Op werkdagen voor 23:00 besteld, morgen in huis Gratis verzending vanaf €20
, , , e.a.

Cisco Meraki Fundamentals

Cloud-Managed Operations

Paperback Engels 2024 9780138167578
Verwachte levertijd ongeveer 9 werkdagen

Samenvatting

Are you ready to challenge the ways you have always approached networking? The IT world has undergone a transformation, and fast solutions just aren’t fast enough anymore. A platform-based approach with automated processing of data is no longer a dream of the future—it's a requirement of the present.

 

In Cisco Meraki Fundamentals, you will learn how to “think” platform: end-to-end control, management, and visibility of operations, all with less complexity. As you embrace this thinking, the possibilities for producing optimized solutions to problems now and in the future become constraints merely of your imagination.

 

Cisco Meraki Fundamentals provides everything you need to get started forging a platform-centric journey. From the basics of cloud architecture and building the Dashboard, through automation, best practices, and a look at the Meraki admin experience, Cisco Meraki Fundamentals provides a powerful foundation from which to forge a digital operation for the future.

  Learn the origins of the Cisco Meraki cloud-managed platform, from founding concept through philosophy and goals Learn to manage data that emerges from day-to-day operations and how to get to outcomes more quickly Understand the differences between cloud-managed Meraki networks and more traditional networks Get to know the basics of administering a network with the Meraki Dashboard See examples of Meraki-specific best practices, as well as how to integrate and automate with non-Meraki tools and services See an overview of how the cloud platform assists in identifying and troubleshooting potential issues more easily Look in on a day in the life of a Meraki-based platform administrator, including use cases for the Meraki cloud platform

 

Online Bonus Content:

Access all the images from the book on the book's companion website.

Specificaties

ISBN13:9780138167578
Taal:Engels
Bindwijze:Paperback

Lezersrecensies

Wees de eerste die een lezersrecensie schrijft!

Inhoudsopgave

<p>Foreword xxii<br> Introduction xxiv<br> <strong>Part I Knowledge Is Power: Understanding the Cloud Architecture<br> Chapter 1</strong> Cisco Meraki Cloud Architecture Basics 1<br> Dashboard Architecture 1<br> Cloud/Back-end Architecture 3<br> Device to Cloud Communication 4<br> Data Security and Retention 6<br> Firmware Management and Lifecycle 7<br> Summary 9<br> Additional Reading 10<br> <strong>Chapter 2</strong> Building the Dashboard 11<br> Creating an Organization 12<br> Creating a Network 14<br> Claiming and Adding Devices 15<br> Defining Administrators and Privileges 17<br> Special Access Roles 18<br> SAML Roles 20<br> Maintaining Control of the Dashboard 21<br> Tagging to Scope 22<br> Intro to Tags 22<br> Tagging for Administrative Privileges 22<br> Network and Device Configurations 23<br> Configuring SSID Availability on MR Access Points 23<br> Configuring Non-Meraki VPN Peer Availability for MX and Z Series Devices 24<br> Meraki Systems Manager 25<br> Dashboard Alerting and Reporting 25<br> Dashboard Email Alerts 26<br> Webhooks 27<br> Syslog 28<br> SNMP and SNMP Traps 29<br> Automated Summary Reports 29<br> Meraki Insight Alerts 31<br> Alert Hubs 33<br> Global Overview 34<br> Summary 35<br> Additional Reading 35<br> <strong>Part II Building a Scalable Foundation with Dashboard<br> Chapter 3</strong> The Meraki Admin Experience 37<br> Org-wide Health 38<br> Firmware Status 39<br> Detailed Firmware Status and Security 40<br> Proactive Replacements 41<br> Dashboard Early Access Program 42<br> Magnetic Design System 42<br> New Landing Page 43<br> New Organization Alert Page &amp; Alert Hub Enhancement 44<br> Switching Overview 46<br> Global Overview 47<br> Network-wide Health Views 48<br> Network-wide and Uplink Health 48<br> Wireless Network Health 50<br> Automated Topology Views 53<br> Network-wide Layer 2 Topology 53<br> Network-wide Layer 3 Topology 55<br> Network-wide Multicast Topology 55<br> Summary 57<br> Additional Reading 57<br> <strong>Chapter 4</strong> Automating the Dashboard 59<br> Configuration Templates 59<br> How Do Templates Work? 59<br> Local Overrides 61<br> Template Caveats and Limitations 62<br> Template Best Practice Considerations 64<br> Using Webhooks, Syslog, and SNMP to Trigger Outside Automation 65<br> Webhooks 66<br> Syslog 67<br> SNMP 68<br> Dashboard API 70<br> What Is the Dashboard API and How Is It Used? 70<br> API Tips and Tricks 71<br> Dashboard API Examples 72<br> Automated API-based Organization Status 73<br> Automated MR Naming Based on Upstream Switch 75<br> MT Automation 78<br> Dashboard-Based Automation 78<br> Summary 82<br> Additional Reading 82<br> <strong>Part III The MX—The Cloud-Managed Swiss Army Knife<br> Chapter 5</strong> MX and MG Best Practices 83<br> MX Scaling 84<br> Deployment Modes 84<br> Routed Mode 84<br> Passthrough or VPN Concentrator Mode 85<br> Security 85<br> L3/L7 Firewall 86<br> HTTP Content Filtering (TALOS) 87<br> Cisco AMP 87<br> IDS/IPS 88<br> Cisco Umbrella 89<br> Dashboard Group Policy 90<br> Adaptive Policy (SGT) 91<br> VPN 92<br> Meraki Auto VPN 92<br> Client VPN 93<br> Cisco AnyConnect 94<br> Non-Meraki VPN 94<br> Routing 95<br> Route Priority 95<br> Static Routes 95<br> OSPF 96<br> BGP 97<br> Deploying Meraki Auto VPN 97<br> Configuring Auto VPN 98<br> Hub Versus Spoke 100<br> NAT Traversal 100<br> Hub and Spoke Recommendations 101<br> Sizing It Right 101<br> Hub Prioritization 102<br> Full Tunnel Versus Split Tunnel 102<br> Advanced Configurations 103<br> Monitoring Your Deployment 104<br> Meraki Insight 104<br> Web Application Health 105<br> WAN Health 108<br> VoIP Health 108<br> Insight Alerts 109<br> ThousandEyes Integration 110<br> Monitoring VPN 110<br> Reviewing Dashboard Alerts 112<br> Alert Hub 112<br> Organization Alerts 113<br> Threat Assessment on Meraki Dashboard 114<br> Security Center 115<br> Most Prevalent Threats 115<br> Most Affected Clients 116<br> Introduction to MG Cellular 117<br> 4G LTE Versus 5G 117<br> 5G NSA Versus 5G SA 118<br> Dashboard Monitoring for MG 118<br> MG Deployment Considerations 119<br> Cellular—Primary or Backup? 120<br> 5G Line of Sight 120<br> CGNAT and You 121<br> Prestaging for Deployment 121<br> Troubleshooting Meraki Devices 122<br> Local Status Page 122<br> Safe Mode 124<br> Support Data Bundle (SDB) Logging 124<br> Integrated DM Logging 124<br> Summary 124<br> Additional Reading 125<br> <strong>Chapter 6</strong> MX SD-WAN Best Practices 127<br> Introduction to Meraki SD-WAN 127<br> The Science of Transport Performance 128<br> The Anatomy of SD-WAN Policies 129<br> SD-WAN Uplink Policies 130<br> Custom SD-WAN Performance Classes 131<br> Traffic Analysis and Identification 133<br> Dynamic Path Selection Policies 134<br> Global Preference Policy 135<br> Basic Load Balancing Policy 136<br> Basic Policy-Based Routing 137<br> Performance-Based DPS 137<br> Policy Routing with Performance-Based DPS 138<br> SD-WAN over Cellular 138<br> SD-Internet 140<br> Integrating MPLS 141<br> MPLS on the LAN: Failover to Meraki Auto VPN 141<br> MPLS on the WAN: Meraki Auto VPN Overlay 142<br> Summary 144<br> Additional Reading 144<br> <strong>Part IV The Ultimate Cloud-Managed Access Layer<br> Chapter 7</strong> Meraki Switching Design and Recommendations 145<br> Introduction to Meraki Switches 145<br> Meraki Switching Design 145<br> Designing a Wired Enterprise Network 149<br> Planning Your Deployment 149<br> Selecting the Right Switch Product Mix 150<br> Planning Hybrid Campus LAN Architectures with Cloud Management 152<br> Designing the Access Layer 154<br> VLAN Deployment 154<br> Using Native VLAN 1 155<br> Planning QoS 156<br> Fine-Tuning STP in a Hybrid Environment 156<br> Tags to Optimize Deployment 157<br> MTU Recommendation 158<br> Connecting Trunk Ports 158<br> Connecting MR Access Points 158<br> Layer 3 Best Practices 159<br> OSPF Best Practices 159<br> Multicast Best Practices 160<br> Securing Layer 2 Operations 160<br> Infrastructure Security 160<br> DHCP Snooping 161<br> Storm Control 161<br> Dynamic ARP Inspection 162<br> SecurePort 163<br> Port Profiles 164<br> VLAN Profile 164<br> Network Security 165<br> Sticky MAC 165<br> Port Isolation 166<br> 802.1X Authentication 166<br> MAC Authentication Bypass 169<br> Change of Authorization with ISE Integration 169<br> End Point Security 172<br> Micro-Segmentation with MS (Adaptive Policy) 173<br> Identity Classification and Propagation 174<br> Security Policy Definition 174<br> Policy Enforcement 174<br> SGT Assignment Methods 175<br> Caveats in Setting Up Adaptive Policy 176<br> Operating and Optimizing Meraki Switches 176<br> Virtual Stacking 177<br> Firmware Upgrade Consideration on MS 178<br> Configuration Validations 179<br> Config-Safe Mechanism 179<br> Auto-Rollback on Bad Uplink 179<br> MS PoE Budget 180<br> MS Power Overview 181<br> Sustainability Using MS 182<br> Cloud-Monitored Catalyst 183<br> Troubleshooting Your Meraki Deployment 184<br> Dashboard Reporting 184<br> Dashboard Live Tools 187<br> Ping 187<br> Packet Capture 188<br> MTR 189<br> MAC Forwarding Table 190<br> Cable Testing 190<br> Cycle Port 191<br> Wake-on-LAN 191<br> Summary 192<br> Additional Reading 192<br> <strong>Chapter 8</strong> Meraki Wireless Best Practices and Design 195<br> Scoping and Scaling the Dashboard 196<br> Physical WLAN Design 197<br> Location-Aware Wireless Network 197<br> Wi-Fi 6E and Dual 5-GHz Mode 198<br> 6-GHz RF Propagation 199<br> AP Mounting Recommendations 199<br> AP Adjacency and Overlap 201<br> Configuring Meraki Wireless 201<br> RF Profile Best Practices and Recommendations 203<br> Band Selection: Per SSID Versus All SSIDs 204<br> Client Balancing 205<br> Minimum Bitrate 206<br> Channel Planning Best Practices 209<br> Frequency Bands 209<br> Channel Width 209<br> Channel Selection: DFS Channels 210<br> Meraki Auto RF 211<br> Other Design Considerations for Meraki Wireless 213<br> Why Distributed Networks? 213<br> Authentication and Encryption 214<br> VLAN Considerations 215<br> AP Tag Use Cases 216<br> Setting Up Enterprise-Grade Meraki Wireless 217<br> Defining Roaming 218<br> Defining Domains 219<br> Roaming Domains 219<br> Layer 2 Domains 220<br> Layer 3 Domains 221<br> Defining DHCP Scope 221<br> Security Features and Wireless Security Best Practices 222<br> Air Marshal 222<br> Traffic Segregation and Access Control 223<br> Operating the Network 225<br> Site-Level Wi-Fi Overview 225<br> Wireless Health and Overview 227<br> Anomaly Detection (Smart Thresholds) 228<br> Server RCA 231<br> Device Monitoring and Reporting 232<br> Roaming Analytics 232<br> Client Overview 232<br> Client Details 234<br> Client Timeline 234<br> Access Point Timeline 235<br> Summary 236<br> Additional Reading 236<br> <strong>Part V The Environment: The Next Frontier<br> Chapter 9</strong> MV Security and MT (IoT) Design 239<br> Redefining Surveillance: The Meraki Difference 239<br> Meraki Camera Architecture 239<br> MV Video Architecture 240<br> Ensuring Security 241<br> Built-in Analytics 241<br> Designing with Purpose: Building an Effective Surveillance System 242<br> Planning Camera Mounting Options and Accessories 243<br> Technology Considerations 244<br> Lens Types 244<br> Field of View 244<br> Resolution 245<br> Other Deployment Needs 245<br> Cisco Meraki MV52: An Example of MV Camera Offerings 245<br> Choosing the Right Storage 246<br> Planning for Power Requirements 246<br> Planning Camera Connectivity: Wired and Wireless 247<br> General Network Considerations 247<br> Considerations for Wired Connections 248<br> Considerations for Wireless Connections 248<br> Building an Optimized Camera System 249<br> Defining Camera Names and Tags 249<br> Defining Camera Administrators 249<br> Dashboard-Defined Camera-only Administrators 250<br> Role-Based Camera Permissions for SAML/SSO 251<br> Accessing Footage: Meraki MV Camera Views 251<br> Meraki Dashboard 252<br> Meraki Vision Portal 253<br> Meraki Display App 255<br> Meraki Mobile App 255<br> Configuring and Optimizing MV Cameras 257<br> Listing Camera Details 257<br> Configuring Camera Profiles 258<br> Assigning Camera Profiles 261<br> Manual Camera Configurations 261<br> Recording in Low Light 262<br> Camera Motion Alerts 263<br> Fine-Tuning Camera Alerts 264<br> Configuring Privacy Windows 267<br> Setting Up RTSP Integration 267<br> Configuring Video Walls 267<br> Operating Meraki MV Cameras 268<br> Navigating the Video Timeline 269<br> Built-in Analytics 269<br> Audio Detection 271<br> Motion Search and Motion Recap 271<br> Sharing Video 275<br> Exporting Video 276<br> Working with Cloud Archive 278<br> Accessing Video Event Logs 278<br> Meraki MV Sense 279<br> Troubleshooting Meraki MV Cameras 280<br> Enabling Firewall Ports for Meraki Cloud 280<br> Providing Camera Access to Meraki Support 281<br> Strengthening Security: Implementing Meraki IoT with MV 281<br> Building Smarter Spaces with Meraki MT Sensors 281<br> Designing Smart Spaces with Meraki MT Sensors 281<br> Ensuring Sustainability 282<br> Understanding MT Security Architecture 283<br> Protecting Business Assets Using MT Sensors 285<br> Environmental 285<br> Physical 286<br> Exploring MT Sensors 286<br> Physical Infrastructure Monitoring 287<br> MT12—Water/Leak Sensor 287<br> MT20—Door Sensor 288<br> MT40—Smart Power Controller 289<br> Environmental Monitoring 289<br> MT11—Cold Storage Sensor 289<br> Temperature, Humidity, and Air Quality Sensors 291<br> MT30—Smart Automation Button 293<br> Smart Button Automation 293<br> Deploying Meraki MT Sensors 294<br> Basic Configuration and Setup 294<br> Understanding Meraki IoT Gateways 295<br> Accounting for Distance to Sensors 295<br> Power Considerations 295<br> Configuration Considerations 296<br> Configuring and Monitoring Alerts 296<br> Setting Alert Types 296<br> Reviewing Generated Alerts 296<br> Sensor Sight 298<br> IoT Operational Best Practices 299<br> Troubleshooting Meraki MT Sensors 299<br> Monitoring Sensor Status 300<br> Viewing Sensor Event Logs 300<br> Monitoring BLE Signal Strength 300<br> Summary 301<br> Additional Reading 301<br> MV Camera References 301<br> MT Sensor References 302<br> <strong>Appendix A</strong> Cisco Meraki Licensing 303<br> Enterprise Licensing Versus Advanced Licensing 309<br> External Licensing for Integrations 304<br> Dashboard Licensing Models 304<br> Co-termination Licensing (Classic) 304<br> Per-Device Licensing 306<br> Meraki Subscription Licensing 307<br> Summary 307<br> Additional Reading 308<br> <br> <br> 9780138167578 TOC 2/27/2024<br> <br> </p>

Managementboek Top 100

Rubrieken

Populaire producten

    Personen

      Trefwoorden

        Cisco Meraki Fundamentals