SlideShare une entreprise Scribd logo
1  sur  47
Télécharger pour lire hors ligne
Cisco Confidential© 2015 Cisco and/or its affiliates. All rights reserved. 1
Cloud Networking Lab
Jay Bradford and Mike Makkaoui
Cloud Networking Systems Engineers
May 2016
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
Housekeeping notes
Thank you for attending Cisco ConnectToronto 2016,here are a few housekeeping notes
to ensure we all enjoy the sessiontoday.
• Please ensureyourcellphones/ laptops are set on silent to ensure no one is disturbed
during the session
• SSID: CiscoLabs Password:CiscoLabs
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
20 min Welcome and Introduction
35 min Dashboard Demo
20 min Local MX, MS and MR configuration
60 min MX | SecurityAppliances Lab
30 min MS | Access Switches Lab
30 min MR | WirelessAccess Points Lab
25 min SM | System Manager Demo
10 min Q&A and Wrap-Up
Agenda
Cisco Confidential 4© 2015 Cisco and/or its affiliates. All rights reserved.
About Cisco Meraki
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
Cisco Meraki:a complete cloud-managed networking solution
- Wireless, switching, security, MDM and telephony, centrally managed over the web
- Built from the ground up for cloud management
- Integrated hardware, software, and cloud services
Cloud Networking Leader:
- Cisco’s fastest-growing acquisition ever: over 100% annual growth
- 600,000+ customer networks in 147 countries
- Tens of millions of devices connected worldwide
Recognized for innovation
- Gartner Magic Quadrant
- InfoWorld Technology of the Year
- TechWorld Mobility product of the year
- CRN Coolest Technologies
About Cisco cloud-managed networking
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
Cloud Managed WiFi Cloud Managed Network Cloud Managed IT
Meraki MR
Wireless LAN
Meraki MS
EthernetSwitches
Meraki MX
Security Appliances
Meraki SM
MDM
Meraki MC
Telephony
Bringing the cloud to enterprise networks
Cisco Confidential 7© 2015 Cisco and/or its affiliates. All rights reserved.
Meraki cloud architecture
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
Scalable
Unlimited throughput, no bottlenecks
Add devices or sites in minutes
Reliable
Highly available cloud with multiple datacenters
Network functions even if connection to cloud is interrupted
99.99% uptime SLA
Secure
No user traffic passes through cloud
Fully HIPAA / PCI compliant (level 1 certified)
3rd party security audits, daily penetration testing
Automatic firmware and security updates (user-scheduled)
Reliability and security information atmeraki.cisco.com/trust
Management
data (1 kb/s)
WAN
Out-of-band management in every product
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
Cloud Licensing Model is Simple
9
Simple Cloud Licensing model
No per-feature or per-user licenses
Licensing options: 1 Year, 3 Year, 5 Year, 7 Year & 10 Year
Cloud License price is all inclusive
Cloud Management UI
24 x 7 phone support
Automated software updates
Advanced hardware replacement
All features built on the platform
All new features
Cisco Confidential 10© 2015 Cisco and/or its affiliates. All rights reserved.
Dashboard Demo
Cisco Confidential 11© 2015 Cisco and/or its affiliates. All rights reserved.
Hands-on Labs
Visit
meraki.com/merakilab
Session Code: #142NA
* Limit of 3 free APs per customer and includes previous promotional offers
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
Your individual lab
lives at our SF office!
Cisco Confidential 13© 2015 Cisco and/or its affiliates. All rights reserved.
Go to dashboard.meraki.com
Username: torontoX@meraki.com.test
Password: meraki123
X (number) as assigned
Lab slides: http://cs.co/CCT2016_lab_slides
Lab manual: http://cs.co/CCT2016_lab_manual
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
Network Topology
Firewall Configuration:
VLAN 1 (Corp)
Subnet: 10.0.x.0/24
Interface:10.0.x.1
VLAN 30 (Voice)
Subnet: 10.0.[30+x].0/24
Interface:10.0.[30+x].1
VLAN 100 (Guest)
Subnet: 10.0.[100+x].0/24
Interface:10.0.[100+x].1
“x” is your lab station number
Switch Configuration:
VLAN 1 (Corp)
Subnet: 10.0.x.0/24
Interface:10.0.x.201
Default gateway:10.0.x.1
VLAN 150 (Legacy)
Subnet: 10.0.[150+x].0/24
Interface:10.0.[150+x].1
VLAN 600 (OSPF)
Subnet: 192.168.0.0./24
Interface:192.168.0.x
Cisco Confidential 15© 2015 Cisco and/or its affiliates. All rights reserved.
MX | Security Appliance Lab
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
A Complete Unified Thread Management Solution
Application Control
Client Fingerprinting, Traffic
Shaping, Content Filtering,
Security
NG Firewall, Client VPN,
Site to Site VPN, IDS/IPS,
Anti-Malware, Geo-Firewall
Networking
NAT/DHCP, 3G/4G Cellular,
Link Balancing, IWAN
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
MX65 / MX65W – (small) Branch in a box
• 802.11ac with doublethe MX64 power
• 802.1x port authentication
• 2 WAN ports
• 8 LAN ports
• 2 LAN PoE+ ports (60W total)
• Ready for IWAN
• Ideal for smallbranchesor
telecommuters
Same throughput as MX64/64W
with increased interface count
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
Automated site-to-site VPN
Site-to-site IPsec VPN in just two
clicks in the Dashboard
Simple Creates L3 site-to-site VPN tunnels with just 2 clicks in the dashboard
Automatic Comparable to Cisco DMVPN, it creates a mesh or hub-and-spoke VPN
tunnel between all peers and adjusts to IP changes
Resilient Automatic failover over to secondary WAN link or 3G/4G USB modem
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
Meraki Intelligent WAN
WAN 1
Secure VPN tunnel (active)
Latency / loss > threshold
WAN 2
Secure VPN tunnel (active)
Latency / loss < threshold
Data
Based on L3 / L4 categorization, this data
normally travels out WAN 1 (PbR), but MX
detects optimal path is WAN 2 based on
latency / loss on WAN 1 (PfR).
Dual-active path:
Active-active VPN
Policy-based routing (PbR):
Allows uplinks to be intelligentlyassigned based
on traffic protocol, subnet, source, destination,
etc.
Dynamic Path Selection
Ensures the best uplink is used based on
latency and loss metrics
Reference Meraki Architecture
The architecture diagram displaysthe Meraki
full-stack alongside iWAN.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
Choosing the right MX for your environment
MX64/64W
MX65/65W
MX84
MX100
MX400
MX600
Z1
Small branch
(~50 users)
Where FW Throughput
250 Mbps
Campus / VPN
concentration
(~10,000 users)
Large branch /
campus (~2,000
users)
Mid-size branch
(~200 users)
Mid-size branch /
small campus
(~500 users)
Notable Features
802.11ac wireless
(MX64W/MX65W)
Power redundancy
Modular interface
SFP or SFP+ (with modules)
500 MbpsSFP Ports
750 MbpsSFP Ports
1 Gbps
2 Gbps
Power redundancy
Modular interface
SFP or SFP+ (with modules)
For teleworkers
(1-5 users)
Dual-radio wireless
FW throughput:50 Mbps
All devices support3G/4G
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
MX Base Configuration
• Enable VLANs and create VLANs 1 (Corp), 30 (Voice) and 100 (Guest) per the Network Topology diagram.
• Ensure that non-tagged traffic will be part of VLAN 1 (native vlan)
• VLAN 1 (Corp) Reserve IP addresses .150 through .250 under DHCP Settings
• When done go to Switch/Switches and under live tools reboot your switch
• Apply the following global default policies (Hint: Below section does not use grouppolicies)
• Completely block BitTorrent
• For Netflix and Pandora, shape traffic to 100K down, 50 K up. Ensure they are low priority and are marked appropriately.
• Apply content filtering for adult websites
• Enable site-to-site VPN with following settings
• Type: Spoke
• Full Tunnel (Hint: Default Route)
• Hubs: Data Center 1 and Data Center 2 (Prioritize Data Center 2)
• Include VLAN 1 and VLAN 30 in VPN and exclude VLAN 100
• Check the Route Table and VPN Status under Monitoring
• You should be able to ‘ping’ your neighbor’s networks and the Data Center networks
• (Hint: “10.0.lab#.1”, 10.0.250.1, 10.0.251.1, 10.0.252.1)
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
MX IWAN Configuration
• Security appliance > Configure > Traffic shaping
• Uplink configuration
• Uplink bandwidth WAN 1 = 10Mb, WAN 2 = 5Mb
• Global preferences
• Load balancing enabled
• Flow preferences
• Internet traffic
• “Guest” subnet prefers WAN 2
• Custom performance classes
• Create “Acceptable Delay” with a setting of 250ms
• VPN Traffic
• Any Protocol with Destination 8.8.8.8/32 prefer WAN 2 unless performanceexceeds for
“Acceptable Delay”
• “Corp” subnet Load balance on uplinks that are suitable for “Acceptable Delay”
• “Voice” Preferred uplink: Best for VoIP
• Verify VPN path selection by initiating ping from switch (Hint: Check Security Appliance/VPN Status)
• In a new browser tab Ping 8.8.8.8 and 8.8.4.4 from your Security Appliances “live tools”
• Review and note the results on the VPN status page
• Wait for instructor to createISP level disruption
Cisco Confidential 23© 2015 Cisco and/or its affiliates. All rights reserved.
MS | Switch Lab
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
Complete Campus Switching Portfolio
22 modelsscaling from access to campus aggregation
Enterprise-classperformance and reliabilityincluding non-blocking Gigabit
performance,802.3af/at PoE/PoE+on all ports, 10GbE uplinks,and voice and video QoS
Voice and video QoS
Dynamic Routing
Layer 7 app visibility
Virtual stacking
Enterprise security, ACLs
Remote packet capture, cable testing
Feature highlights
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
Mission Critical Features
OSPF
Dynamic routing with intuitive, browser-based configuration
IPv6 visibility and tracking
Usage statistics for IPv6 address now in Dashboard
DHCP server
Integrated DHCP service to help prevent single points of network failure
IPv4 Access Control Lists (ACLs)
Granular security boundaries configurable by subnet, protocol, port range, or host.
Virtual Router Redundancy Protocol (VRRP) with DHCP Failover support
High availability via a warm spare with automaticfailover and DHCP failover support
Addressingevolvingcustomerneedsaroundredundancy,campusconnectivity,and
reducing complexity
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
Meraki stacking: Virtual and physical
San Francisco
London
Sydney
Apply Access Policy
on ports 1-10
San Francisco
Benefits of virtual stacking apply equally to standalone or physically stacked switches
Step 1: Select ports to edit
Step 2: Configure multiple ports as desired
Step 3: Save, you’re done!
Standalone
switches
Stacked
switches
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
MR52 and MR53
Highest Performance 802.11acIntroducing MS350-24X
Stackable Multigigabit L3 access switch
Gigabit
(1G)
Multigigabit
(1/2.5/5/10G)
• New 24-port addition to the MS350
Family
• 8 Multigigabit (1/2.5/5/10G) ports
• UPoE (60W) capable
• Designed to work with the new
Multigigabit-capable MR53
Launching & shipping 17 May
$7,495
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
MR52 and MR53
Highest Performance 802.11acIntroducing MS425
Next Gen 10G aggregation
• 16 & 32 port 10G fiber aggregation
• 40G QSFP+ uplinks
• Flexible stacking
• MS420 refresh with additional price
points & unified design
• Ships with 1 PSU and all fans
(redundant PSU is optional)
10 Gigabit
(SFP+)
40 Gigabit
(QSFP+)
Launching & shipping 17 May
MS425-16 $14,000
MS425-32 $22,000
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
Access Aggregation
MS220 MS320 MS350 MS410 MS420 MS425
Features
• 8, 24, 48 port models
• Layer 2
• Gigabit SFP uplinks
• 24, 48 port models
• Layer 3
• 10Gb SFP+ uplinks
• Hot-swappable,
redundant power
supplies
• 24, 48 port models
• Physical stacking
(160Gbps)
• High performance
Layer 3
• 1Gb & Multigigabit
• 10Gb SFP+ uplinks
• Hot-swappable fans
and power supplies
• Management port
• 16, 32 port models
• Physical stacking
(160Gbps)
• High performance
Layer 3
• 1Gb SFP interfaces
• 10Gb SFP+ uplinks
• Hot-swappable fans
and power supplies
• Management port
• 24, 48 port models
• Front-port stacking
• High performance
Layer 3
• 10Gb SFP+
• Hot-swappable,
redundant fans and
power supplies
• Management port
• 16, 32 port models
• Front-port stacking
• High performance
Layer 3
• 10G SFP+
• 40Gb QSFP+ uplinks
• Hot-swappable fans
and power supplies
• Management port
Positioning
• Branch access
switching (L2)
• Branch and Campus
access switching (L3)
• Stackable Branch and
Campus access
switching (L3)
• Stackable Branch and
Campus aggregation
switching (L3)
• Stackable Campus
aggregation switching
(L3)
• Stackable Campus
aggregation switching
(L3)
Meraki MS switching product families
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
MS Base Configuration
• Verify that your switch is operational under Monitoring page (green status, passing traffic)
• Click on “Initialize layer 3 features” link to add following SVIs:
• Name: Corp
Subnet: 10.0.x.0/24
Interface: 10.0.x.201
VLAN: 1
Default gateway: 10.0.x.1
Disable DHCP
• Name: Legacy, Subnet: 10.0.[150+x].0/24, Interface: 10.0.[150+x].1, VLAN: 150, DHCP Enabled
• Name: OSPF, Subnet: 192.168.0.0/24, Interface IP: 192.168.0.x, VLAN: 600, Disable DHCP
• Go to the MX Appliance and create a static route for the “Legacy” subnet with gateway IP address to your
L3 switch SVI in the “Corp” VLAN - 10.0.x.201.
• “In VPN” option shouldbe “Yes”.
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
MS OSPF Configuration
• On the switch, configure OSPF with following settings:
• First configure switch port 25 to be access VLAN 600
• Enable OSPF with default Area 0
• Edit Legacy and OSPF interfaces to use the default Area 0 and Cost 1
• Make sure static routes override the OSPF routes
• Verify the OSPF neighbors and routes on the switch Monitoring page. Start a ping to 10.0.252.1 from the
Legacy Source interface and try again with port 25 on your switch disabled
• (Hint 10.0.[150+x].1. wait about 30 sec and restart ping if necessary).
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32
So what is going on?
DC2 MX
10.0.252.2
DC2 MS
10.0.252.1
Note your VLAN30 Voice subnet is being learned
through the DC2 VPN – how would you fix this?
Cisco Confidential 33© 2015 Cisco and/or its affiliates. All rights reserved.
MR | Access Point Lab
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34
MR wireless access points
8 modelsincluding indoor / outdoor,high performance and value-priced
Enterprise-classsilicon including RF optimization,PoE, voice / video support
Lifetime warranty on indoor APs
BYOD policies
Application traffic shaping
Guest access
Enterprise security
Location analytics
WIPS – 3rd
Security Radio
Feature highlights
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35
4-stream 4x4 802.11ac Wave 2
160 MHz channels & MU-MIMO
Quad-radio architecture
Dedicated scanning radio & BLE
Dual 1-gigabit Ethernet interfaces
Full operation on 802.3at PoE+ power
17 May: available in US/CAN/EU/ANZ/JP
US$ 1,399 list price
Introducing MR52
Highest performance 802.11ac
1-gigabit 1-gigabit
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36
4-stream 4x4 802.11ac Wave 2
160 MHz channels & MU-MIMO
Quad-radio architecture
Dedicated scanning radio & BLE
Multigigabit + 1-gigabit Ethernet
Full operation on 802.3at PoE+ power
17 May: available in US/CAN/EU/ANZ/JP
US$ 1,699 list price
Introducing MR53
Future-proof802.11ac
100/1000/2.5G 1-gigabit
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37
Indoor Capabilities
MR53 / MR52 Highest-performance & future-proof MR42 General purpose Quad-radio architecture
- 2.4 GHz client radio
- 5 GHz client radio
- Scanning/security radio*
- Bluetooth LE beacon**
Enterprise wireless
- Band steering & Auto RF
- Traffic shaping& QoS
- Secure login
Advanced features
- Deep packet inspection
- Location analytics
- Splash page logins
Enterprise license
- 24x7 support
- Advance replacement
PoE & DC power options
*except MR66, MR62
**except MR18, MR66, MR62
Wave 2 802.11ac
4-stream4x4
4ssMU-MIMO
160 MHz channels
Multigigabit (MR53)
Wave 2 802.11ac
3-stream3x3
2ssMU-MIMO
80 MHz channels
MR32 Entry-level 11ac MR18 Entry-level 11n
802.11ac
2-stream2x2
SU-MIMO
802.11n
2-stream2x2
Outdoor / rugged
MR72 High-performance MR66 General-purpose MR62 Entry-level
802.11ac
quad-radio
2-stream2x2
802.11n
dual-radio
2-stream2x2
802.11n
single-radio
2-stream2x2
Meraki MR wireless portfolio
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38
Bluetooth and Beacons
Bluetooth & BLE integrated in many
consumer devices already
Beacons use BLE for location services like
asset tracking, mobile commerce, and nav
-iBeacon is Apple’s BLE trademark
Gaining traction as an opt-in alternative to
WiFi-based location services
Integrated Bluetooth to drive location trends
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39
Use Case: Location Engagement with Beacons
Seamless site-wide
deployment by integrating
Beacons into the AP
Better consumer
experience with opt-in
mobile app integration
Increased customer
visibility with both WiFi
and Bluetooth analytics
built-in
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40
Use Case: Asset Tracking with Bluetooth
Seamless site-wide
deployment with Bluetooth
integrated into the AP
Track Beacon-tagged
assets with Bluetooth
scanning and location
estimation
Increased administrative
visibility with both WiFi
and Bluetooth inventory
built-in
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41
MR Configuration (APs have been turned off)
• Rename existing SSID under Configuration to “Corp” and enable an additional SSID for “Guest”
• On your “Corp” SSID, use WPA2-Enterprise for authentication and add a RADIUS server with IP address
10.0.250.100, port 1812 and shared key “meraki123”. Change client IP assignment to “Bridge Mode” and
VLAN tagging to 1
• On the “Guest” SSID, ensure the users sign on with a simple click-through splash page that refreshes
every half hour (hint: customize it under Configure / Splash Page). Change client IP assignment to “Bridge
Mode” and VLAN tagging to 100
• Under Configure / Firewall & Traffic Shaping, select the “Guest” SSID and create L7 firewall rules to block
P2P File Sharing and Gaming on this SSID. Also, limit the per-client bandwidth to 1 Mbps
• Block access to the Local LAN from clients connected to the “Guest” SSID
Cisco Confidential 42© 2015 Cisco and/or its affiliates. All rights reserved.
Systems Manager Enterprise
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43
Cisco’s Enterprise Mobility Solution: Systems Manager
Meraki Systems Manager
Cloud Managed Mobility Management
Provision, monitor, and secure mobile devices
Flexible, easy
provisioning
Centrally scale 100,000s
devices worldwide
Auto-tagging, dynamic
security compliance
Integrate seamlessly with the
rest of your Cisco network
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 44
Risk of Mobile Devices in the Enterprise?
• Insider Misuse = Significant Cause of Breaches
>20% of breaches come directly from insiders with malicious intent.
In most breaches, attackers havefoothold within internal networks &
spread / steal data through privilege abuse / credential misuse.
• Mobile Devices = Increasingly Used to Harvest Data
Adware grew 136% to 410,000 apps between 2013 and first three
quarters of 2014, givingattackers accesstopersonal information
such as contacts, whichcansubsequently be used to launch
phishing attacks
• Mobile Device Management = Critical in Preventing Breaches
22% of breaches reported by network security decisionmakers
involvelost / stolendevices
Are the devices on your network secure?
Cisco Confidential 45© 2015 Cisco and/or its affiliates. All rights reserved.
SM Dashboard Demo
Thank you.

Contenu connexe

Tendances

Colt's evolution from MPLS to Cloud Networking
Colt's evolution from MPLS to Cloud Networking Colt's evolution from MPLS to Cloud Networking
Colt's evolution from MPLS to Cloud Networking Colt Technology Services
 
Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)Anwesh Dixit
 
SD WAN Overview | What is SD WAN | Benefits of SD WAN
SD WAN Overview | What is SD WAN | Benefits of SD WAN SD WAN Overview | What is SD WAN | Benefits of SD WAN
SD WAN Overview | What is SD WAN | Benefits of SD WAN Ashutosh Kaushik
 
Enterprise WAN Transformation: SD-WAN, SASE, and the Pandemic
Enterprise WAN Transformation: SD-WAN, SASE, and the PandemicEnterprise WAN Transformation: SD-WAN, SASE, and the Pandemic
Enterprise WAN Transformation: SD-WAN, SASE, and the PandemicEnterprise Management Associates
 
Introduction to nexux from zero to Hero
Introduction to nexux  from zero to HeroIntroduction to nexux  from zero to Hero
Introduction to nexux from zero to HeroDhruv Sharma
 
Secure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAltoSecure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAltoPrime Infoserv
 
Customer Presentation - Aruba Wi-Fi Overview (1).PPTX
Customer Presentation - Aruba Wi-Fi Overview (1).PPTXCustomer Presentation - Aruba Wi-Fi Overview (1).PPTX
Customer Presentation - Aruba Wi-Fi Overview (1).PPTXssuser5824cf
 
Putting Firepower Into The Next Generation Firewall
Putting Firepower Into The Next Generation FirewallPutting Firepower Into The Next Generation Firewall
Putting Firepower Into The Next Generation FirewallCisco Canada
 
Cisco ASA Firepower
Cisco ASA FirepowerCisco ASA Firepower
Cisco ASA FirepowerAnwesh Dixit
 
TechWiseTV Workshop: Cisco Catalyst 9100 Access Points for Wi-Fi 6
TechWiseTV Workshop: Cisco Catalyst 9100 Access Points for Wi-Fi 6TechWiseTV Workshop: Cisco Catalyst 9100 Access Points for Wi-Fi 6
TechWiseTV Workshop: Cisco Catalyst 9100 Access Points for Wi-Fi 6Robb Boyd
 
ECMS2 Training Slides.pdf
ECMS2 Training Slides.pdfECMS2 Training Slides.pdf
ECMS2 Training Slides.pdfaplic1
 

Tendances (20)

Colt's evolution from MPLS to Cloud Networking
Colt's evolution from MPLS to Cloud Networking Colt's evolution from MPLS to Cloud Networking
Colt's evolution from MPLS to Cloud Networking
 
ISE-802.1X-MAB
ISE-802.1X-MABISE-802.1X-MAB
ISE-802.1X-MAB
 
Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)
 
SD WAN Overview | What is SD WAN | Benefits of SD WAN
SD WAN Overview | What is SD WAN | Benefits of SD WAN SD WAN Overview | What is SD WAN | Benefits of SD WAN
SD WAN Overview | What is SD WAN | Benefits of SD WAN
 
Understanding SASE
Understanding SASE Understanding SASE
Understanding SASE
 
Enterprise WAN Transformation: SD-WAN, SASE, and the Pandemic
Enterprise WAN Transformation: SD-WAN, SASE, and the PandemicEnterprise WAN Transformation: SD-WAN, SASE, and the Pandemic
Enterprise WAN Transformation: SD-WAN, SASE, and the Pandemic
 
Introduction to nexux from zero to Hero
Introduction to nexux  from zero to HeroIntroduction to nexux  from zero to Hero
Introduction to nexux from zero to Hero
 
Secure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAltoSecure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAlto
 
Aruba 802.11n Networks Validated Reference Design
Aruba 802.11n Networks Validated Reference DesignAruba 802.11n Networks Validated Reference Design
Aruba 802.11n Networks Validated Reference Design
 
Customer Presentation - Aruba Wi-Fi Overview (1).PPTX
Customer Presentation - Aruba Wi-Fi Overview (1).PPTXCustomer Presentation - Aruba Wi-Fi Overview (1).PPTX
Customer Presentation - Aruba Wi-Fi Overview (1).PPTX
 
Putting Firepower Into The Next Generation Firewall
Putting Firepower Into The Next Generation FirewallPutting Firepower Into The Next Generation Firewall
Putting Firepower Into The Next Generation Firewall
 
Access Management with Aruba ClearPass
Access Management with Aruba ClearPassAccess Management with Aruba ClearPass
Access Management with Aruba ClearPass
 
Cisco ASA Firepower
Cisco ASA FirepowerCisco ASA Firepower
Cisco ASA Firepower
 
Aruba ClearPass Guest 6.3 User Guide
Aruba ClearPass Guest 6.3 User GuideAruba ClearPass Guest 6.3 User Guide
Aruba ClearPass Guest 6.3 User Guide
 
TechWiseTV Workshop: Cisco Catalyst 9100 Access Points for Wi-Fi 6
TechWiseTV Workshop: Cisco Catalyst 9100 Access Points for Wi-Fi 6TechWiseTV Workshop: Cisco Catalyst 9100 Access Points for Wi-Fi 6
TechWiseTV Workshop: Cisco Catalyst 9100 Access Points for Wi-Fi 6
 
Advanced rf troubleshooting_peter lane
Advanced rf troubleshooting_peter laneAdvanced rf troubleshooting_peter lane
Advanced rf troubleshooting_peter lane
 
Advanced ClearPass Workshop
Advanced ClearPass WorkshopAdvanced ClearPass Workshop
Advanced ClearPass Workshop
 
ClearPass Overview
ClearPass OverviewClearPass Overview
ClearPass Overview
 
Managing and Optimizing RF Spectrum for Aruba WLANs
Managing and Optimizing RF Spectrum for Aruba WLANsManaging and Optimizing RF Spectrum for Aruba WLANs
Managing and Optimizing RF Spectrum for Aruba WLANs
 
ECMS2 Training Slides.pdf
ECMS2 Training Slides.pdfECMS2 Training Slides.pdf
ECMS2 Training Slides.pdf
 

En vedette

Cisco Meraki Product Launch Q1 2017
Cisco Meraki Product Launch Q1 2017Cisco Meraki Product Launch Q1 2017
Cisco Meraki Product Launch Q1 2017Maticmind
 
MX Deep Dive PPT
MX Deep Dive PPTMX Deep Dive PPT
MX Deep Dive PPTomar awad
 
Meraki cloud managed products
Meraki cloud managed productsMeraki cloud managed products
Meraki cloud managed productsAtanas Gergiminov
 
Cisco Meraki - Simplifying Powerful Technology
Cisco Meraki - Simplifying Powerful TechnologyCisco Meraki - Simplifying Powerful Technology
Cisco Meraki - Simplifying Powerful TechnologyCisco Canada
 
Meraki powered services bell
Meraki powered services   bellMeraki powered services   bell
Meraki powered services bellCisco Canada
 
È l'ora del Cloud Managed IT
È l'ora del Cloud Managed ITÈ l'ora del Cloud Managed IT
È l'ora del Cloud Managed ITMatteo Masi
 
Azure Services Platform Oc Event Ned
Azure Services Platform Oc Event NedAzure Services Platform Oc Event Ned
Azure Services Platform Oc Event NedWes Yanaga
 
Gov 2.0: Scaling, Automation, & Management in the Cloud
Gov 2.0: Scaling, Automation, & Management in the CloudGov 2.0: Scaling, Automation, & Management in the Cloud
Gov 2.0: Scaling, Automation, & Management in the CloudJesse Robbins
 
Oracle Management Cloud
Oracle Management CloudOracle Management Cloud
Oracle Management CloudFabio Batista
 
Smau Bologna 2015 - Microsoft - Azure
Smau Bologna 2015 - Microsoft - AzureSmau Bologna 2015 - Microsoft - Azure
Smau Bologna 2015 - Microsoft - AzureSMAU
 
Simplify IT Operations by Unifying Element Management with Vistara
Simplify IT Operations by Unifying Element Management with VistaraSimplify IT Operations by Unifying Element Management with Vistara
Simplify IT Operations by Unifying Element Management with VistaraVistara
 
Cloud Operations and Analytics: Improving Distributed Systems Reliability usi...
Cloud Operations and Analytics: Improving Distributed Systems Reliability usi...Cloud Operations and Analytics: Improving Distributed Systems Reliability usi...
Cloud Operations and Analytics: Improving Distributed Systems Reliability usi...Jorge Cardoso
 
User eXperience Design - New Energy Mind
User eXperience Design - New Energy MindUser eXperience Design - New Energy Mind
User eXperience Design - New Energy MindNew Energy Group
 
Qcil presentation health care conference
Qcil presentation  health care conferenceQcil presentation  health care conference
Qcil presentation health care conferenceUHF-EAHF2012
 
7 Essential Stages to a Total Online Presence
7 Essential Stages to a Total Online Presence7 Essential Stages to a Total Online Presence
7 Essential Stages to a Total Online PresenceDuct Tape Marketing
 
The Microsoft Cloud - Azure | Office 365 | Intune
The Microsoft Cloud - Azure | Office 365 | IntuneThe Microsoft Cloud - Azure | Office 365 | Intune
The Microsoft Cloud - Azure | Office 365 | IntuneRola Ezzeddine
 
Meraki Company And Product Overview
Meraki Company And Product OverviewMeraki Company And Product Overview
Meraki Company And Product Overviewxanstevenson
 

En vedette (20)

Cisco Meraki Product Launch Q1 2017
Cisco Meraki Product Launch Q1 2017Cisco Meraki Product Launch Q1 2017
Cisco Meraki Product Launch Q1 2017
 
MX Deep Dive PPT
MX Deep Dive PPTMX Deep Dive PPT
MX Deep Dive PPT
 
Meraki cloud managed products
Meraki cloud managed productsMeraki cloud managed products
Meraki cloud managed products
 
Cisco Meraki - Simplifying Powerful Technology
Cisco Meraki - Simplifying Powerful TechnologyCisco Meraki - Simplifying Powerful Technology
Cisco Meraki - Simplifying Powerful Technology
 
Meraki powered services bell
Meraki powered services   bellMeraki powered services   bell
Meraki powered services bell
 
Presentazione meraki mdm
Presentazione meraki mdmPresentazione meraki mdm
Presentazione meraki mdm
 
MX Analyst Deck
MX Analyst DeckMX Analyst Deck
MX Analyst Deck
 
È l'ora del Cloud Managed IT
È l'ora del Cloud Managed ITÈ l'ora del Cloud Managed IT
È l'ora del Cloud Managed IT
 
Azure Services Platform Oc Event Ned
Azure Services Platform Oc Event NedAzure Services Platform Oc Event Ned
Azure Services Platform Oc Event Ned
 
Gov 2.0: Scaling, Automation, & Management in the Cloud
Gov 2.0: Scaling, Automation, & Management in the CloudGov 2.0: Scaling, Automation, & Management in the Cloud
Gov 2.0: Scaling, Automation, & Management in the Cloud
 
Oracle Management Cloud
Oracle Management CloudOracle Management Cloud
Oracle Management Cloud
 
Smau Bologna 2015 - Microsoft - Azure
Smau Bologna 2015 - Microsoft - AzureSmau Bologna 2015 - Microsoft - Azure
Smau Bologna 2015 - Microsoft - Azure
 
Simplify IT Operations by Unifying Element Management with Vistara
Simplify IT Operations by Unifying Element Management with VistaraSimplify IT Operations by Unifying Element Management with Vistara
Simplify IT Operations by Unifying Element Management with Vistara
 
Cloud Operations and Analytics: Improving Distributed Systems Reliability usi...
Cloud Operations and Analytics: Improving Distributed Systems Reliability usi...Cloud Operations and Analytics: Improving Distributed Systems Reliability usi...
Cloud Operations and Analytics: Improving Distributed Systems Reliability usi...
 
User eXperience Design - New Energy Mind
User eXperience Design - New Energy MindUser eXperience Design - New Energy Mind
User eXperience Design - New Energy Mind
 
Qcil presentation health care conference
Qcil presentation  health care conferenceQcil presentation  health care conference
Qcil presentation health care conference
 
Google analitycs
Google analitycsGoogle analitycs
Google analitycs
 
7 Essential Stages to a Total Online Presence
7 Essential Stages to a Total Online Presence7 Essential Stages to a Total Online Presence
7 Essential Stages to a Total Online Presence
 
The Microsoft Cloud - Azure | Office 365 | Intune
The Microsoft Cloud - Azure | Office 365 | IntuneThe Microsoft Cloud - Azure | Office 365 | Intune
The Microsoft Cloud - Azure | Office 365 | Intune
 
Meraki Company And Product Overview
Meraki Company And Product OverviewMeraki Company And Product Overview
Meraki Company And Product Overview
 

Similaire à Meraki Cloud Networking Workshop

Cisco Cloud Networking Workshop
Cisco Cloud Networking Workshop Cisco Cloud Networking Workshop
Cisco Cloud Networking Workshop Cisco Canada
 
Cloud networking workshop
Cloud networking workshopCloud networking workshop
Cloud networking workshopCisco Canada
 
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation FirewallCisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation FirewallCisco Canada
 
The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:
The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:
The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:Cisco Canada
 
Presentation data center virtualization –setting the foundation
Presentation   data center virtualization –setting the foundationPresentation   data center virtualization –setting the foundation
Presentation data center virtualization –setting the foundationxKinAnx
 
Presentation cisco data center security deep dive
Presentation   cisco data center security deep divePresentation   cisco data center security deep dive
Presentation cisco data center security deep divexKinAnx
 
Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...
Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...
Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...Cisco Canada
 
Secure collab on prem hikmat
Secure collab on prem   hikmatSecure collab on prem   hikmat
Secure collab on prem hikmatCisco Canada
 
Secure collab on premise
Secure collab on premiseSecure collab on premise
Secure collab on premiseCisco Canada
 
Presentation cisco nexus enabling the cloud infrastructure
Presentation   cisco nexus enabling the cloud infrastructurePresentation   cisco nexus enabling the cloud infrastructure
Presentation cisco nexus enabling the cloud infrastructurexKinAnx
 
Innovations in Mobility
Innovations in MobilityInnovations in Mobility
Innovations in MobilityCisco Canada
 
Putting Firepower into the Next Generation Firewall
Putting Firepower into the Next Generation FirewallPutting Firepower into the Next Generation Firewall
Putting Firepower into the Next Generation FirewallCisco Canada
 
Cisco SDN/NVF Innovations (SDN NVF Day ITB 2016)
Cisco SDN/NVF Innovations (SDN NVF Day ITB 2016)Cisco SDN/NVF Innovations (SDN NVF Day ITB 2016)
Cisco SDN/NVF Innovations (SDN NVF Day ITB 2016)SDNRG ITB
 
Cisco connect winnipeg 2018 putting firepower into the next generation fire...
Cisco connect winnipeg 2018   putting firepower into the next generation fire...Cisco connect winnipeg 2018   putting firepower into the next generation fire...
Cisco connect winnipeg 2018 putting firepower into the next generation fire...Cisco Canada
 
The Data Center Network Evolution
The Data Center Network EvolutionThe Data Center Network Evolution
The Data Center Network EvolutionCisco Canada
 
Unified Access Update - 11AC and Switching Platform
Unified Access Update - 11AC and Switching PlatformUnified Access Update - 11AC and Switching Platform
Unified Access Update - 11AC and Switching PlatformCisco Canada
 
Security & Virtualization in the Data Center
Security & Virtualization in the Data CenterSecurity & Virtualization in the Data Center
Security & Virtualization in the Data CenterCisco Russia
 
Cisco Connect Ottawa 2018 the intelligent network with Cisco Meraki
Cisco Connect Ottawa 2018 the intelligent network with Cisco MerakiCisco Connect Ottawa 2018 the intelligent network with Cisco Meraki
Cisco Connect Ottawa 2018 the intelligent network with Cisco MerakiCisco Canada
 

Similaire à Meraki Cloud Networking Workshop (20)

Cisco Cloud Networking Workshop
Cisco Cloud Networking Workshop Cisco Cloud Networking Workshop
Cisco Cloud Networking Workshop
 
Cloud networking workshop
Cloud networking workshopCloud networking workshop
Cloud networking workshop
 
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation FirewallCisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
Cisco Connect Toronto 2017 - Putting Firepower into the Next Generation Firewall
 
The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:
The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:
The Hitch-Hikers Guide to Data Centre Virtualization and Workload Consolidation:
 
Comstor: Cisco BE6000
Comstor: Cisco BE6000Comstor: Cisco BE6000
Comstor: Cisco BE6000
 
Presentation data center virtualization –setting the foundation
Presentation   data center virtualization –setting the foundationPresentation   data center virtualization –setting the foundation
Presentation data center virtualization –setting the foundation
 
Presentation cisco data center security deep dive
Presentation   cisco data center security deep divePresentation   cisco data center security deep dive
Presentation cisco data center security deep dive
 
Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...
Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...
Cisco Connect Vancouver 2017 - Putting firepower into the next generation fir...
 
Secure collab on prem hikmat
Secure collab on prem   hikmatSecure collab on prem   hikmat
Secure collab on prem hikmat
 
Secure collab on premise
Secure collab on premiseSecure collab on premise
Secure collab on premise
 
Presentation cisco nexus enabling the cloud infrastructure
Presentation   cisco nexus enabling the cloud infrastructurePresentation   cisco nexus enabling the cloud infrastructure
Presentation cisco nexus enabling the cloud infrastructure
 
Innovations in Mobility
Innovations in MobilityInnovations in Mobility
Innovations in Mobility
 
Putting Firepower into the Next Generation Firewall
Putting Firepower into the Next Generation FirewallPutting Firepower into the Next Generation Firewall
Putting Firepower into the Next Generation Firewall
 
Cisco SDN/NVF Innovations (SDN NVF Day ITB 2016)
Cisco SDN/NVF Innovations (SDN NVF Day ITB 2016)Cisco SDN/NVF Innovations (SDN NVF Day ITB 2016)
Cisco SDN/NVF Innovations (SDN NVF Day ITB 2016)
 
Cisco connect winnipeg 2018 putting firepower into the next generation fire...
Cisco connect winnipeg 2018   putting firepower into the next generation fire...Cisco connect winnipeg 2018   putting firepower into the next generation fire...
Cisco connect winnipeg 2018 putting firepower into the next generation fire...
 
2500 controller
2500 controller2500 controller
2500 controller
 
The Data Center Network Evolution
The Data Center Network EvolutionThe Data Center Network Evolution
The Data Center Network Evolution
 
Unified Access Update - 11AC and Switching Platform
Unified Access Update - 11AC and Switching PlatformUnified Access Update - 11AC and Switching Platform
Unified Access Update - 11AC and Switching Platform
 
Security & Virtualization in the Data Center
Security & Virtualization in the Data CenterSecurity & Virtualization in the Data Center
Security & Virtualization in the Data Center
 
Cisco Connect Ottawa 2018 the intelligent network with Cisco Meraki
Cisco Connect Ottawa 2018 the intelligent network with Cisco MerakiCisco Connect Ottawa 2018 the intelligent network with Cisco Meraki
Cisco Connect Ottawa 2018 the intelligent network with Cisco Meraki
 

Plus de Cisco Canada

Cisco connect montreal 2018 net devops
Cisco connect montreal 2018 net devopsCisco connect montreal 2018 net devops
Cisco connect montreal 2018 net devopsCisco Canada
 
Cisco connect montreal 2018 iot demo kinetic fr
Cisco connect montreal 2018   iot demo kinetic frCisco connect montreal 2018   iot demo kinetic fr
Cisco connect montreal 2018 iot demo kinetic frCisco Canada
 
Cisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Cisco connect montreal 2018 - Network Slicing: Horizontal VirtualizationCisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Cisco connect montreal 2018 - Network Slicing: Horizontal VirtualizationCisco Canada
 
Cisco connect montreal 2018 secure dc
Cisco connect montreal 2018    secure dcCisco connect montreal 2018    secure dc
Cisco connect montreal 2018 secure dcCisco Canada
 
Cisco connect montreal 2018 enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018   enterprise networks - say goodbye to vla nsCisco connect montreal 2018   enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018 enterprise networks - say goodbye to vla nsCisco Canada
 
Cisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse localeCisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse localeCisco Canada
 
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec CiscoCisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec CiscoCisco Canada
 
Cisco connect montreal 2018 collaboration les services webex hybrides
Cisco connect montreal 2018 collaboration les services webex hybridesCisco connect montreal 2018 collaboration les services webex hybrides
Cisco connect montreal 2018 collaboration les services webex hybridesCisco Canada
 
Integration cisco et microsoft connect montreal 2018
Integration cisco et microsoft connect montreal 2018Integration cisco et microsoft connect montreal 2018
Integration cisco et microsoft connect montreal 2018Cisco Canada
 
Cisco connect montreal 2018 compute v final
Cisco connect montreal 2018   compute v finalCisco connect montreal 2018   compute v final
Cisco connect montreal 2018 compute v finalCisco Canada
 
Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco connect montreal 2018 saalvare md-program-xr-v2Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco connect montreal 2018 saalvare md-program-xr-v2Cisco Canada
 
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...Cisco Canada
 
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...Cisco Canada
 
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Connect Toronto 2018   an introduction to Cisco kineticCisco Connect Toronto 2018   an introduction to Cisco kinetic
Cisco Connect Toronto 2018 an introduction to Cisco kineticCisco Canada
 
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...Cisco Canada
 
Cisco Connect Toronto 2018 DevNet Overview
Cisco Connect Toronto 2018  DevNet OverviewCisco Connect Toronto 2018  DevNet Overview
Cisco Connect Toronto 2018 DevNet OverviewCisco Canada
 
Cisco Connect Toronto 2018 DNA assurance
Cisco Connect Toronto 2018  DNA assuranceCisco Connect Toronto 2018  DNA assurance
Cisco Connect Toronto 2018 DNA assuranceCisco Canada
 
Cisco Connect Toronto 2018 network-slicing
Cisco Connect Toronto 2018   network-slicingCisco Connect Toronto 2018   network-slicing
Cisco Connect Toronto 2018 network-slicingCisco Canada
 
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
Cisco Connect Toronto 2018   the intelligent network with cisco merakiCisco Connect Toronto 2018   the intelligent network with cisco meraki
Cisco Connect Toronto 2018 the intelligent network with cisco merakiCisco Canada
 
Cisco Connect Toronto 2018 sixty to zero
Cisco Connect Toronto 2018   sixty to zeroCisco Connect Toronto 2018   sixty to zero
Cisco Connect Toronto 2018 sixty to zeroCisco Canada
 

Plus de Cisco Canada (20)

Cisco connect montreal 2018 net devops
Cisco connect montreal 2018 net devopsCisco connect montreal 2018 net devops
Cisco connect montreal 2018 net devops
 
Cisco connect montreal 2018 iot demo kinetic fr
Cisco connect montreal 2018   iot demo kinetic frCisco connect montreal 2018   iot demo kinetic fr
Cisco connect montreal 2018 iot demo kinetic fr
 
Cisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Cisco connect montreal 2018 - Network Slicing: Horizontal VirtualizationCisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Cisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
 
Cisco connect montreal 2018 secure dc
Cisco connect montreal 2018    secure dcCisco connect montreal 2018    secure dc
Cisco connect montreal 2018 secure dc
 
Cisco connect montreal 2018 enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018   enterprise networks - say goodbye to vla nsCisco connect montreal 2018   enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018 enterprise networks - say goodbye to vla ns
 
Cisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse localeCisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse locale
 
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec CiscoCisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
 
Cisco connect montreal 2018 collaboration les services webex hybrides
Cisco connect montreal 2018 collaboration les services webex hybridesCisco connect montreal 2018 collaboration les services webex hybrides
Cisco connect montreal 2018 collaboration les services webex hybrides
 
Integration cisco et microsoft connect montreal 2018
Integration cisco et microsoft connect montreal 2018Integration cisco et microsoft connect montreal 2018
Integration cisco et microsoft connect montreal 2018
 
Cisco connect montreal 2018 compute v final
Cisco connect montreal 2018   compute v finalCisco connect montreal 2018   compute v final
Cisco connect montreal 2018 compute v final
 
Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco connect montreal 2018 saalvare md-program-xr-v2Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco connect montreal 2018 saalvare md-program-xr-v2
 
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
 
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...
 
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Connect Toronto 2018   an introduction to Cisco kineticCisco Connect Toronto 2018   an introduction to Cisco kinetic
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
 
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
 
Cisco Connect Toronto 2018 DevNet Overview
Cisco Connect Toronto 2018  DevNet OverviewCisco Connect Toronto 2018  DevNet Overview
Cisco Connect Toronto 2018 DevNet Overview
 
Cisco Connect Toronto 2018 DNA assurance
Cisco Connect Toronto 2018  DNA assuranceCisco Connect Toronto 2018  DNA assurance
Cisco Connect Toronto 2018 DNA assurance
 
Cisco Connect Toronto 2018 network-slicing
Cisco Connect Toronto 2018   network-slicingCisco Connect Toronto 2018   network-slicing
Cisco Connect Toronto 2018 network-slicing
 
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
Cisco Connect Toronto 2018   the intelligent network with cisco merakiCisco Connect Toronto 2018   the intelligent network with cisco meraki
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
 
Cisco Connect Toronto 2018 sixty to zero
Cisco Connect Toronto 2018   sixty to zeroCisco Connect Toronto 2018   sixty to zero
Cisco Connect Toronto 2018 sixty to zero
 

Dernier

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 

Dernier (20)

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 

Meraki Cloud Networking Workshop

  • 1. Cisco Confidential© 2015 Cisco and/or its affiliates. All rights reserved. 1 Cloud Networking Lab Jay Bradford and Mike Makkaoui Cloud Networking Systems Engineers May 2016
  • 2. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2 Housekeeping notes Thank you for attending Cisco ConnectToronto 2016,here are a few housekeeping notes to ensure we all enjoy the sessiontoday. • Please ensureyourcellphones/ laptops are set on silent to ensure no one is disturbed during the session • SSID: CiscoLabs Password:CiscoLabs
  • 3. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3 20 min Welcome and Introduction 35 min Dashboard Demo 20 min Local MX, MS and MR configuration 60 min MX | SecurityAppliances Lab 30 min MS | Access Switches Lab 30 min MR | WirelessAccess Points Lab 25 min SM | System Manager Demo 10 min Q&A and Wrap-Up Agenda
  • 4. Cisco Confidential 4© 2015 Cisco and/or its affiliates. All rights reserved. About Cisco Meraki
  • 5. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5 Cisco Meraki:a complete cloud-managed networking solution - Wireless, switching, security, MDM and telephony, centrally managed over the web - Built from the ground up for cloud management - Integrated hardware, software, and cloud services Cloud Networking Leader: - Cisco’s fastest-growing acquisition ever: over 100% annual growth - 600,000+ customer networks in 147 countries - Tens of millions of devices connected worldwide Recognized for innovation - Gartner Magic Quadrant - InfoWorld Technology of the Year - TechWorld Mobility product of the year - CRN Coolest Technologies About Cisco cloud-managed networking
  • 6. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6 Cloud Managed WiFi Cloud Managed Network Cloud Managed IT Meraki MR Wireless LAN Meraki MS EthernetSwitches Meraki MX Security Appliances Meraki SM MDM Meraki MC Telephony Bringing the cloud to enterprise networks
  • 7. Cisco Confidential 7© 2015 Cisco and/or its affiliates. All rights reserved. Meraki cloud architecture
  • 8. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8 Scalable Unlimited throughput, no bottlenecks Add devices or sites in minutes Reliable Highly available cloud with multiple datacenters Network functions even if connection to cloud is interrupted 99.99% uptime SLA Secure No user traffic passes through cloud Fully HIPAA / PCI compliant (level 1 certified) 3rd party security audits, daily penetration testing Automatic firmware and security updates (user-scheduled) Reliability and security information atmeraki.cisco.com/trust Management data (1 kb/s) WAN Out-of-band management in every product
  • 9. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9 Cloud Licensing Model is Simple 9 Simple Cloud Licensing model No per-feature or per-user licenses Licensing options: 1 Year, 3 Year, 5 Year, 7 Year & 10 Year Cloud License price is all inclusive Cloud Management UI 24 x 7 phone support Automated software updates Advanced hardware replacement All features built on the platform All new features
  • 10. Cisco Confidential 10© 2015 Cisco and/or its affiliates. All rights reserved. Dashboard Demo
  • 11. Cisco Confidential 11© 2015 Cisco and/or its affiliates. All rights reserved. Hands-on Labs Visit meraki.com/merakilab Session Code: #142NA * Limit of 3 free APs per customer and includes previous promotional offers
  • 12. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12 Your individual lab lives at our SF office!
  • 13. Cisco Confidential 13© 2015 Cisco and/or its affiliates. All rights reserved. Go to dashboard.meraki.com Username: torontoX@meraki.com.test Password: meraki123 X (number) as assigned Lab slides: http://cs.co/CCT2016_lab_slides Lab manual: http://cs.co/CCT2016_lab_manual
  • 14. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14 Network Topology Firewall Configuration: VLAN 1 (Corp) Subnet: 10.0.x.0/24 Interface:10.0.x.1 VLAN 30 (Voice) Subnet: 10.0.[30+x].0/24 Interface:10.0.[30+x].1 VLAN 100 (Guest) Subnet: 10.0.[100+x].0/24 Interface:10.0.[100+x].1 “x” is your lab station number Switch Configuration: VLAN 1 (Corp) Subnet: 10.0.x.0/24 Interface:10.0.x.201 Default gateway:10.0.x.1 VLAN 150 (Legacy) Subnet: 10.0.[150+x].0/24 Interface:10.0.[150+x].1 VLAN 600 (OSPF) Subnet: 192.168.0.0./24 Interface:192.168.0.x
  • 15. Cisco Confidential 15© 2015 Cisco and/or its affiliates. All rights reserved. MX | Security Appliance Lab
  • 16. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16 A Complete Unified Thread Management Solution Application Control Client Fingerprinting, Traffic Shaping, Content Filtering, Security NG Firewall, Client VPN, Site to Site VPN, IDS/IPS, Anti-Malware, Geo-Firewall Networking NAT/DHCP, 3G/4G Cellular, Link Balancing, IWAN
  • 17. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17 MX65 / MX65W – (small) Branch in a box • 802.11ac with doublethe MX64 power • 802.1x port authentication • 2 WAN ports • 8 LAN ports • 2 LAN PoE+ ports (60W total) • Ready for IWAN • Ideal for smallbranchesor telecommuters Same throughput as MX64/64W with increased interface count
  • 18. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18 Automated site-to-site VPN Site-to-site IPsec VPN in just two clicks in the Dashboard Simple Creates L3 site-to-site VPN tunnels with just 2 clicks in the dashboard Automatic Comparable to Cisco DMVPN, it creates a mesh or hub-and-spoke VPN tunnel between all peers and adjusts to IP changes Resilient Automatic failover over to secondary WAN link or 3G/4G USB modem
  • 19. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19 Meraki Intelligent WAN WAN 1 Secure VPN tunnel (active) Latency / loss > threshold WAN 2 Secure VPN tunnel (active) Latency / loss < threshold Data Based on L3 / L4 categorization, this data normally travels out WAN 1 (PbR), but MX detects optimal path is WAN 2 based on latency / loss on WAN 1 (PfR). Dual-active path: Active-active VPN Policy-based routing (PbR): Allows uplinks to be intelligentlyassigned based on traffic protocol, subnet, source, destination, etc. Dynamic Path Selection Ensures the best uplink is used based on latency and loss metrics Reference Meraki Architecture The architecture diagram displaysthe Meraki full-stack alongside iWAN.
  • 20. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20 Choosing the right MX for your environment MX64/64W MX65/65W MX84 MX100 MX400 MX600 Z1 Small branch (~50 users) Where FW Throughput 250 Mbps Campus / VPN concentration (~10,000 users) Large branch / campus (~2,000 users) Mid-size branch (~200 users) Mid-size branch / small campus (~500 users) Notable Features 802.11ac wireless (MX64W/MX65W) Power redundancy Modular interface SFP or SFP+ (with modules) 500 MbpsSFP Ports 750 MbpsSFP Ports 1 Gbps 2 Gbps Power redundancy Modular interface SFP or SFP+ (with modules) For teleworkers (1-5 users) Dual-radio wireless FW throughput:50 Mbps All devices support3G/4G
  • 21. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21 MX Base Configuration • Enable VLANs and create VLANs 1 (Corp), 30 (Voice) and 100 (Guest) per the Network Topology diagram. • Ensure that non-tagged traffic will be part of VLAN 1 (native vlan) • VLAN 1 (Corp) Reserve IP addresses .150 through .250 under DHCP Settings • When done go to Switch/Switches and under live tools reboot your switch • Apply the following global default policies (Hint: Below section does not use grouppolicies) • Completely block BitTorrent • For Netflix and Pandora, shape traffic to 100K down, 50 K up. Ensure they are low priority and are marked appropriately. • Apply content filtering for adult websites • Enable site-to-site VPN with following settings • Type: Spoke • Full Tunnel (Hint: Default Route) • Hubs: Data Center 1 and Data Center 2 (Prioritize Data Center 2) • Include VLAN 1 and VLAN 30 in VPN and exclude VLAN 100 • Check the Route Table and VPN Status under Monitoring • You should be able to ‘ping’ your neighbor’s networks and the Data Center networks • (Hint: “10.0.lab#.1”, 10.0.250.1, 10.0.251.1, 10.0.252.1)
  • 22. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22 MX IWAN Configuration • Security appliance > Configure > Traffic shaping • Uplink configuration • Uplink bandwidth WAN 1 = 10Mb, WAN 2 = 5Mb • Global preferences • Load balancing enabled • Flow preferences • Internet traffic • “Guest” subnet prefers WAN 2 • Custom performance classes • Create “Acceptable Delay” with a setting of 250ms • VPN Traffic • Any Protocol with Destination 8.8.8.8/32 prefer WAN 2 unless performanceexceeds for “Acceptable Delay” • “Corp” subnet Load balance on uplinks that are suitable for “Acceptable Delay” • “Voice” Preferred uplink: Best for VoIP • Verify VPN path selection by initiating ping from switch (Hint: Check Security Appliance/VPN Status) • In a new browser tab Ping 8.8.8.8 and 8.8.4.4 from your Security Appliances “live tools” • Review and note the results on the VPN status page • Wait for instructor to createISP level disruption
  • 23. Cisco Confidential 23© 2015 Cisco and/or its affiliates. All rights reserved. MS | Switch Lab
  • 24. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24 Complete Campus Switching Portfolio 22 modelsscaling from access to campus aggregation Enterprise-classperformance and reliabilityincluding non-blocking Gigabit performance,802.3af/at PoE/PoE+on all ports, 10GbE uplinks,and voice and video QoS Voice and video QoS Dynamic Routing Layer 7 app visibility Virtual stacking Enterprise security, ACLs Remote packet capture, cable testing Feature highlights
  • 25. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25 Mission Critical Features OSPF Dynamic routing with intuitive, browser-based configuration IPv6 visibility and tracking Usage statistics for IPv6 address now in Dashboard DHCP server Integrated DHCP service to help prevent single points of network failure IPv4 Access Control Lists (ACLs) Granular security boundaries configurable by subnet, protocol, port range, or host. Virtual Router Redundancy Protocol (VRRP) with DHCP Failover support High availability via a warm spare with automaticfailover and DHCP failover support Addressingevolvingcustomerneedsaroundredundancy,campusconnectivity,and reducing complexity
  • 26. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26 Meraki stacking: Virtual and physical San Francisco London Sydney Apply Access Policy on ports 1-10 San Francisco Benefits of virtual stacking apply equally to standalone or physically stacked switches Step 1: Select ports to edit Step 2: Configure multiple ports as desired Step 3: Save, you’re done! Standalone switches Stacked switches
  • 27. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27 MR52 and MR53 Highest Performance 802.11acIntroducing MS350-24X Stackable Multigigabit L3 access switch Gigabit (1G) Multigigabit (1/2.5/5/10G) • New 24-port addition to the MS350 Family • 8 Multigigabit (1/2.5/5/10G) ports • UPoE (60W) capable • Designed to work with the new Multigigabit-capable MR53 Launching & shipping 17 May $7,495
  • 28. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28 MR52 and MR53 Highest Performance 802.11acIntroducing MS425 Next Gen 10G aggregation • 16 & 32 port 10G fiber aggregation • 40G QSFP+ uplinks • Flexible stacking • MS420 refresh with additional price points & unified design • Ships with 1 PSU and all fans (redundant PSU is optional) 10 Gigabit (SFP+) 40 Gigabit (QSFP+) Launching & shipping 17 May MS425-16 $14,000 MS425-32 $22,000
  • 29. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29 Access Aggregation MS220 MS320 MS350 MS410 MS420 MS425 Features • 8, 24, 48 port models • Layer 2 • Gigabit SFP uplinks • 24, 48 port models • Layer 3 • 10Gb SFP+ uplinks • Hot-swappable, redundant power supplies • 24, 48 port models • Physical stacking (160Gbps) • High performance Layer 3 • 1Gb & Multigigabit • 10Gb SFP+ uplinks • Hot-swappable fans and power supplies • Management port • 16, 32 port models • Physical stacking (160Gbps) • High performance Layer 3 • 1Gb SFP interfaces • 10Gb SFP+ uplinks • Hot-swappable fans and power supplies • Management port • 24, 48 port models • Front-port stacking • High performance Layer 3 • 10Gb SFP+ • Hot-swappable, redundant fans and power supplies • Management port • 16, 32 port models • Front-port stacking • High performance Layer 3 • 10G SFP+ • 40Gb QSFP+ uplinks • Hot-swappable fans and power supplies • Management port Positioning • Branch access switching (L2) • Branch and Campus access switching (L3) • Stackable Branch and Campus access switching (L3) • Stackable Branch and Campus aggregation switching (L3) • Stackable Campus aggregation switching (L3) • Stackable Campus aggregation switching (L3) Meraki MS switching product families
  • 30. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30 MS Base Configuration • Verify that your switch is operational under Monitoring page (green status, passing traffic) • Click on “Initialize layer 3 features” link to add following SVIs: • Name: Corp Subnet: 10.0.x.0/24 Interface: 10.0.x.201 VLAN: 1 Default gateway: 10.0.x.1 Disable DHCP • Name: Legacy, Subnet: 10.0.[150+x].0/24, Interface: 10.0.[150+x].1, VLAN: 150, DHCP Enabled • Name: OSPF, Subnet: 192.168.0.0/24, Interface IP: 192.168.0.x, VLAN: 600, Disable DHCP • Go to the MX Appliance and create a static route for the “Legacy” subnet with gateway IP address to your L3 switch SVI in the “Corp” VLAN - 10.0.x.201. • “In VPN” option shouldbe “Yes”.
  • 31. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31 MS OSPF Configuration • On the switch, configure OSPF with following settings: • First configure switch port 25 to be access VLAN 600 • Enable OSPF with default Area 0 • Edit Legacy and OSPF interfaces to use the default Area 0 and Cost 1 • Make sure static routes override the OSPF routes • Verify the OSPF neighbors and routes on the switch Monitoring page. Start a ping to 10.0.252.1 from the Legacy Source interface and try again with port 25 on your switch disabled • (Hint 10.0.[150+x].1. wait about 30 sec and restart ping if necessary).
  • 32. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32 So what is going on? DC2 MX 10.0.252.2 DC2 MS 10.0.252.1 Note your VLAN30 Voice subnet is being learned through the DC2 VPN – how would you fix this?
  • 33. Cisco Confidential 33© 2015 Cisco and/or its affiliates. All rights reserved. MR | Access Point Lab
  • 34. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34 MR wireless access points 8 modelsincluding indoor / outdoor,high performance and value-priced Enterprise-classsilicon including RF optimization,PoE, voice / video support Lifetime warranty on indoor APs BYOD policies Application traffic shaping Guest access Enterprise security Location analytics WIPS – 3rd Security Radio Feature highlights
  • 35. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35 4-stream 4x4 802.11ac Wave 2 160 MHz channels & MU-MIMO Quad-radio architecture Dedicated scanning radio & BLE Dual 1-gigabit Ethernet interfaces Full operation on 802.3at PoE+ power 17 May: available in US/CAN/EU/ANZ/JP US$ 1,399 list price Introducing MR52 Highest performance 802.11ac 1-gigabit 1-gigabit
  • 36. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36 4-stream 4x4 802.11ac Wave 2 160 MHz channels & MU-MIMO Quad-radio architecture Dedicated scanning radio & BLE Multigigabit + 1-gigabit Ethernet Full operation on 802.3at PoE+ power 17 May: available in US/CAN/EU/ANZ/JP US$ 1,699 list price Introducing MR53 Future-proof802.11ac 100/1000/2.5G 1-gigabit
  • 37. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37 Indoor Capabilities MR53 / MR52 Highest-performance & future-proof MR42 General purpose Quad-radio architecture - 2.4 GHz client radio - 5 GHz client radio - Scanning/security radio* - Bluetooth LE beacon** Enterprise wireless - Band steering & Auto RF - Traffic shaping& QoS - Secure login Advanced features - Deep packet inspection - Location analytics - Splash page logins Enterprise license - 24x7 support - Advance replacement PoE & DC power options *except MR66, MR62 **except MR18, MR66, MR62 Wave 2 802.11ac 4-stream4x4 4ssMU-MIMO 160 MHz channels Multigigabit (MR53) Wave 2 802.11ac 3-stream3x3 2ssMU-MIMO 80 MHz channels MR32 Entry-level 11ac MR18 Entry-level 11n 802.11ac 2-stream2x2 SU-MIMO 802.11n 2-stream2x2 Outdoor / rugged MR72 High-performance MR66 General-purpose MR62 Entry-level 802.11ac quad-radio 2-stream2x2 802.11n dual-radio 2-stream2x2 802.11n single-radio 2-stream2x2 Meraki MR wireless portfolio
  • 38. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38 Bluetooth and Beacons Bluetooth & BLE integrated in many consumer devices already Beacons use BLE for location services like asset tracking, mobile commerce, and nav -iBeacon is Apple’s BLE trademark Gaining traction as an opt-in alternative to WiFi-based location services Integrated Bluetooth to drive location trends
  • 39. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39 Use Case: Location Engagement with Beacons Seamless site-wide deployment by integrating Beacons into the AP Better consumer experience with opt-in mobile app integration Increased customer visibility with both WiFi and Bluetooth analytics built-in
  • 40. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40 Use Case: Asset Tracking with Bluetooth Seamless site-wide deployment with Bluetooth integrated into the AP Track Beacon-tagged assets with Bluetooth scanning and location estimation Increased administrative visibility with both WiFi and Bluetooth inventory built-in
  • 41. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41 MR Configuration (APs have been turned off) • Rename existing SSID under Configuration to “Corp” and enable an additional SSID for “Guest” • On your “Corp” SSID, use WPA2-Enterprise for authentication and add a RADIUS server with IP address 10.0.250.100, port 1812 and shared key “meraki123”. Change client IP assignment to “Bridge Mode” and VLAN tagging to 1 • On the “Guest” SSID, ensure the users sign on with a simple click-through splash page that refreshes every half hour (hint: customize it under Configure / Splash Page). Change client IP assignment to “Bridge Mode” and VLAN tagging to 100 • Under Configure / Firewall & Traffic Shaping, select the “Guest” SSID and create L7 firewall rules to block P2P File Sharing and Gaming on this SSID. Also, limit the per-client bandwidth to 1 Mbps • Block access to the Local LAN from clients connected to the “Guest” SSID
  • 42. Cisco Confidential 42© 2015 Cisco and/or its affiliates. All rights reserved. Systems Manager Enterprise
  • 43. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43 Cisco’s Enterprise Mobility Solution: Systems Manager Meraki Systems Manager Cloud Managed Mobility Management Provision, monitor, and secure mobile devices Flexible, easy provisioning Centrally scale 100,000s devices worldwide Auto-tagging, dynamic security compliance Integrate seamlessly with the rest of your Cisco network
  • 44. © 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 44 Risk of Mobile Devices in the Enterprise? • Insider Misuse = Significant Cause of Breaches >20% of breaches come directly from insiders with malicious intent. In most breaches, attackers havefoothold within internal networks & spread / steal data through privilege abuse / credential misuse. • Mobile Devices = Increasingly Used to Harvest Data Adware grew 136% to 410,000 apps between 2013 and first three quarters of 2014, givingattackers accesstopersonal information such as contacts, whichcansubsequently be used to launch phishing attacks • Mobile Device Management = Critical in Preventing Breaches 22% of breaches reported by network security decisionmakers involvelost / stolendevices Are the devices on your network secure?
  • 45. Cisco Confidential 45© 2015 Cisco and/or its affiliates. All rights reserved. SM Dashboard Demo
  • 46.