The goal of this online training course is to provide students with the skills needed set up and administer Meraki Firewalls. Students will learn how to configure Meraki Firewalls, set up VPNs, and troubleshoot.
Overview
COURSE INSTRUCTOR
COURSE DIFFICULTY
COURSE DURATION
4h 30m
Skills Learned
After completing this online training course, students will be able to:
Traffic and connectivity management
Set up firewall rules
Use content filtering
Set up threat protection
Troubleshoot connectivity and VPNs
Any student interested in learning more about Cisco Meraki Firewalls.
General networking experience/knowledge
01. Introduction to Cisco Meraki
- Understanding Meraki Architecture
- Licensing
- Setting up the Dashboard
- Security Appliance Basics and Terminology
02. Configuring Meraki Firewall
- Traffic and Connectivity Management
- NAT and Port Forwarding
- Traffic Shaping and SD-WAN
03. Configuring Meraki Firewall Security Controls
- Firewall Rules [add Geo-IP blocking and spoofing protection]
- Content Filtering
- Threat Protection
- Network Access Control (NAC) and Captive Portals
- Group Policy
04. Virtual Private Networks
- Remote Access VPN
- Site-to-Site VPN
05. Troubleshooting
- Troubleshooting Essentials
- Troubleshooting Connectivity
- Troubleshooting VPNs
SKILLS LEARNED
Skills Learned
After completing this online training course, students will be able to:
Traffic and connectivity management
Set up firewall rules
Use content filtering
Set up threat protection
Troubleshoot connectivity and VPNs
WHO SHOULD ATTEND
Any student interested in learning more about Cisco Meraki Firewalls.
PREREQUISITES
General networking experience/knowledge
COURSE OUTLINE
01. Introduction to Cisco Meraki
- Understanding Meraki Architecture
- Licensing
- Setting up the Dashboard
- Security Appliance Basics and Terminology
02. Configuring Meraki Firewall
- Traffic and Connectivity Management
- NAT and Port Forwarding
- Traffic Shaping and SD-WAN
03. Configuring Meraki Firewall Security Controls
- Firewall Rules [add Geo-IP blocking and spoofing protection]
- Content Filtering
- Threat Protection
- Network Access Control (NAC) and Captive Portals
- Group Policy
04. Virtual Private Networks
- Remote Access VPN
- Site-to-Site VPN
05. Troubleshooting
- Troubleshooting Essentials
- Troubleshooting Connectivity
- Troubleshooting VPNs