewall & Traffic Shaping > DNS Exclusion
- Firewall & Traffic Shaping > Traffic Shaping SSIDs
- Firewall & Traffic Shaping > Traffic Shaping Rules (1)
- Lesson 7: Splash Page
- Customize Splash URL for Payment Vendors
- Customize Splash Page (1)
- Preview Splash Page – Modern
- Preview Splash Page – Fluid
- Create Custom Themed Splash Page
- Lesson 8: SSID Availability
- SSID Availability (1)
- Lesson 9: Bluetooth Settings
- Bluetooth Low Energy (BLE)
- Bluetooth Settings > Enable Bluetooth Scanning
- Wireless > Bluetooth Clients
- Bluetooth Beaconing (1)
- Asset Tracking
- Lesson 10: Port Profiles
- Port Profiles (1)
- Lesson 11: Wireless RF Radio Settings
- Radio Settings
- Auto RF – Dedicated Scanning Radio
- RF Metrics
- Radio Settings > 2.4 GHz
- Radio Settings > 5 GHz
- Radio Settings > Bulk Edit Settings
- Radio Settings > Bulk Edit Settings > Antenna Type
- Radio Settings > Bulk Edit Settings > 2.4 GHz
- Radio Settings > Bulk Edit Settings > 5 GHz
- Channel Planning
- Auto RF – Channel Changes
- Radio Settings > Bulk Edit Settings > Transmit Power
- Radio Settings > Transmit Power Control (Current)
- Auto RF – TX Power Considerations
- Auto RF – TX Power Changes
- Radio Settings > Bulk Edit Settings > Review Changes
- Radio Settings – RF Profile (1)
- Radio Settings – RF Profile > Band Selection
- RF Profile > Band Selection – All SSIDs (1)
- Access Control > Wireless Options – Band Steering
- Radio Settings – RF Profile > Minimum Bitrate
- Radio Settings – RF Profile > Client Balancing
- Client Balancing
- Radio Settings – RF Profile > 2.4 GHz Settings (1)
- Radio Settings – RF Profile > 5 GHz Settings
- Radio Settings – Radio Channel Width
- Radio Settings – RF Profile > 5 GHz Settings (1)
- Radio Settings – RF Profile > Exclude DFS
- Radio Settings – RF Profile > RX-SOP (1)
- Radio Settings
- Lesson 12: Wireless Threats and Air Marshal
- Network Impersonation
- Wired Network Compromise Via Rouge AP
- Wireless > Air Marshal
- Wireless Threats
- Air Marshal Containment
- Air Marshal – Hybrid vs Dedicated
- Configuring Meraki’s Air marshal WIDS/WIPS Platform
- Air Marshal > Configure
- Clients Connecting to Rouge SSIDs Settings
- Air Marshal > Configure > SSID Blocklist
- Air Marshal > Configure > SSID Allowed list
- Air Marshal > Configure > SSID Alerting
- Air Marshal > Configure > Rouge SSID
- Rogue SSID Containment Types and Status
- Containment of Rouge SSIDS
- Air Marshal > Rouge SSID > Contain
- Air Marshal > Other SSID
- Air Marshal > Other SSID > Alerts
- Air Marshal > Spoofs
- Air Marshal > Malicious Broadcasts
- Air Marshal > Packet Floods
- Lesson 13: Location Heatmap
- Location Heatmap (1)
- Lesson 14: PCI Compliance
- PCI Compliance (1)
- PCI Compliance > Run Report (1)
- PCI Compliance Report
- PCI Compliance Remediation
- Lesson 15: RF Spectrum
- RF Overview
- RF Overview > 2.4 GHz Spectrograms
- RF Overview > 2.4 GHz Utilization
- RF Overview > 2.4 GHz Interfering APs
- RF Overview > 5 GHz Spectrograms
- RF Overview > 5 GHz Utilization
- RF Overview > 5 GHz Interfering APs
- RF Overview > 2.4 GHz Spectrograms
- RF Overview
- Lesson 16: Wireless Health
- Wireless Health – Run Diagnostics (1)
- Wireless Health – Health Tab (1)
- Wireless Health – Map Tab
- Wireless Health
- Some Additional Wireless Troubleshooting
- Module Summary