Planning new Meraki architectures and expanding existing deployments
- Identify optimal Meraki networks architectures (organization/network sizing and limitations)
- Plan for and complete license renewals through the Dashboard
Designing for scalable management and high availability
- Design Meraki organization administrative structure using tags (network and device tags)
- Design highly available and redundant networks through the use of MX warm-spare and MS physical stacking technology
- Design high density wireless networks (access point calculations and SSID configurations)
Automation and scaling Meraki deployments
- Utilize SAML for scalable role-based access control
- Explain the capabilities and limitations of Templates and Network Cloning
- Explain and identify ideal use cases for the Dashboard API
Routing design and practices on the Meraki platform
- Design proper static and dynamic routing topologies based on network needs
- Explain dynamic routing capabilities on the MX appliance platform
- Explain dynamic routing capabilities on the MS switch platform
- Configure OSPF across the network as the dynamic routing protocol
- Leverage BGP to expand networks and improve WAN performance
QoS and traffic shaping design
- Identify the configurable quality of service (QoS) mechanisms across the LAN and WLAN
- Prepare for VoIP and video traffic using class of service (CoS), DSCP tags, and wireless traffic shaping
- Configure policy and performance-based routing on the MX appliance platform
Architecting VPN and WAN topologies
- Design highly scalable VPN architectures (full mesh, hub-and-spoke)
- Explain the underlying mechanisms of Meraki Auto VPN (VPN registry, UDP hold punching)
- Explain the fundamentals of Meraki SD-WAN and its processing algorithm
- Design Meraki SD-WAN architecture with performance-based routing
- Extend networks and services into the public cloud (Azure and AWS)
Securing the network with Advanced Security features
- Explain the default traffic flow and layer 3/layer 7 rules processing order of the MX appliance platform
- Identify the security intelligence engines and definition databases the MX appliance platform leverages for network protection services (Cisco AMP, Threat Grid, Snort)
- Identify and enable content filtering at various levels for desired traffic refinement
Switched network concepts and practices
- Prepare access policies (802.1x) using Meraki authentication
- Properly utilize templates, cloning, and switch profiles
- Design guest access for LAN/WLAN utilizing Meraki best practices
Wireless concepts and practices
- Configure Dashboard maps and floor plans
- Formulate RF profiles to prepare for challenging/variable RF deployments
- Configure WLAN access control options based on design requirements
- Enable the network for Bluetooth scanning and BLE beaconing
Endpoint management concepts and practices
- Explain the different device enrollment and profile deployment methods
- Design a native containerization strategy to separate work from personal data on endpoints
- Identify and implement various application deployment methods
- Assemble and implement security policies which cater to various restriction requirements
- Construct a network deployment that leverages SM Sentry
Physical security concepts and practices
- Explain the MV platform's edge architecture and underlying video delivery mechanism (local vs. remote video access)
- Design a retention policy using various local or cloud-based storage strategies
- Configure MV cameras for wireless deployments
- Explain and demonstrate how to effectively utilize advanced analytics and MV camera APIs
Gaining additional network insight through application monitoring
- Explain how Meraki Insight is able to provide network assurance through the use of performance metrics and scores
- Qualify and properly size Meraki Insight licenses
- Configure, monitor, and track predefined and custom web application thresholds
Preparing and setting up monitoring, logging, and alerting services
- Explain Dashboard's integrated historical log databases (event vs. change logs) to be leveraged for effective activity analysis
- Identify the various monitoring tools within Dashboard (native analytics, Topology)
- Demonstrate effective network-wide alerting best practices
- Utilize the Dashboard API to monitor and maintain Meraki networks
Setting up Dashboard reporting and auditing capabilities
- Generate and interpret on-demand or recurring Summary Reports for key performance metrics
- Track and manage firmware releases and prepare for staged upgrades
- Recommend proper actions to meet PCI DSS (2.0 and 3.0) compliance
Gaining visibility and resolving issues using Meraki features and built-in troubleshooting tools
- Interpret event and change logs to troubleshoot client and network issues
- Classify and compare security threats via the Security Center
- Assess root cause of application performance issues with Meraki Insight
- Explain the detailed VPN tunnel information and the VPN Registry found on the VPN Status page
- Utilize the Local Status Page as an alternate connectivity method to perform local troubleshooting