Mini-Lab - Student Guide
Mini-Lab - Student Guide
Mini-Lab - Student Guide
1
Introduction
You have recently been hired to manage the IT systems for a local doctor’s office group in San Francisco.
Nightingale Medical Associates has managed to survive with a consumer ISP-provided gateway for many years,
but recent Electronic Medical Records (EMR) mandates, HIPAA compliance, more patients, new offices
opening up, and the demand for guest Internet access has them excited about an enterprise-class solution.
As their new IT admin, you suggest that Nightingale Medical Associates deploy Cisco Meraki as their solution.
This will not only meet their needs now, but can scale with them as they grow their main location and open
new offices, as well as provide them with a simple, intuitive management interface and rich application
visibility, reporting and analytics.
In order to get started, you’ve decided to equip them with a stack of Meraki gear, and today you’ll be
configuring that gear for one of the offices.
2. Navigate to http://dashboard.meraki.com and login with the username and password provided by the
instructor. It is recommended to use Google Chrome. IMPORTANT: Be sure you are selecting the
correct Organization for your Minilab session after logging into the portal. Your instructor will provide
the correct session number if needed. If necessary, be sure to choose your correct lab station number
(from your Topology Sheet) from the network dropdown box in the upper left of Dashboard.
3. Feel free to use the Cisco Meraki knowledge base articles and documentation to assist with the lab.
They can be found at: http://documentation.meraki.com
You can also use the Dashboard search box for assistance, which is very helpful.
4. Time for “exploring” Dashboard and for finding/using help has been worked into the suggested times
for each lab section.
Reference materials:
Meraki Main Page – meraki.cisco.com
Cloud Architecture Overview – meraki.com/trust
Datasheets/Whitepapers Library – meraki.cisco.com/library
Meraki Product Documentation – documentation.meraki.com
Meraki Webinars & Training – meraki.cisco.com/webinars
Meraki YouTube Channel – www.youtube.com/user/milesmeraki/videos
2
Network Topology Overview
“x” is your lab station number
Security Appliance
Configuration:
(Step 1.1.1)
VLAN 10 (Corp)
Subnet: 10.0.10+X.0/24
Interface: 10.0.10+X.1
VLAN 30 (Voice)
Subnet: 10.0.30+X.0/24
Interface: 10.0.30+X.1
Switch Configuration:
(Lab 2, Step 2.1.1)
VLAN 10 (Corp)
Subnet: 10.0.10+X.0/24
Interface: 10.0.10+X.201
Default gateway: 10.0.10+X.1
3
Exercise 1 | Small / Medium Site (90-120 minutes)
To get started, let’s set up your first three pieces of Meraki gear. Meraki Support has already set up a
Dashboard account and added the MX, MS and MR equipment to a network. In this exercise, you will create
an initial configuration for a doctor’s office, create a baseline security policy, configure a guest wireless
network, and interconnect all of the remote branches over a secure VPN.
**Make sure you are in the CORRECT POD and the CORRECT NETWORK that corresponds to your Lab
Number**
1. Verify that your MX is operational noting that it’s green in Dashboard and the WAN uplinks are healthy.
2. Edit the name of your MX such as “Lab <n> MX” and assign a city/address (refer to your topology
sheet), and use the live tools to ping the appliance, maybe run a traceroute to google.com.
Check the status of your WAN1 and WAN2 uplinks using the “Uplinks” tab.
3. VLAN configuration
a. On the “Addressing and VLANs” page, first Enable VLANs and then create VLANs 10 (Corp), 30
(Voice) and 100 (Guest) as per your topology diagram.
See additional notes b/c/d below.
b. Do not remove/modify VLAN 1 (default/untagged VLAN) which is there by default.
c. Use the “Add a Local VLAN” link to configure VLANs 10, 30 and 100.
d. All non-tagged traffic will be part of VLAN1 (default vlan).
4. On VLAN 10 (Corp) reserve IP addresses .150 through .250 under DHCP Settings.
NOTE: This addressing section is required before moving onto lab 2-4.
4
2. Enable Advanced Malware Protection (AMP) and Intrusion detection with Balanced Ruleset.
3. Enable network alerts if the MX goes offline for more than 10 minutes or a DCHP pool is exhausted.
4. Create a group-policy called “Guest” to ensure that guest users will conform to below restrictions.
a. Guests will be restricted to 2M per client.
b. Guest group policies will only be turned on during working hours 8am–5pm Mon-Fri.
c. No traffic can communicate to/from North Korea or Syria.
d. Add another L7 firewall rule to block all gaming applications.
e. Append the default content filter to add all sports web sites.
f. Now that all sports sites are blocked, allow [Hint: Append to Whitelist] sports.yahoo.com.
g. Apply the “Guest” group policy to the “Guest” VLAN. (Hint: Addressing & VLANs page)
1.1.3 Interconnect All Sites via Full-Mesh Auto VPN (20 minutes)
1. Configure a full-mesh VPN between all sites, and enable VPN for the Corp and Voice VLANs, but not the
default or guest VLANs.
[Hint: Navigate to Site-to-site VPN and configure your site as a hub (and do not configure an exit hub)]
2. Verify connectivity by pinging the data center core switch (10.0.250.1) from the Live tools on the
Appliance status screen. What is your latency to the data center?
3. Navigate to VPN Status to verify connectivity to other branches. Note: If you don’t see site-to-site
peers listed, try clicking the “View old version” link on the right-hand side and you can then verify
connectivity to other branches.
2. Edit the name of your switch and apply the tag(s) and city/location from your topology handout.
3. Customize your flex table view under Switch > Switches to include local IP, Tags and S/N.
5
5. Create an energy-saving port schedule to turn off ports (power down phones) during off hours.
a. First confirm (or set) the appropriate time zone for your network. (Network-Wide à General)
b. Apply the port schedule to ports 4 – 7 simultaneously (try searching for “voip”).
2. Edit the name of your access point and apply the tag(s) and address from your handout. Please note
that the access point(s) will be shown as offline, they are not powered on in the lab environment, but
we can still completely configure our wireless network of course!
3. Create two new SSIDs —one for corporate, and one for isolated secure guest access.
a. Rename the first/default SSID to Corp.
b. Create the 2nd SSID and name it Guest.
c. Make sure both SSIDs are enabled.
6
f. Limit all guests to 2Mbps bandwidth, but allow them to temporarily exceed that for app
downloads for example.
g. Customize your splash page with a custom logo and/or message and preview it.
7. Let’s implement some best & common practices for the RF settings.
a. For the Corporate SSID, make it dual-band operation, but use band steering to get more users
onto the cleaner 5GHz radio.
b. For all SSIDs, disallow very old legacy 802.11b devices.
c. Enable automatic power reduction so the AP isn’t always running at 100% Tx power.
d. Enable DFS channels if they are not enabled already.
e. Use a default 5GHz channel width of 40MHz.
f. Force the 2.4 and 5GHz radios for your AP to operate on channels 11 and 48
8. Extra Credit – Systems Manager: Create a 3rd SSID called BYOD to be used for mobile device
onboarding, force iOS and Android clients to have Meraki Systems Manager installed to join the SSID
and get network access, Windows or Mac laptops will just see a splash page – Mobile clients will
download System Manager upon joining the BYOD SSID, the firewall blocks everything else.
[Hint: This is under the access control]
7
Exercise 2 | Large Site / Campus
Since deploying their enterprise network, Nightingale Medical Associates has continued to grow. They’ve just
acquired another medical group that has a legacy private network interconnecting all of their sites. In order to
increase collaboration during the acquisition, Nightingale Medical Associates has rolled out the private
network to all sites. Also, to protect their new Electronic Medical Records (EMR) system, Nightingale Medical
Associates wishes to increase the security of their wired and wireless network.
2. Go to the MX Appliance and create a static route to the “Legacy” subnet using the IP address on your
L3 switch SVI in the “Corp” VLAN as next hop. Reference the topology sheet for supplemental
information. [Hint: The Legacy network now lives on the MS only so we need to tell the MX where this network is now.
The answers can be found in 1.a and 1.b above]
a. “In VPN” option should be “Yes”
5. Start a ping to the data center switch (192.168.0.254) from the Legacy Source interface (10.0.150+x.1).
a. Ping 10.0.250.1 again with port 13 disabled. Wait about 30 seconds after disabling the port.
b. What path is the switch now taking to get to 10.0.250.1?
c. Does the switch still have OSPF neighbors?
d. See the diagram at the end of this document to better understand the logical data flow /
topology.
8
6. Re-enable port 13.
3. Navigate to the Air Marshal screen and configure the Access Points to automatically contain any rogue
APs seen on the LAN.
4. Configure the access point to automatically contain any SSIDs [Hint: Keyword Containment] being broadcast
with “Nightingale” in the name of the SSID. This should automatically contain any other local SSIDs
with “Nightingale” in the SSID name.
9
Exercise 3 | Distributed Enterprise (60-120 minutes)
Nightingale Medical Associates has been using their Meraki network for an entire year now. Their Cloud
Managed Network has helped them rollout electronic medical records, ensure HIPAA compliance, and has
accommodated the demand for guest Internet. To keep up with the growing number of doctor’s offices joining
the group and increase the level of performance and reliability required by a growing distributed network,
they will need to add centralized Data Center services, increase redundancy, and ensure that their business-
critical applications are always preferring the best performing WAN path.
2. Verify that you can still ping each other’s lab MX LAN IP’s just as you did earlier with the full mesh
configuration.
Hint: Use MX ping tool as well as check Route Table on your MX.
a. 10.0.250.0/24 (Shared)
b. 10.0.251.0/24 (DC1)
c. 10.0.252.0/24 (DC2)
NOTE: Let the instructor know that you have reached this point and ask them to initiate a failure at Data
Center 2 by disabling its uplink for your lab pod.
10
3.1.2 Software Defined WAN (SD-WAN) (30-60 minutes)
1. Navigate to Security appliance > Configure > Traffic shaping.
4. Configure a flow preference for “Guest” internet traffic to prefer WAN2. Hint: any traffic with a source
IP of 10.0.100+x.0/24 should prefer WAN2.
5. Create a customer performance class named “Acceptable Delay” with a setting of 200ms of latency.
7. Verify path selection by navigating to the Uplink Decision section of the VPN status page.
a. Which uplink is used for traffic destined for 8.8.8.8?
i. WAN2 is cycling between 50ms and 400ms of latency every 20 seconds resulting is the
uplink cycling between WAN1 and WAN2.
b. Click one of the links in the uplink decision column.
i. What is the average latency and MOS score between your branch and Data Center 2 for
both of your branch’s WAN links?
8. (Optional) Feel free to adjust the “Acceptable Delay” latency setting and see how the uplink cycling
between WAN1 and WAN2 changes.
11
Logical Data Flow / Topology
12
Exercise 4 | Meraki Communications (30-60 minutes)
Nightingale Medical Associates has been using legacy Centrex lines. They would like to reduce their telephony
costs while improving the end-user experience and are therefore interested in migrating to VoIP. They’ve had
such a great experience with the Meraki dashboard and are curious what else they can manage in the cloud.
Luckily Meraki also offers the MC74 cloud managed VoIP phone which is both easy to manage and easy to use.
13
4.1.3 Configuring and testing a voice conference room (10-20 minutes)
1. Navigate to Phones -> Conference Rooms.
2. Create a new conference room and give it a name.
3. Assign a public phone number based on the table below (ask your instructor which pod you are using if
you don’t already know).
4. Set a pin.
5. Test your newly created conference room by dialing into the number with your cell phone.
6. Use a 2nd phone or have the lab attendee next to you call in as well to test the conference room.
If your lab instructor brought a phone with them, make sure to check it out.
You can use it to call into your conference room and make sure it is working.
Congratulations!
Thanks to you, Nightingale Medical Associates has been able to adopt an enterprise solution that has
scaled with the group’s growth. You’ve expanded their small original location to a larger enterprise
deployment, supporting a multi-site architecture that meets all of their security and reliability
requirements. You have saved them a lot of time and money given the single-pane-of-glass
management across their full stack of infrastructure, zero-touch deployment model, simple
troubleshooting and reporting, and great visibility and analytics to improve business practices.
14