Cisco Platinum Learning Business Enablement Logo

ECMS2

Engineering Cisco Meraki Solutions Part 2

Cisco Platinum Learning Business Enablement Logo

The course elevates your knowledge of Cisco® Meraki™ technology. In this advanced technical training course, you’ll learn how to plan for network deployments and integrations using the Cisco Meraki platform. Through practical hands-on instruction and experiences, you will learn how to operate Meraki networks and troubleshoot complex network incidents using the Meraki Dashboard and analytics. You will also learn how to design Meraki architectures for redundancy, high-density, and scalability by implementing comprehensive Meraki product features to meet design objectives. This course is the second of two courses that prepares you for Cisco Meraki certification.

Course Contents

  • Planning new Meraki architectures and expanding existing deployments
  • Designing for scalable management and high availability
  • Automating and scaling Meraki deployments
  • Routing design and practices on the Meraki platform
  • Implementing Quality of Service (QoS) and traffic shaping design
  • Architecting VPN and WAN topologies
  • Securing, expanding, and shaping the network
  • Switched network concepts and practices
  • Understand wireless configuration practices and concepts
  • Understand Endpoint management concepts and practices
  • Implement physical security concepts and practices
  • Gaining additional network insight through application monitoring
  • Preparing monitoring, logging, and alerting services
  • Setting up Dashboard reporting and auditing capabilities
  • Gaining visibility and resolving issues using Meraki features and built-in troubleshooting tools

E-Book Symbol You will receive the original course documentation from Cisco in English language. Optionally, we provide a printed version or a Cisco E-Book. In the Cisco Digital Learning Version, the content of the courseware is integrated into the learning interface instead.

Target Group

This course is ideal for those who regularly deploy or manage Meraki networks and want to deepen their technical expertise and understanding of the full Meraki product suite and features. This may include professionals with job titles or in roles such as:

  • Field deployment technicians
  • Network administrators
  • Pre-/Post-sales engineers
  • Service provider engineers
  • Systems engineers
  • IT professionals

Knowledge Prerequisites

Before enrolling in the ECMS2 course, it is highly recommended that you have already attended and completed the ECMS1 course before attending this training. You should also have general networking understanding, Meraki-specific proficiency, and knowledge in the following areas:

General network:

  • Be actively engaged in the design, deployment, scaling, and management of enterprise networks
  • Strong fundamental knowledge of IP addressing and subnetting schemas necessary to build local area networks
  • Strong fundamental knowledge of dynamic routing protocols (focus/emphasis on Open Shortest Path First [OSPF] and Border Gateway Protocol [BGP])
  • A foundational understanding of wired and wireless Quality of Service (QoS) mechanisms, packet queue operations, and practical implementations
  • Be experienced with the design and configuration of IPsec and associated Virtual Private Network (VPN) technologies
  • A foundational understanding of network security controls/protocols, network management best practices, and data security
  • A foundational understanding of best practice Radiofrequency (RF) design principles and practical implementations
  • A foundational knowledge of wireless security best practices centered around access control (802.1x) and spectrum security through Wireless Intrusion Detection Systems (WIDS) and Wireless Intrusion Prevention Systems (WIPS)
  • A foundational command of standard logging/monitoring protocols (focus/emphasis on Simple Network Management Protocol [SNMP], syslog, and webhooks) and related implementation components or tools
  • Be familiar with and have basic knowledge of Application Programming Interfaces (APIs) and related languages/formats (REST, JavaScript Object Notation [JSON])

Meraki knowledge

  • Fundamental understanding of Dashboard’s organizational structure, delineation of privileges, and overarching administrative processes
  • Be able to outline the key components of Meraki licensing (co-termination model and expiration grace period)
  • Have the knowledge and ability to deploy advanced security features on MX security appliances (intrusion detection/prevention, Advanced Malware Protection [AMP], Layer 3 & 7 firewall rules)
  • Fundamental understanding of Auto VPN and its purpose when utilized in a Software-Defined Wide Area Network (SD-WAN) deployment
  • Be able to describe the concepts behind a cloud-based WLAN solution and the features that can be delivered including Layer 7 traffic shaping and various guest access authentication methods
  • Fundamental understanding of device profile containerization and remote management capabilities as managed through the Systems Manager platform
  • Fundamental understanding of the edge architecture as implemented by Meraki MV security cameras and its implications on video retention through various configurable options

Complementary and Continuative Courses

ECMS1 – Engineering Cisco Meraki Solutions Part 1
PowerPackage Cisco ECMS – Engineering Cisco Meraki Solutions Part 1 & 2
 
Lesson 1: Planning new Meraki architectures and expanding existing deployments
Identify optimal Meraki networks architectures (organization/network sizing and limitations)
Plan for and complete license renewals through the Dashboard
 
Lesson 2: Designing for scalable management and high availability
Design Meraki organization administrative structure using tags (network and device tags)
Design highly available and redundant networks through the use of MX warm-spare and MS physical stacking technology
Design high density wireless networks (access point calculations and SSID configurations)
 
Lesson 3: Automation and scaling Meraki deployments
Utilize SAML for scalable role-based access control
Explain the capabilities and limitations of Templates and Network Cloning
Explain and identify ideal use cases for the Dashboard API
 
Lesson 4: Routing design and practices on the Meraki platform
Design proper static and dynamic routing topologies based on network needs
Explain dynamic routing capabilities on the MX appliance platform
Explain dynamic routing capabilities on the MS switch platform
Configure OSPF across the network as the dynamic routing protocol
Leverage BGP to expand networks and improve WAN performance
 
Lesson 5: QoS and traffic shaping design
Identify the configurable quality of service (QoS) mechanisms across the LAN and WLAN
Prepare for VoIP and video traffic using class of service (CoS), DSCP tags, and wireless traffic shaping
Configure policy and performance-based routing on the MX appliance platform
 
Lesson 6: Architecting VPN and WAN topologies
Design highly scalable VPN architectures (full mesh, hub-and-spoke)
Explain the underlying mechanisms of Meraki Auto VPN (VPN registry, UDP hold punching)
Explain the fundamentals of Meraki SD-WAN and its processing algorithm
Design Meraki SD-WAN architecture with performance-based routing
Extend networks and services into the public cloud (Azure and AWS)
 
Lesson 7: Securing the network with Advanced Security features
Explain the default traffic flow and layer 3/layer 7 rules processing order of the MX appliance platform
Identify the security intelligence engines and definition databases the MX appliance platform leverages for network protection services (Cisco AMP, Threat Grid, Snort)
Identify and enable content filtering at various levels for desired traffic refinement
 
Lesson 8: Switched network concepts and practices
Prepare access policies (802.1x) using Meraki authentication
Properly utilize templates, cloning, and switch profiles
Design guest access for LAN/WLAN utilizing Meraki best practices
 
Lesson 9: Wireless concepts and practices
Configure Dashboard maps and floor plans
Formulate RF profiles to prepare for challenging/variable RF deployments
Configure WLAN access control options based on design requirements
Enable the network for Bluetooth scanning and BLE beaconing
Utilize Air Marshal for intrusion detection and mitigation
 
Lesson 10: Endpoint management concepts and practices
Explain the different device enrollment and profile deployment methods
Design a native containerization strategy to separate work from personal data on endpoints
Identify and implement various application deployment methods
Assemble and implement security policies which cater to various restriction requirements
Construct a network deployment that leverages SM Sentry
 
Lesson 11: Physical security concepts and practices
Explain the MV platform’s edge architecture and underlying video delivery mechanism (local vs. remote video access)
Design a retention policy using various local or cloud-based storage strategies
Configure MV cameras for wireless deployments
Explain and demonstrate how to effectively utilize advanced analytics and MV camera APIs
 
Lesson 12: Gaining additional network insight through application monitoring
Explain how Meraki Insight is able to provide network assurance through the use of performance metrics and scores
Qualify and properly size Meraki Insight licenses
Configure, monitor, and track predefined and custom web application thresholds
 
Lesson 13: Preparing and setting up monitoring, logging, and alerting services
Explain Dashboard’s integrated historical log databases (event vs. change logs) to be leveraged for effective activity analysis
Identify the various monitoring tools within Dashboard (native analytics, Topology)
Demonstrate effective network-wide alerting best practices
Utilize the Dashboard API to monitor and maintain Meraki networks
 
Lesson 14: Setting up Dashboard reporting and auditing capabilities
Generate and interpret on-demand or recurring Summary Reports for key performance metrics
Track and manage firmware releases and prepare for staged upgrades
Recommend proper actions to meet PCI DSS (2.0 and 3.0) compliance
 
Lesson 15: Gaining visibility and resolving issues using Meraki features and built-in troubleshooting tools
Interpret event and change logs to troubleshoot client and network issues
Classify and compare security threats via the Security Center
Assess wireless intrusions, failures, and network access issues through Dashboard’s RF tools (Wireless Health, Air Marshal)
Assess root cause of application performance issues with Meraki Insight
Explain the detailed VPN tunnel information and the VPN Registry found on the VPN Status page
Utilize the Local Status Page as an alternate connectivity method to perform local troubleshooting
Zertifizierungen Symbol You are interested in a certification? The course at hand is part of the following certification(s):

Certification as Cisco Meraki Solutions Specialist

Classroom training

Do you prefer the classic training method? A course in one of our Training Centers, with a competent trainer and the direct exchange between all course participants? Then you should book one of our classroom training dates!

Hybrid training

Hybrid training means that online participants can additionally attend a classroom course. The dynamics of a real seminar are maintained, and the online participants are able to benefit from that. Online participants of a hybrid course use a collaboration platform, such as WebEx Training Center or Saba Meeting. To do this, a PC with browser and Internet access is required, as well as a headset and ideally a Web cam. In the seminar room, we use specially developed and customized audio- and video-technologies. This makes sure that the communication between all persons involved works in a convenient and fault-free way.

Online training

You wish to attend a course in online mode? We offer you online course dates for this course topic. To attend these seminars, you need to have a PC with Internet access (minimum data rate 1Mbps), a headset when working via VoIP and optionally a camera. For further information and technical recommendations, please refer to.

Cisco Digital Learning

This course is available in the Cisco Digital Learning Library. These recently developed, multi-modal training events include HD videos moderated by lecturers with stored searchable text and subtitles, as well as a exercises, labs, and explanatory text and graphics. We provide this offer to you via our myExperTeach learning portal. Effective of the activation of the account, access to the courses will be granted for a duration of 6 months. In the case of packet solutions (Cisco Digital Learning Subscriptions), this time period will amount to 12 months.

Tailor-made courses

You need a special course for your team? In addition to our standard offer, we will also support you in creating your customized courses, which precisely meet your individual demands. We will be glad to consult you and create an individual offer for you.
Request for customized courses
PDF SymbolYou can find the complete description of this course with dates and prices ready for download at as PDF.

The course elevates your knowledge of Cisco® Meraki™ technology. In this advanced technical training course, you’ll learn how to plan for network deployments and integrations using the Cisco Meraki platform. Through practical hands-on instruction and experiences, you will learn how to operate Meraki networks and troubleshoot complex network incidents using the Meraki Dashboard and analytics. You will also learn how to design Meraki architectures for redundancy, high-density, and scalability by implementing comprehensive Meraki product features to meet design objectives. This course is the second of two courses that prepares you for Cisco Meraki certification.

Course Contents

  • Planning new Meraki architectures and expanding existing deployments
  • Designing for scalable management and high availability
  • Automating and scaling Meraki deployments
  • Routing design and practices on the Meraki platform
  • Implementing Quality of Service (QoS) and traffic shaping design
  • Architecting VPN and WAN topologies
  • Securing, expanding, and shaping the network
  • Switched network concepts and practices
  • Understand wireless configuration practices and concepts
  • Understand Endpoint management concepts and practices
  • Implement physical security concepts and practices
  • Gaining additional network insight through application monitoring
  • Preparing monitoring, logging, and alerting services
  • Setting up Dashboard reporting and auditing capabilities
  • Gaining visibility and resolving issues using Meraki features and built-in troubleshooting tools

E-Book Symbol You will receive the original course documentation from Cisco in English language. Optionally, we provide a printed version or a Cisco E-Book. In the Cisco Digital Learning Version, the content of the courseware is integrated into the learning interface instead.

Target Group

This course is ideal for those who regularly deploy or manage Meraki networks and want to deepen their technical expertise and understanding of the full Meraki product suite and features. This may include professionals with job titles or in roles such as:

  • Field deployment technicians
  • Network administrators
  • Pre-/Post-sales engineers
  • Service provider engineers
  • Systems engineers
  • IT professionals

Knowledge Prerequisites

Before enrolling in the ECMS2 course, it is highly recommended that you have already attended and completed the ECMS1 course before attending this training. You should also have general networking understanding, Meraki-specific proficiency, and knowledge in the following areas:

General network:

  • Be actively engaged in the design, deployment, scaling, and management of enterprise networks
  • Strong fundamental knowledge of IP addressing and subnetting schemas necessary to build local area networks
  • Strong fundamental knowledge of dynamic routing protocols (focus/emphasis on Open Shortest Path First [OSPF] and Border Gateway Protocol [BGP])
  • A foundational understanding of wired and wireless Quality of Service (QoS) mechanisms, packet queue operations, and practical implementations
  • Be experienced with the design and configuration of IPsec and associated Virtual Private Network (VPN) technologies
  • A foundational understanding of network security controls/protocols, network management best practices, and data security
  • A foundational understanding of best practice Radiofrequency (RF) design principles and practical implementations
  • A foundational knowledge of wireless security best practices centered around access control (802.1x) and spectrum security through Wireless Intrusion Detection Systems (WIDS) and Wireless Intrusion Prevention Systems (WIPS)
  • A foundational command of standard logging/monitoring protocols (focus/emphasis on Simple Network Management Protocol [SNMP], syslog, and webhooks) and related implementation components or tools
  • Be familiar with and have basic knowledge of Application Programming Interfaces (APIs) and related languages/formats (REST, JavaScript Object Notation [JSON])

Meraki knowledge

  • Fundamental understanding of Dashboard’s organizational structure, delineation of privileges, and overarching administrative processes
  • Be able to outline the key components of Meraki licensing (co-termination model and expiration grace period)
  • Have the knowledge and ability to deploy advanced security features on MX security appliances (intrusion detection/prevention, Advanced Malware Protection [AMP], Layer 3 & 7 firewall rules)
  • Fundamental understanding of Auto VPN and its purpose when utilized in a Software-Defined Wide Area Network (SD-WAN) deployment
  • Be able to describe the concepts behind a cloud-based WLAN solution and the features that can be delivered including Layer 7 traffic shaping and various guest access authentication methods
  • Fundamental understanding of device profile containerization and remote management capabilities as managed through the Systems Manager platform
  • Fundamental understanding of the edge architecture as implemented by Meraki MV security cameras and its implications on video retention through various configurable options

Complementary and Continuative Courses

ECMS1 – Engineering Cisco Meraki Solutions Part 1
PowerPackage Cisco ECMS – Engineering Cisco Meraki Solutions Part 1 & 2

 
Lesson 1: Planning new Meraki architectures and expanding existing deployments
Identify optimal Meraki networks architectures (organization/network sizing and limitations)
Plan for and complete license renewals through the Dashboard
 
Lesson 2: Designing for scalable management and high availability
Design Meraki organization administrative structure using tags (network and device tags)
Design highly available and redundant networks through the use of MX warm-spare and MS physical stacking technology
Design high density wireless networks (access point calculations and SSID configurations)
 
Lesson 3: Automation and scaling Meraki deployments
Utilize SAML for scalable role-based access control
Explain the capabilities and limitations of Templates and Network Cloning
Explain and identify ideal use cases for the Dashboard API
 
Lesson 4: Routing design and practices on the Meraki platform
Design proper static and dynamic routing topologies based on network needs
Explain dynamic routing capabilities on the MX appliance platform
Explain dynamic routing capabilities on the MS switch platform
Configure OSPF across the network as the dynamic routing protocol
Leverage BGP to expand networks and improve WAN performance
 
Lesson 5: QoS and traffic shaping design
Identify the configurable quality of service (QoS) mechanisms across the LAN and WLAN
Prepare for VoIP and video traffic using class of service (CoS), DSCP tags, and wireless traffic shaping
Configure policy and performance-based routing on the MX appliance platform
 
Lesson 6: Architecting VPN and WAN topologies
Design highly scalable VPN architectures (full mesh, hub-and-spoke)
Explain the underlying mechanisms of Meraki Auto VPN (VPN registry, UDP hold punching)
Explain the fundamentals of Meraki SD-WAN and its processing algorithm
Design Meraki SD-WAN architecture with performance-based routing
Extend networks and services into the public cloud (Azure and AWS)
 
Lesson 7: Securing the network with Advanced Security features
Explain the default traffic flow and layer 3/layer 7 rules processing order of the MX appliance platform
Identify the security intelligence engines and definition databases the MX appliance platform leverages for network protection services (Cisco AMP, Threat Grid, Snort)
Identify and enable content filtering at various levels for desired traffic refinement
 
Lesson 8: Switched network concepts and practices
Prepare access policies (802.1x) using Meraki authentication
Properly utilize templates, cloning, and switch profiles
Design guest access for LAN/WLAN utilizing Meraki best practices
 
Lesson 9: Wireless concepts and practices
Configure Dashboard maps and floor plans
Formulate RF profiles to prepare for challenging/variable RF deployments
Configure WLAN access control options based on design requirements
Enable the network for Bluetooth scanning and BLE beaconing
Utilize Air Marshal for intrusion detection and mitigation
 
Lesson 10: Endpoint management concepts and practices
Explain the different device enrollment and profile deployment methods
Design a native containerization strategy to separate work from personal data on endpoints
Identify and implement various application deployment methods
Assemble and implement security policies which cater to various restriction requirements
Construct a network deployment that leverages SM Sentry
 
Lesson 11: Physical security concepts and practices
Explain the MV platform’s edge architecture and underlying video delivery mechanism (local vs. remote video access)
Design a retention policy using various local or cloud-based storage strategies
Configure MV cameras for wireless deployments
Explain and demonstrate how to effectively utilize advanced analytics and MV camera APIs
 
Lesson 12: Gaining additional network insight through application monitoring
Explain how Meraki Insight is able to provide network assurance through the use of performance metrics and scores
Qualify and properly size Meraki Insight licenses
Configure, monitor, and track predefined and custom web application thresholds
 
Lesson 13: Preparing and setting up monitoring, logging, and alerting services
Explain Dashboard’s integrated historical log databases (event vs. change logs) to be leveraged for effective activity analysis
Identify the various monitoring tools within Dashboard (native analytics, Topology)
Demonstrate effective network-wide alerting best practices
Utilize the Dashboard API to monitor and maintain Meraki networks
 
Lesson 14: Setting up Dashboard reporting and auditing capabilities
Generate and interpret on-demand or recurring Summary Reports for key performance metrics
Track and manage firmware releases and prepare for staged upgrades
Recommend proper actions to meet PCI DSS (2.0 and 3.0) compliance
 
Lesson 15: Gaining visibility and resolving issues using Meraki features and built-in troubleshooting tools
Interpret event and change logs to troubleshoot client and network issues
Classify and compare security threats via the Security Center
Assess wireless intrusions, failures, and network access issues through Dashboard’s RF tools (Wireless Health, Air Marshal)
Assess root cause of application performance issues with Meraki Insight
Explain the detailed VPN tunnel information and the VPN Registry found on the VPN Status page
Utilize the Local Status Page as an alternate connectivity method to perform local troubleshooting

Zertifizierungen Symbol You are interested in a certification? The course at hand is part of the following certification(s):

Certification as Cisco Meraki Solutions Specialist

Classroom training

Do you prefer the classic training method? A course in one of our Training Centers, with a competent trainer and the direct exchange between all course participants? Then you should book one of our classroom training dates!

Hybrid training

Hybrid training means that online participants can additionally attend a classroom course. The dynamics of a real seminar are maintained, and the online participants are able to benefit from that. Online participants of a hybrid course use a collaboration platform, such as WebEx Training Center or Saba Meeting. To do this, a PC with browser and Internet access is required, as well as a headset and ideally a Web cam. In the seminar room, we use specially developed and customized audio- and video-technologies. This makes sure that the communication between all persons involved works in a convenient and fault-free way.

Online training

You wish to attend a course in online mode? We offer you online course dates for this course topic. To attend these seminars, you need to have a PC with Internet access (minimum data rate 1Mbps), a headset when working via VoIP and optionally a camera. For further information and technical recommendations, please refer to.

Cisco Digital Learning

This course is available in the Cisco Digital Learning Library. These recently developed, multi-modal training events include HD videos moderated by lecturers with stored searchable text and subtitles, as well as a exercises, labs, and explanatory text and graphics. We provide this offer to you via our myExperTeach learning portal. Effective of the activation of the account, access to the courses will be granted for a duration of 6 months. In the case of packet solutions (Cisco Digital Learning Subscriptions), this time period will amount to 12 months.

Tailor-made courses

You need a special course for your team? In addition to our standard offer, we will also support you in creating your customized courses, which precisely meet your individual demands. We will be glad to consult you and create an individual offer for you.
Request for customized courses

PDF SymbolYou can find the complete description of this course with dates and prices ready for download at as PDF.