Skip to main Content

Engineering Cisco Meraki Solutions 2

  • Course Code ECMS2
  • Duration 3 days
  • Version 2.0

Course Delivery

Additional Payment Options

  • CLC 28 excl. VAT

Virtual Learning Price

Please call

Request Group Training Add to Cart

Course Delivery

This course is available in the following formats:

  • Public Classroom

    Traditional Classroom Learning

  • Virtual Learning

    Learning that is virtual

Request this course in a different delivery format.

Course Overview

Top

Engineering Cisco Meraki Solutions Part 2 (ECMS2)  elevates your knowledge of Cisco® Meraki™ technology suite. In this advanced technical training course, you’ll learn how to plan for network deployments and integrations using the Cisco Meraki platform. Through practical hands-on instruction and experiences, you will learn how to operate Meraki networks and troubleshoot complex network incidents using the Meraki Dashboard and analytics. You will also learn how to design Meraki architectures for redundancy, high-density, and scalability by implementing comprehensive Meraki product features to meet design objectives. This course is the second of two courses that prepares you for Cisco Meraki certification.


This course is the second of two courses that prepares you for Cisco Meraki certification.

Virtual Learning

This interactive training can be taken from any location, your office or home and is delivered by a trainer. This training does not have any delegates in the class with the instructor, since all delegates are virtually connected. Virtual delegates do not travel to this course, Global Knowledge will send you all the information needed before the start of the course and you can test the logins.

Course Schedule

Top
    • Delivery Format: Virtual Learning
    • Date: 13-15 January, 2025
    • Location: Virtual

Target Audience

Top

This course is ideal for those who regularly deploy or manage Meraki networks and want to deepen their technical expertise and understanding of the full Meraki product suite and features. his may include professionals with job titles or in roles such as: Consulting Systems Engineer: Deployment Engineer; Network Administrator; Network Manager; Network Engineer; Site Reliability Engineer; Systems Engineer; Technical Solutions Architect; Wireless Design Engineer; Wireless Engineer.

Course Objectives

Top

After completing this course you should be able to: 

  • Plan new Cisco Meraki architectures and expand existing deployments
  • Design the network for scalable management and high availability
  • Describe how to automate and scale Meraki deployments with dashboard tools
  • Use dynamic routing protocols to expand networks and improve WAN performance
  • Describe proper QoS, policy and performance-based routing configurations across a Cisco Meraki network and WAN optimization through traffic shaping
  • Describe Virtual Private Network (VPN) and Wide Area Network (WAN) topologies and how to integrate them
  • Secure, expand, and shape the network
  • Implement switched network concepts and practices, and configure guests networks
  • Implement wireless configurations concepts and practices
  • Describe endpoint management concepts and practices using Cisco Meraki Systems Manager
  • Describe physical security concepts and practices
  • Gain network insight by monitoring applications
  • Describe how to prepare monitoring, logging, and alerting services
  • Set up reporting and auditing capabilities in the Cisco Meraki dashboard
  • Monitor and troubleshoot issues using Cisco Meraki tools

Course Content

Top

Planning New Meraki Architectures and Expanding Existing Deployments

  • Cisco Meraki Solution Sizing
  • Explore Various Dashboard User Interface Features Demo
  • Licensing
  • Reference

Designing for Scalable Management and High Availability

  • Role-Based Access
  • Tag Design and Structure
  • Cisco Meraki MX Security Appliance High-Availability
  • Cisco Meraki MS Switch High Availability
  • High-Density Wireless Design

Automation and Scaling Meraki Deployments

  • RBAC with SAML
  • Configure SAML and Create SAML Roles Demo
  • Network Cloning
  • Clone a Network and Synchonize a Configuration Demo
  • Configuration Templates
  • Explore Configuration Templates Demo
  • Network Provisioning with APIs
  • Use Google Sheets and Script Editor with the Cisco Meraki Dashboard API Demo

Designing Routing on the Cisco Meraki Platform

  • Routing Across Cisco Meraki Networks
  • Explore Layer 3 Routing Including Creating, Editing and Moving SVIs Demo
  • Dynamic Routing with OSPF
  • BGP for Scalable WAN Routing and Redundancy

Describing QoS and Traffic Shaping Design

  • Wireless and Wired QoS Design
  • Prepare the Network for Voice
  • Traffic shaping and Prioritizing on the Cisco Meraki MX Platform

Building VPN and WAN Topologies

  • Cisco Meraki MX VPN Operation Modes
  • VPN Design and Toplogies
  • Auto VPN
  • Design a Scalable VPN Topology
  • Explore the Cisco Merkai MX Sizing Guide Demo
  • Integrate Cisco Meraki vMX into an Auto VPN Architecture
  • SD-WAN Fundamentals
  • SD-WAN Design
  • Explore Cisco Meraki vMX and SD-WAN Configurations in the Dashbard Demo

Securing, Expanding and Shaping the Network

  • Cisco Meraki Security Overview
  • Default Behaviour and Rule-Processing Order
  • Advanced Security Services
  • Content Filtering
  • Cisco Umbrella Integration

Describing Switched Network Concepts and Practices

  • Access Policies Using Cisco Meraki Authentication
  • Cloning of Switch Settings
  • Switch Templates and Profiles
  • Explore Switch Profiles Demo
  • LAN and WLAN Guest Access Best Practices

Implementing Wireless Configuration Practices and Concepts

  • Cisco Meraki Dashboard Maps and Floor Plans
  • RF Profiles
  • Wireless Encryption and Authentication
  • SSID Modes for Client IP Addressing
  • Bluetooth Low Energy
  • BLE Scanning and Bluetooth Clients Demo
  • Wireless Threats

Describing Endpoint Management Concepts and Practices

  • Cisco Meraki Systems Manager Platform Overview
  • Cisco Meraki Systems Manager Overview Demo
  • Device Deployment Methodologies
  • Deployment of Applications and Containerization Profiles
  • Security Policies and Devices Out of Compliance Demo
  • Pairing Network Group Policies with Systems Manager Demo
  • Agentless Onboarding with Trusted Access

Describing Physical Security Concepts and Practices

  • Cisco Meraki MV Architecture
  • Flexible Camera Deployments with Wireless
  • Cisco Meraki MV Product Portfolio, Features and Functionalities
  • Motion Search, Motion Recap, Motion Heat Maps and Person Detection Demo
  • Business Intelligence

Gaining Network Insight by Monitoring Applications

  • Cisco Meraki Insight Overview
  • Cisco Meraki Insight Scaling and Licensing
  • Cisco Meraki Insight Overview: A Closer Look at Tracked Applications and WAN Health Demo

Preparing Monitoring, Logging and Alerting Services

  • Logging Capabilities
  • Examine Event, Change and Video Access Logs Demo
  • Monitoring Tools and Services
  • Examine Monitoring Tools and Features Demo
  • Supported Alerts
  • Cisco Meraki Dashboard API 

Setting up Reporting and Auditing Capabilities in the Cisco Meraki Dahsboard

  • Cisco Meraki Reports
  • Manage Firmware Through the Dashboard
  • PCI Auditiing

Gaining Visibility and Resolving Issues using Cisco Meraki Tools

  • Troubleshooting Methods
  • Logging Capabilities
  • Cisco Meraki Security Center Overview Demo
  • Wireless Troubleshooting
  • Explore Wireless Troubleshooting Tools Demo
  • Troubleshoot Cisco Merkai Cloud Application Performance
  • Explore VPN Status, Firewall and Static Port Forwarding Information Demo
  • Troubleshoot Cisco Meraki Auto VPN
  • Local Status Page

Labs

  • Configure Tags, Link Aggregation, Port Mirroring, and High-Density SSIDs
  • Establishing Auto VPN
  • Configuring Virtual Interfaces and Routing on Cisco Meraki MS Switches
  • Configuring Routes and Redistribution
  • Configuring Quality of Service
  • Configuring Traffic Shaping
  • Configuring Load Balancing
  • Defining Firewall Rules
  • Enabling Advanced Malware Protection, Intrusion Detection, and Intrusion Prevention
  • Enabling Content Filtering
  • Configure and Apply Access Policies
  • Configure Wireless Guest Access
  • Configure Service Set Identifiers (SSIDs)
  • Implementing RF Profiles
  • Implement Air Marshal
  • Create Cisco Meraki Systems Manager (SM) Configuration Profiles
  • Define Security Policies
  • Enforce End-to-End Security
  • Set-up Motion Alerts
  • Deploy Wireless Cameras
  • Manage Video Retention
  • Enable Alerts
  • Add Monitoring and Reporting
  • Generate and Analyze Summary Reports
  • Manage Firmware
  • Generate a Peripheral Component Interconnect (PCI) Compliance Report
  • Troubleshoot an Offline Device
  • Troubleshoot Content Filtering
  • Troubleshooting Remote Site Connectivity

Course Prerequisites

Top

Attendees should meet the following prerequisites:

  • Completed ECMS1 or CMNO, or possess equivalent Meraki knowledge and experience
  • Be CCNA-certified or have an equivalent level of technical expertise
  • Be employed by Cisco Systems, a Meraki partner, or a Meraki customer
Recommended prerequisites:

Test Certification

Top

Recommended as preparation for the following exams:

  • 500-220 -  ECMS - Cisco Meraki Solutions Specialist