Meraki MR Wireless Installing, Configuring, Monitoring, and Troubleshooting

This 3-day Cisco course provides students with the skills to configure, optimize, and troubleshoot a Cisco Meraki solution. Students will learn how to install and optimize Meraki MR Access Points. Students will also learn how to configure the Meraki Dashboard, troubleshoot and configure the Meraki environment and learn how to diagnose and resolve user and Network issues that may arise.

Days : 3
Price :

This product is currently out of stock and unavailable.

Description

Who should attend

The primary audience for this course is as follows:

  • IT Staff and Managers
  • Network and Systems Personnel and Engineers
  • Small to mid-sized organizations that require fundamental knowledge on networking terms/concepts and configuration guidance for Meraki equipment
  • This also includes organizations looking to implement remote sites, provide a guest wireless solution, and collect user analytics

Course Objectives

Following completion of this course, students will understand, Install, Configure, Monitor, and Troubleshoot the following:

  • Navigate and Configure the dashboard
  • Add MX/MR/MS/MV devices to the Dashboard
  • Understand and Configure Configuration Templates
  • Understand and Configure Group Policies
  • Manage/Configure/Integrate Users and Radius Policies
  • Configure, Monitor, and Troubleshoot MR Access Points
  • Monitor Meraki Network Health
  • Troubleshoot devices and Connectivity

Outline: Meraki MR Wireless Installing, Configuring, Monitoring, and Troubleshooting (MWA-ICMT)

Module 0: Introductions

  • Module Introduction
    • Topic List
  • Lesson 1: Introductions
    • Course Goal
    • WebEx Basics
    • General Administration
    • Introductions
    • The Integrated Cisco Network
  • Module Summary

Module 1: Introduction to Meraki

  • Module Introduction
    • Topic List
  • Lesson 1: Why Cisco Meraki?
    • Cloud Management
  • Lesson 2: Meraki Product Overview
    • Meraki MS Switches
    • Meraki MR Wireless Access Points
    • Meraki MX Security and SD-WAN Appliances
    • Meraki MV Vision Security Cameras (MG and MT)
    • Meraki Systems Manager (SM)
    • Meraki MT Sensors Access Points
    • Cisco Meraki Insight
  • Lesson 4: Meraki Licensing and Support
    • Enterprise Support and Hardware Warranties
    • Cisco Meraki Documentations
  • Module Summary

Module 2: Cloud Management with the Meraki Dashboard

  • Module Introductions
    • Topic List
  • Lesson 1: Overview of the Meraki Dashboard
    • The Cisco Meraki Dashboard
    • The Meraki Phone App
    • Dashboard: Organizational Structure
    • Meraki Dashboard Best Practices – Campus
    • Dashboard Compliance and Data Protection
    • Cloud Reliability
    • Loss of Connectivity to the Cisco Meraki Cloud
    • Safe Configuration
    • Meraki Dashboard Login (1)
    • Create Dashboard Account (1)
    • Create Dashboard Account and Organization
    • Verify Created Account
    • First Login to New Organization
    • Account Login with Multiple Assigned Organizations
    • Manage Multiple Organizations
    • View Health Status for Multiple Organizations (1)
    • Meraki Dashboard Best Practices – Multiple Locations
    • Dashboard Search
    • Logged in User Profile
    • Modify User Profile (1)
    • Announcements
  • Lesson 2: Help & Support
    • Meraki Help
    • Dashboard – Help – Get Help (1)
    • Dashboard – Help – Community
    • Dashboard – Help – Marketplace
    • Dashboard – Help – Cases
    • Dashboard – Help – Data Protection Requests
    • Dashboard – Help – New Features
    • Dashboard – Help – Firewall Rules Info
    • Dashboard – Help – API Docs
    • Dashboard – Help – Hardware Replacement
    • Dashboard – Give Your Feedback
  • Lesson 3: Organizational Wide Configure Settings
    • Organizational Menu Settings
    • Settings – Org Name and Security Settings
    • Settings – Authentication (1)
    • Configuring SAML SSO with ADFS
    • Configuring SAML SSO with OneLogin
    • Settings – Administration Settings
    • Settings – Privacy and Support Access Settings
    • Settings – SNMP Configuration
    • Settings – Threat Grid
    • Settings – Dashboard API Access
    • Settings – Delete This Organization
    • Organization > CONFIGURE > Configuration Sync
    • Configuration Sync
    • Organization > CONFIGURE > MDM
    • Organization > CONFIGURE > Administrator
    • Create Administrator Account – Org Access
    • Create Administrator Account – Network Access
    • Create Administrator Account – Camera Access
    • Create Administrator Account
    • Verify Administrator Account
    • Deleting an Administrator Account
    • Organization > Configure > Camera Roles
    • Organization > Configure > License Info
    • License Information – Co-Termination
    • Add Licenses to Organization – Co-Termination
    • License History – Co-Termination
    • Converting to PDL (Per Device Licensing) (1)
    • Licensing & Inventory Page – PDL (1)
    • Organization > CONFIGURE > Create Network
    • Create Network – Setup Network
    • Create Network – Select Devices from Inventory
    • Create Network – Add Devices
    • Finding Meraki Order Number
    • Delete Networks
    • Organization > Configure > Inventory
    • Organization > Inventory – Searching for Devices
    • Organization > Inventory – Claiming Devices
    • Organization > Inventory – Unclaiming Devices
    • Organization > Add a Device to a Network
    • Recovering a Missing or Stolen Device
    • Organization > Monitor > Overview > Networks
    • Organization > Monitor > Overview > Networks Tags
    • Organization > Monitor > Overview > Devices
    • Organization > Monitor > Change Log
    • Organization > Monitor > Login Attempts
    • Organization > Monitor > Security Center (1)
    • Organization > Monitor > Location Analytics (1)
    • Organization > Monitor > VPN Status
    • Organization > Monitor > Firmware Upgrades
    • Firmware Upgrades – Scheduling Firmware Upgrades (1)
    • Organization > Monitor > Firmware Upgrades (1)
    • Organization > Firmware Upgrades > Overview
    • Organization > Firmware Upgrades > Firmware Status
    • Organization > Firmware Upgrades > Firmware Release Notes
    • Organization > Firmware Upgrades > Firmware Roll Back (1)
    • Firmware Upgrades Through APIs
    • Organization > Monitor > Summary Report (1)
    • Organization > Summary Report – Anomalies
    • Organization > Summary Report – Clients with High Usage
    • Organization > Summary Report – Usage stats
    • Organization > Summary Report – Sessions
    • Organization > Top SSIDs by Usage
    • Organization > Summary Report – Top Devices
    • Top Device Models by Usage
    • Top Security Appliances by Utilization
    • Summary Report – Port Utilization Graph
    • Summary Report – Client Stats
    • Summary Report -Top Clients by Usage
    • Clients
    • Organization -Top Client Device Manufacturers
    • Organization -Top Operating Systems By Usage
    • Organization – Top Application Categories
    • Organization – Top Applications by Usage
    • Organization – Power Details
  • Lesson 4: Network Wide Settings
    • Network-Wide
    • Network Wide > Configure > General (1)
      • Network-Wide > General > Traffic Analysis
      • Network-Wide > General > Location and Scanning
      • Network-Wide > General > SMS Auth with Twilio
      • Network-Wide > General > CloudShark
      • Network-Wide > Wireless Multicast to Unicast Conversion
      • Network-Wide > General > Device Configuration (1)
      • Network-Wide > General > Reporting > Syslog
      • Network-Wide > General > SNMP
      • Network-Wide > General > Reporting > Location
      • Network-Wide > General > NetFlow
      • Network-Wide > General > Firmware Upgrades
      • Network-Wide > General > Switch & Wireless Alternate Management Interface (1)
      • Network-Wide > General > Status & APIs
      • Network-Wide > General > Status
      • Network-Wide > General > Umbrella
    • Network-Wide > Administration > Org Admins
    • Network-Wide > Administration > Network Admin
    • Network-Wide > Administration > Guest Ambassadors
    • Network-Wide > Admin > Port Management Privileges
    • Network-Wide > General > Camera-Only Admins
    • Network-Wide > Users > Guest Access
      • Network-Wide > Users (1)
    • Network-Wide > Group Policy
      • Network-Wide > Group Policy > New Group
      • Network-Wide > Group Policy > Schedule
      • Network-Wide > Group Policy > Bandwidth
      • Network-Wide > Group Policy > Hostname Visibility
      • Network-Wide > Group Policy > Firewall
      • Firewall – Layer 7 Rules
      • Network-Wide > Group Policy > Umbrella
      • Network-Wide > Group Policy > Traffic Shaping (1)
      • Network-Wide > Group Policy > Wireless Only
      • Network-Wide > Group Policy > Security Appliance Only
    • Network-Wide > General > Add Devices
    • Network Wide > Monitor > Clients (1)
    • Searching for Clients
    • Modifying Columns
    • Network Wide > Monitor > Clients > Applications
    • Network Wide > Monitor > Clients > Ports
    • Network Wide > Monitor > Clients > HTTP Content
    • Network Wide > Monitor > Clients > Custom Pie Chart
    • Changing the Policies Applied to a Client
    • Adding a Client
    • Display Client Information – Overview (1)
    • Display Client Information – Connections (1)
    • Display Client Information – Performance (1)
    • Display Client Information – Timeline
    • Network-Wide > Monitor > Traffic Analytics (1)
    • Network-wide > Monitor > Topology
    • Topology – L2
    • Topology – L3
  • Lesson 5: Packet Captures
    • Packet Capture for Multiple Devices (1)
    • Event log (1)
  • Lesson 6: Location / Mapping Devices
    • Maps & Floor Plans (1)
    • Maps & Floor Plans – Drag & Drop Devices
    • Maps & Floor Plans – Assign Devices to…
    • Maps & Floor Plans – Geolocate Devices (1)
    • Maps & Floor Plans (1)
  • Lesson 7: Configuring Templates
    • Organization > Monitor > Configuration Templates
    • Templates
    • Configuration Templates > Create New Template (1)
    • Configuration Templates
    • Unbinding Networks from a Template
    • Splitting Configuration Templates
    • Combining Configuration Templates
    • Deleting a Configuration Template
    • MRWireless Network Templates
    • MX/Z3 – Template VLAN IP Address Range Allocations
    • MX/Z3 – Template VLAN IP Address Range Allocations
    • VLAN Templates
    • Configuration Templates (1)
    • MS Templates
    • Switch Profiles
    • Configuration Templates > Local Overrides (1)
    • Configuration Templates > Local Overrides
  • Module Summary

Module 3: Meraki MR Wireless

  • Module Introduction
    • Topic List
  • Lesson 1: Wireless Features
    • MR Wireless Access Points
    • Meraki Location Analytics are Built-in
    • Granular Control Over Bandwidth, Apps, and Client Devices
    • MR Feature: Multigigabit Ethernet
    • MR Feature: Mesh Routing
    • MR Dedicated Scanning Radio
    • Secure Guest Wireless in Seconds
    • Built-in Bluetooth Beacons
    • Bluetooth Beacons
    • Meraki Location Heatmap is Built-in
    • High Density Support
    • ISE Integration
    • Guest Self-Registration
    • Cisco Umbrella and Cisco Meraki
    • DNS/Web-layer Security – Solution Overview
    • Zero -Touch Provisioning
    • Meraki | Application Program Interfaces (APIs)
    • Licensing and Support
  • Lesson 2: Wireless Standards
    • IEEE 802.11 Wireless LANs
    • 802.11b/g 2.4 GHz Spectrum
    • 802.11b/g 2.4 GHz Channel Plan
    • 802.11a/n/ac 5 GHz Channels
    • 802.11a/ac 5 GHz Channels
    • 802.11ac Standard
    • 802.11ac Wave 1
    • 802.11ac Wave 2
    • 802.11ac Wave 1 vs Wave 2
    • 802.11ax Wi-Fi 6
    • Wi-Fi 6 Key Technologies
      • Wi-Fi 6 Key Technologies – Backwards Compatible
      • Wi-Fi 6 Key Technologies – Spatial Diversity and MU-MIMO
      • Wi-Fi 6 Key Technologies – Orthogonal Frequency Division Multiple Access (OFDMA)
      • Wi-Fi 6 Key Technologies – 1024 Quadrature Amplitude Modulation (QAM)
      • Wi-Fi 6 Key Technologies – BSS Color
      • Wi-Fi 6 Key Technologies – Target Wakeup Time (TWT) (1)
  • Lesson 3: Site Survey
    • Site Survey & Design
      • Capacity Planning
      • Types of Site Surveys – Passive Surveys
      • Types of Site Surveys – Active Surveys
      • Types of Site Surveys – Predictive Surveys
      • Site Survey Tools
    • MR Internal AP 2.4 GHz Radiation Pattern
    • MR Internal AP 5 GHz Radiation Pattern
    • Mounting Meraki MR Wireless APs
    • Identify Problematic Areas
    • Signal Attenuation
  • Lesson 4: Meraki MR Models
    • Meraki MR Wireless AP Models Indoor
      • MR20 Indoor AP
      • MR30H Indoor AP
      • MR33 Indoor AP
      • MR42 Indoor AP
      • MR42E Indoor AP
      • MR52 Indoor AP
      • MR53 Indoor AP (M-Gig)
      • MR53E Indoor AP (M-Gig)
    • Meraki MR Wireless AP Models Indoor
      • MR45 Indoor AP (M-Gig)
      • MR55 Indoor AP
      • MR36 Indoor AP
      • MR36H Indoor AP
      • MR44 Indoor AP (M-Gig)
      • MR46 Indoor AP (M-Gig)
      • MR46E Indoor AP (M-Gig)
      • MR56 Indoor AP (M-gig)
    • Meraki MR Access Point Models Outdoor
      • MR70 Outdoor AP
      • MR74 Outdoor AP
      • MR84 Outdoor AP
      • MR76 Outdoor AP
      • MR86 Outdoor AP
    • Directional Antennas
      • External Antennas – Indoor Aps
      • External Antennas for Outdoor/Ruggedized APs
    • AP Adapter Options
    • Multi-Color LED Access Points
  • Lesson 5: Wireless Configuration
    • Wireless > Access Points > Access Point Status Page (1)
    • Set the AP Name
    • Set the AP Location
    • Default SSID and Channel Selection
    • Dynamic IP Addressing and VLAN Assignment for AP
    • Static IP Addressing for AP
    • LAN IPv6 Addressing
    • Serial Number, Tags, and Notes
    • Firmware, Config and Power
    • Wireless > Monitor > Access Points > Summary
    • Access Points > Summary > Current Clients
    • SUMMARY > Radius and VLAN Request Status
    • SUMMARY > Utilization on Current Channels (1)
    • SUMMARY > Live Mesh Neighbors
    • SUMMARY > Historical Data (1)
    • Access Points > Event Log (1)
    • Access Points > Full Event Log
    • Access Points > Location > Map
    • Access Points > Location > Satellite
    • Access Points > Location > Photo
    • Access Points > Location > Topology
    • Access Points > Connections (1)
    • Access Points > Performance (1)
    • AP > Tools Tab > Ping
    • AP > Tools Tab > Reboot Device
    • AP > Tools Tab > Blink LEDs
    • AP > Tools Tab > Dashboard Throughput
    • AP > Tools Tab > Traceroute
    • AP > Tools Tab > ARP Table
    • AP > LAN Tab > Radius Request Status
    • AP > LAN Tab > VLAN Request Status
  • Lesson 6: SSID Configuration
    • Configuring SSIDS
    • Provision SSIDS
    • Access Control
    • Wireless Encryption and Authentication
    • Access Control (1)
    • Access Control > Open
    • Access Control > Pre-Shared Keys
    • Access Control WPA versions
    • Access Control 802.11w
    • Access Control > MAC-based Access Control
    • Access Control > Enterprise with…
    • Access Control > Supported EAP Types
    • Enterprise with 802.1X Authentication
    • Enterprise with Meraki Authentication – SM
    • Enterprise with Meraki Authentication – Trusted Access (1)
    • Enterprise with…
    • Access Control > Identity PSK with Radius
    • Access Control > Splash Page
      • Access Control > Splash Page > None
      • Access Control > Splash Page > Click-through
      • Access Control > Splash Page > Sponsored Guest Login
      • Access Control > Splash Page > Sign-on
      • Access Control > Splash Page > SMS Auth.
      • Access Control > Splash Page > ISE Splash Page (1)
      • Access Control > Splash Page > Systems Manager (1)
      • Access Control > Splash Page > Billing
    • Access Control > Network Access Control
    • Access Control > Assign Group Policies by Device Type
    • Access Control > Captive Portal Strength
    • Access Control > Walled Garden
    • Access Control > Controller Disconnection Behavior
    • Access Control > SSID Modes for Client IP Assignment (1)
    • Distributed L3 Roaming in a Nutshell
    • Access Control > SSID Modes for Client IP Assignment (1)
    • Teleworker VPN / L3 Roaming
    • Access Control > SSID Modes for Client IP Assignment (1)
    • Access Control > Wireless Options
    • Per SSID – Firewall & Traffic Shaping (1)
    • Firewall & Traffic Shaping > Block IPs and Ports
    • Firewall & Traffic Shaping > Layer 3 Firewall Rules (1)
    • Firewall & Traffic Shaping > Block Applications
    • Firewall & Traffic Shaping > DNS Layer Protection
    • Firewall & Traffic Shaping > DNS Exclusion
    • Firewall & Traffic Shaping > Traffic Shaping SSIDs
    • Firewall & Traffic Shaping > Traffic Shaping Rules (1)
  • Lesson 7: Splash Page
    • Customize Splash URL for Payment Vendors
    • Customize Splash Page (1)
    • Preview Splash Page – Modern
    • Preview Splash Page – Fluid
    • Create Custom Themed Splash Page
  • Lesson 8: SSID Availability
    • SSID Availability (1)
  • Lesson 9: Bluetooth Settings
    • Bluetooth Low Energy (BLE)
    • Bluetooth Settings > Enable Bluetooth Scanning
    • Wireless > Bluetooth Clients
    • Bluetooth Beaconing (1)
    • Asset Tracking
  • Lesson 10: Port Profiles
    • Port Profiles (1)
  • Lesson 11: Wireless RF Radio Settings
    • Radio Settings
      • Auto RF – Dedicated Scanning Radio
      • RF Metrics
      • Radio Settings > 2.4 GHz
      • Radio Settings > 5 GHz
    • Radio Settings > Bulk Edit Settings
    • Radio Settings > Bulk Edit Settings > Antenna Type
    • Radio Settings > Bulk Edit Settings > 2.4 GHz
    • Radio Settings > Bulk Edit Settings > 5 GHz
    • Channel Planning
    • Auto RF – Channel Changes
    • Radio Settings > Bulk Edit Settings > Transmit Power
    • Radio Settings > Transmit Power Control (Current)
    • Auto RF – TX Power Considerations
    • Auto RF – TX Power Changes
    • Radio Settings > Bulk Edit Settings > Review Changes
    • Radio Settings – RF Profile (1)
    • Radio Settings – RF Profile > Band Selection
    • RF Profile > Band Selection – All SSIDs (1)
    • Access Control > Wireless Options – Band Steering
    • Radio Settings – RF Profile > Minimum Bitrate
    • Radio Settings – RF Profile > Client Balancing
    • Client Balancing
    • Radio Settings – RF Profile > 2.4 GHz Settings (1)
    • Radio Settings – RF Profile > 5 GHz Settings
    • Radio Settings – Radio Channel Width
    • Radio Settings – RF Profile > 5 GHz Settings (1)
    • Radio Settings – RF Profile > Exclude DFS
    • Radio Settings – RF Profile > RX-SOP (1)
  • Lesson 12: Wireless Threats and Air Marshal
    • Network Impersonation
    • Wired Network Compromise Via Rouge AP
    • Wireless > Air Marshal
    • Wireless Threats
    • Air Marshal Containment
    • Air Marshal – Hybrid vs Dedicated
    • Configuring Meraki’s Air marshal WIDS/WIPS Platform
    • Air Marshal > Configure
    • Clients Connecting to Rouge SSIDs Settings
    • Air Marshal > Configure > SSID Blocklist
    • Air Marshal > Configure > SSID Allowed list
    • Air Marshal > Configure > SSID Alerting
    • Air Marshal > Configure > Rouge SSID
    • Rogue SSID Containment Types and Status
    • Containment of Rouge SSIDS
    • Air Marshal > Rouge SSID > Contain
    • Air Marshal > Other SSID
      • Air Marshal > Other SSID > Alerts
    • Air Marshal > Spoofs
    • Air Marshal > Malicious Broadcasts
    • Air Marshal > Packet Floods
  • Lesson 13: Location Heatmap
    • Location Heatmap (1)
  • Lesson 14: PCI Compliance
    • PCI Compliance (1)
    • PCI Compliance > Run Report (1)
    • PCI Compliance Report
    • PCI Compliance Remediation
  • Lesson 15: RF Spectrum
    • RF Overview
      • RF Overview > 2.4 GHz Spectrograms
        • RF Overview > 2.4 GHz Utilization
        • RF Overview > 2.4 GHz Interfering APs
      • RF Overview > 5 GHz Spectrograms
        • RF Overview > 5 GHz Utilization
        • RF Overview > 5 GHz Interfering APs
  • Lesson 16: Wireless Health
    • Wireless Health – Run Diagnostics (1)
    • Wireless Health – Health Tab (1)
    • Wireless Health – Map Tab
    • Wireless Health
    • Some Additional Wireless Troubleshooting
  • Module Summary