Lab Guide - Secure Meraki Network
Lab Guide - Secure Meraki Network
Empowered with Secure Access Service Edge (SASE) converge networking and
security to deliver seamless, secure access—anywhere people work.
Powered by Umbrella
The world has changed in terms of how and where work is being conducted
Join us in this lab where we will empower your team to be securely connected at home, in the office,
anywhere.
P a ge |1
MERAKI, Umbrella, ISE and DUO
Contents
1 LAB - Login details ............................................................................................................................................................. 3
P a ge |2
MERAKI, Umbrella, ISE and DUO
USERNAME Your email address Your email address Your email address
CLABs-2024
PASSWORD Your password CLABs-2024
Or your password*
NOTE: UMBRELLA
* Default Umbrella Password:
Note: if you already had an Umbrella account →
NOTE: MERAKI
After choosing a password; make sure you clicked YES. If not, go back to the email and click
again on the URL.
P a ge |3
MERAKI, Umbrella, ISE and DUO
This dashboard is built for Managed Services providers and can support
most of the core services needed by MSPs.
For this training we will use the dashboard to configure our network
components.
IMPORTANT: Make sure you clicked on YES. If not, go back to the email and click again on the URL.
P a ge |4
MERAKI, Umbrella, ISE and DUO
You have the rights in multiple networks in this lab but only 1 belongs to you.
Click on the dropdown arrow on the left to locate your network.
Locate the topology overview in the ‘Network-wide’ settings. Make sure all 3 devices
are online.
P a ge |5
MERAKI, Umbrella, ISE and DUO
Where is the fun on building a business network without having a wireless client?
Use remote desktop to take over a wireless client that sits in your new network.
P a ge |6
MERAKI, Umbrella, ISE and DUO
Go to https://dashboard.umbrella.com
Log in with
o Username:
o Password:
▪ Default Umbrella Password:
▪ →
P a ge |7
MERAKI, Umbrella, ISE and DUO
A business armed with information, technology, and the ability to easily and intelligently
control powered network devices can see cost savings of up to $270,000 over a 5-year
deployment — including 750 tons of CO2 emissions reductions (The California Public Utilities
Commission).
This return on investment often spans far beyond recovering original technology costs to
include benefits such as improved building security and fostering an employee culture for
environmental responsibility.
PoE devices such as IP phones are becoming more prominent as businesses adopt new
technologies. This creates additional opportunities for cost savings through the reduction of
off-hour energy consumption.
Meraki switches add several intelligent features to your network for monitoring power draw. By
leveraging standard protocols, Meraki’s cloud readily displays real-time PoE information on a
per port, per device, and global switch basis. This data can quickly be analyzed to determine
how much power draw your PoE devices are consuming in a given 24-hour period.
Additionally, Meraki switches perform intelligent PoE budget allocation by analyzing discovery
protocols for device-advertised power requirements. This means your PoE switch budget is
used more efficiently across all of your switch interfaces.
A variety of real-time and historical power consumption reporting is also directly available in
the Meraki Dashboard. Ethernet power reporting is available via the network summary report
for any switching network. This provides deep visibility into the power consumed (in kW) by
the network over a specified time period and also collectively by the entire network. You can
even view switches by power consumption to find switches with heavy consumption.
P a ge |8
MERAKI, Umbrella, ISE and DUO
The Meraki dashboard supplies detailed, real-time statistics about your PoE devices
and overall switch power budget usage. Additionally, using discovery protocols, the
switch will snoop for — and only allocate — the advertised power amount per device.
This adds efficiency to per-port power budget allocation and also provides IT
administrators with detailed power consumption information.
Meraki switches will budget based on the PoE device classification, the
budget is allowed to exceed available power as it's used to gauge overall
power that might be consumed on the switch.
In this case the lowest port numbers take precedence and power will be
pulled from the highest ports thus denying them power.
P a ge |9
MERAKI, Umbrella, ISE and DUO
Meraki’s Port Scheduling feature allows you to define one or more weekly reoccurring
schedules that can be applied to selected switch ports within your network.
Ports 20 to 24 will be used to power IP phones and access points in the lunch area. Create a
schedule to schut down power consumption outside this time window.
Create
Apply
Switch > Switch ports | Select port 20 → 24 and click ‘Edit’ (‘Edit’ button sits on the top)
• Port Schedule: Lunch Area
P a g e | 10
MERAKI, Umbrella, ISE and DUO
Meraki network hardware can be automated using APIs. This is a very big deal, because from
now on you can integrate your network logic into your existing infrastructure.
Think about the following: The last person leaving the office initiates a shutdown of the wireless
network and some of the IP phones on the desks. From the moment the first employee enters
the building, the network boots-up and is ready to be used.
Think about the astronomical savings you can make by implementing this ability.
To implement this automation, we will look at a simple API call that is made from the badge
system of a self-created script to the Meraki Dashboard. The dashboard will shut down PoE
consumption on the access points and select IP phones.
All solutions from Cisco can talk to your own existing open solutions. Let’s make use of that.
The last person badging out will lock down the building, activate the burglar alert, and
deactivate unused IT equipment.
P a g e | 11
MERAKI, Umbrella, ISE and DUO
Just investigate this script. APIs and Python coding is not part of this lab. This is FYI
A possible script
We can leverage the Meraki Dashboard APIs to shut down PoE to unused equipment.
The following script is an example written in Python that does just that.
# Network variable
poe_state = 'false'
port_number = '5'
switch = 'Q2MW-UEFF-8MTX'
The result
As a result, the script will cut power on the selected ports, resulting in off-work energy
savings.
In the morning, the same script can be used to re-activate the wireless network and IP
phones. In the script, change the poe_state variable to true.
P a g e | 12
MERAKI, Umbrella, ISE and DUO
In our case, the Employees are divided in groups, depending on their jobs within the company.
A different set of rules (policy) must be applied on Sales, Marketing, and Guests.
The first step is to grant access and apply the correct network policy. This is communicated
from the RADIUS server to our Meraki dashboard.
The ultimate step is to leverage all the available power from ISE (Identity Services Engine) as a
RADIUS server, where we can control the state of the end point and software installed, before
granting access. This to prevent infected hardware into the heart of our network.
P a g e | 13
MERAKI, Umbrella, ISE and DUO
If you are not here already, navigate to Wireless > Access control | SSID: company-xx
• Network access: Enterprice with my RADIUS server
• Splash page: Cisco Identity Services Engine (ISE) Authentication
• RADIUS servers:
o Host: 10.20.0.111
o Port: 1812
o Secret: Comstor!05
P a g e | 14
MERAKI, Umbrella, ISE and DUO
If, in the next exercises you don’t get an IP address, reboot your test PC.
P a g e | 15
MERAKI, Umbrella, ISE and DUO
P a g e | 16
MERAKI, Umbrella, ISE and DUO
P a g e | 17
MERAKI, Umbrella, ISE and DUO
Add the 802.1X policy column in the result using the edit icon on the right
P a g e | 18
MERAKI, Umbrella, ISE and DUO
In this exercise we detect the role of the user. But with ISE, we can go beyond.
Leveraging the ISEs full potential we can also check on the user’s:
• Type of workstation – Is this a company laptop or an own device?
• IoT – ISE can also detect IoT device types.
• Location of the user – Is the user located in the lunch area or office area, or connected
over VPN?
• Time of connection – Did the user connect during working hours? Think of schools
enforcing a non-social network policy during lectures.
• External storage – Did the user plug in an untrusted USB device?
• Antivirus version – Is the Antivirus software up to date?
• OS version – Is the operating system up to date?
• AMP vulnerability score – Do a sweep of the device to reflect the vulnerability of
installed apps.
Any of those combinations can result in a dedicated access lists or VLAN tag, providing the
proper access rights.
Feature MR MX MS Details
IEEE-802.1X Authentication Supported Supported Supported
MAC Authentication Bypass Supported Supported Supported
Enforcement Supported Not Supported Supported1 Preconfigured GP
Local Web Authentication Supported Supported Not Supported Local captive portals
Device Profiling Supported Limited Support Supported RADIUS (MS and MR).
Device Posturing Supported Limited Support Supported mid level MS, all MR.
Guest (Hotspot, Self-register, Sponsored) Supported Limited Support Supported Guest VLAN (MS).
Central Web Authentication Supported Not Supported Supported
Network Supplicant Provisioning (NSP) Supported Not Supported Supported
Change of Authorization (CoA) Supported Not Supported Supported
Adaptive Policy (Inline Security Group Tag) Supported Not Supported Supported Requires MS390
P a g e | 19
MERAKI, Umbrella, ISE and DUO
Wireless Health actively monitors your wireless network to help identify, locate and resolve
issues you may be having with your users or APs. Wireless Health takes a structured approach
to classifying network connectivity based on common issues and steps to resolution — from
association, to authentication, to IP address assignment, to DNS resolution. Wireless Health
uses this information to pinpoint painful areas in the wireless connection process for your
network, and helps point you in the right direction for resolution.
There are 2 ways to retrieve the wireless health. From a user perspective, or from a network
perspective. Let’s investigate the first one, first.
Click on the first widget to open the Health dashboard for this client.
2 issues are found in this screenshot (likely you will only see 1). The first issue should be visible to
you also. This is our login attempt using a switch password on the school SSID. The last one is a
mistake I made building the lab. I blocked VLAN 4 (Guest) on the switch do the client was not
able to reach the DHCP server on the MX.
P a g e | 20
MERAKI, Umbrella, ISE and DUO
This tab provides a handy overview of the access attempts of this user. This will come in very
handy assisting the user why a network connection might not be working.
Care to see a summary of all of your users and their health issues.
Here you can learn about the worst performing clients and APs. Remember that APs also have
health graphs.
P a g e | 21
MERAKI, Umbrella, ISE and DUO
EXTRA: Discover the RF Spectrum on both user radios of the access point
Open the RF Spectrum analyser and notice that 2.4GHz is indeed the most interfered radio (a
lot of red lines in the measurement of the analysis).
Now: Highlight the 5GHz and notice that this spectrum is very clean (no that much interference).
This is because in our lab we use a lot of equipment radiating in 2.4GHz spectrum.
P a g e | 22
MERAKI, Umbrella, ISE and DUO
In this exercise we learn how to roll out cloud security to enforce a secure online behaviour for
all our employees.
The first step is to connect Umbrella to your wireless controller. This is as easy as applying a
token (your personal Umbrella secret key) and defining a profile (sales, guest, …).
The next step is to create a policy per profile in the Umbrella dashboard. We will protect all our
users against threats, DNS-based attacks, and unprofessional web resources.
The ultimate step is to inspect all connections that were made and blocked to understand
what happens on the network and to help us further finetune our policy.
P a g e | 23
MERAKI, Umbrella, ISE and DUO
Click on Enable Umbrella Protection and select our On-Network Policy - Office
P a g e | 24
MERAKI, Umbrella, ISE and DUO
The API key from the previous step can be created in the Umbrella dashboard.
The token has been created for you, so these steps are informational.
When you have your own Umbrella dashboard, you can create a token using the
following steps:
Umbrella Dashboard
Admin > Legacy Keys > Umbrella Network Devices
P a g e | 25
MERAKI, Umbrella, ISE and DUO
Every profile that is added in the wireless controller appears in Umbrella as an identity.
These identities can then be linked to a policy
Umbrella Dashboard
Deployment > Core Identities > Network Devices
An on-network policy is created that will activate from the moment a user connects to
an office wireless network.
Umbrella Dashboard
Policies > Management > DNS Policies > click on On-Network Policy - Office
P a g e | 26
MERAKI, Umbrella, ISE and DUO
Note here that we have selected all Network Devices. This means that all
wireless networks, added previously, will automatically fall into this group.
Let’s define the threat categories we will block. The power of Umbrella is that
the connection will be cut off before any of these connections can be
completed.
Malware: Websites and other servers that host malicious software, drive-by
downloads/exploits, mobile threats and more.
Newly Seen Domains: Domains that have become active very recently. These
are often used in new attacks.
Phishing Attacks: Fraudulent websites that aim to trick users into handing
over personal or financial information.
Dynamic DNS: Block sites that are hosting dynamic DNS content.
DNS Tunnelling VPN: VPN services that allow users to disguise their traffic by
tunnelling it through the DNS protocol. These can be used to bypass corporate
policies regarding access and data transfer.
P a g e | 27
MERAKI, Umbrella, ISE and DUO
Here we define the web categories that are unsuitable for our users. Any
website that falls in one of these categories will be blocked.
Search for Calendar and note that we block Google Calendar for all our
employees.
Search for WhatsApp and note that we block uploads using WhatsApp.
Further finetuning can be made here. We noticed that some of our users are
using Google Translate to bypass blocked websites. To overcome this, we block
the usage of translating web sites in Google Translate.
6. File Analysis
We built a custom block page to let the user know why the connection is
refused.
Note that for the page to see, Umbrella needs to be able to infuse this block
page in the HTTPS secure web connection. A requirement is to have the
certificate from Umbrella installed on the user devices.
8. Advanced Settings
P a g e | 28
MERAKI, Umbrella, ISE and DUO
• Open FireFox
P a g e | 29
MERAKI, Umbrella, ISE and DUO
Click on the 3 dots, next to the search icon and notice that Restricted Mode is active.
Due to our security policy, none of our users can deactivate this feature when
connected to our office network.
NOTE: If this is not the case (Make sure there were 5 minutes between the Umbrella
connection and the test.)
Umbrella will block the connection and will attempt to infuse the block page.
Because our workstation does not trust the Umbrella certificate it will show a warning.
P a g e | 30
MERAKI, Umbrella, ISE and DUO
P a g e | 31
MERAKI, Umbrella, ISE and DUO
P a g e | 32
MERAKI, Umbrella, ISE and DUO
Go back to the Facebook.com tab and refresh to view the block page.
P a g e | 33
MERAKI, Umbrella, ISE and DUO
This feature will allow “Grey” sites but block malicious URLs whared through these
“Grey” mediums.
Because we have a certificate installed we can now start SSL decryption too. Use the
second URL (https://proxy.opendnstest.com/).
Click on the Allowed URL & blocked page content to simulate a grey site with
malicious content. The site itself will be shown, the content blocked.
P a g e | 34
MERAKI, Umbrella, ISE and DUO
The station you are working on will be reverted after the training. Feel free to try and
break the Umbrella DNS security.
Tip: http://internetbadguys.com
It is likely that FireFox also detects malware and refuses a connections. This is obviously
a good thing. To ignore FireFox to test Umbrella, click on Ignore the risk
https://www.wicar.org/test-malware.html
P a g e | 35
MERAKI, Umbrella, ISE and DUO
Security Activity
Get a quick overview from all the security violations and threats happening in your
network.
Previously we opened a grey website with malicious content and other malicious sites and
content. All the content that was detected as malicious you can investigate here.
Look for your network (ssid0_company-xx…) to investigate a threat that was blocked.
The below example shows the event related to the grey website with a malicious file.
Activity Search
Curious about the other events? Even the ones that got through.
This report can help you to finetune your security policies and understand what is
going on inside your branch office.
P a g e | 36
MERAKI, Umbrella, ISE and DUO
From now on you are aware what applications are introduced into your network by
your employees and guests.
Click on the Unreviewed apps to review the new applications that were active inside our
network.
Now you can review the application one-by-one to take control of the useage of unwanted
applications.
P a g e | 37
MERAKI, Umbrella, ISE and DUO
The TOP reports can help you to identify the most popular destination accessed by the
most active users.
Cloud Malware.
Your company can choose to integrate Umbrella with their cloud storage solutions to
investigate files that are stored and shared using that medium.
Prevent files from being shares with sensitive and confidential data.
You can create rules to check on tag words or type of data, like bank account numbers
etc.
P a g e | 38
MERAKI, Umbrella, ISE and DUO
This section is not in the scope of this lab. But is a valuable to talk about this functionality.
In a nutshell, you connect your branch router to Umbrella, and Umbrella will apply Firewall
rules on the traffic before releasing the traffic on the web.
Organizations are embracing direct internet access (DIA) instead of backhauling traffic to the
data center. Today organizations seek a cloud-native security service as a simple-to-manage and
scalable alternative to costly refresh cycles and maintenance headaches.
Firewall in the cloud is now an essential element of a cloud-delivered security service. It helps
you to improve security efficacy and ensure consistent enforcement everywhere.
Branch in a box.
Cisco recently released a new Catalyst switch that is able to build an IPSec connection to the
main site for site-to-site traffic and another IPSec tunnel to Umbrella for DIA (Direct Intenet
Access). This is natively supported and can reach up to 100Gbps IPSec encryption speeds.
P a g e | 39
MERAKI, Umbrella, ISE and DUO
In this exercise we learn how to roll out cloud security to enforce a secure online behaviour for
all our employees, everywhere they go.
Using Cisco Secure Client (previously known as Anyconnect) will protect you with DNS-based
security AND web policies, resulting in a full Web Secure Gateway.
Side-Note:
More protection is to be expected using the Cisco Secure Client. Below is another test
performed by AVTest over Cisco Umbrella but this time with the client.
P a g e | 40
MERAKI, Umbrella, ISE and DUO
Open the folder LAB Programs (on the desktop) and install Cisco Secure Client > open setup.
P a g e | 41
MERAKI, Umbrella, ISE and DUO
Open Cisco Secure Client and note that the correct profile is missing.
Copy OrgInfo.json from the LAB Progams folder to the following umbrella folder:
%ProgramData%\Cisco\Cisco Secure Client\Umbrella\
P a g e | 42
MERAKI, Umbrella, ISE and DUO
TIP: Open the Off-network Policy – Home/Remote and notice the following
• All roaming computers are mapped to this policy.
• Facebook is allowed for all roaming computers
All roaming computers, regardless of where they connect, will use the home/remote
policy.
P a g e | 43
MERAKI, Umbrella, ISE and DUO
Check the activity search and notice that your roaming computer is now displayed instead of
our network as an identity.
Disconnect from the office network and connect to API Lab (an unprotected network).
And try again to download malware using the eicar or wicar websites
https://www.wicar.org/test-malware.html
P a g e | 44
MERAKI, Umbrella, ISE and DUO
Check the reports to find out where you have been protected from.
Notice in the reports that the eicar website is selectively allowed (“Grey” website with malicious
content).
The station you are working on will be reverted after the training. Feel free to try and break the
Umbrella DNS + WEB security.
P a g e | 45
MERAKI, Umbrella, ISE and DUO
Duo’s MFA (multi-factor authentication) and 2FA (two-factor authentication) app and access
tools can help make security resilience easy for your organization, with user-friendly features
for secure access, strong authentication, and device monitoring.
Use the below examples to learn the basic principles of MFA and see it in action.
P a g e | 46
MERAKI, Umbrella, ISE and DUO
• Interested to understand how Lee registered the application for the first time?
Click HERE to simulate the experience of Lee
P a g e | 47
MERAKI, Umbrella, ISE and DUO
We understand that every business is unique and has different requirements, but every
business requires a secure authentication process for their employees and users.
Below you can find a large set of demos to help you understand many ways to provide secure
access to your customer networks.
https://demo.duo.com/
P a g e | 48
MERAKI, Umbrella, ISE and DUO
Connect to the demo dashboard using your own Cisco CCO ID.
https://dcloud2-lon.cisco.com/content/instantdemo/cisco-duo-admin-panel-v1-instant-
demo?returnPathTitleKey=content-view
P a g e | 49
MERAKI, Umbrella, ISE and DUO
P a g e | 50
MERAKI, Umbrella, ISE and DUO
Only allow confirmations from up-to-date systems. Less possible that they are hacked
P a g e | 51
MERAKI, Umbrella, ISE and DUO
DUO Editions
https://duo.com/editions-and-pricing
P a g e | 52