Externally indexed torrent
If you are the original uploader, contact staff to have it moved to your account
Textbook in PDF format
Discover the Power of Cisco Meraki.
Unlock the full potential of Cisco Meraki with this in-depth guide, designed to help you build and secure modern, cloud-managed networks. Cisco Meraki offers a unique, cloud-managed IT platform that integrates seamlessly with Cisco’s traditional products and other third-party tools. Whether you’re a new Meraki customer, an experienced network engineer, or an IT manager looking to streamline operations, this book provides you with the knowledge and practical steps needed to secure enterprise networks effectively.
In a world where cybercrime is an ever-present threat, Meraki’s cloud-managed solutions offer a robust alternative to traditional wired and wireless networks. This book not only introduces you to the fundamentals of Meraki but also dives deep into advanced security configurations, industry best practices, and real-world use cases. By the end of this book, you’ll be equipped to implement Meraki solutions that meet stringent IT security standards and frameworks, ensuring your network is not just operational but resilient and secure.
With this book as your guide, you will gain the skills to deploy secure, cloud-managed networks using Cisco Meraki. You will learn:
Meraki’s History: Understand the evolution of Meraki from a research project at MIT to a key player in Cisco’s portfolio.
Security Frameworks and Industry Best Practices: Learn about the essential IT security standards and frameworks and how Meraki can help you meet these requirements.
Meraki Dashboard and Trust: Get familiar with the Meraki management portal and understand the considerations for adopting cloud-managed infrastructure.
Role-Based Access Control (RBAC): Discover how to implement RBAC to enforce the principle of least privilege within your network.
Securing Administrator Access to Meraki Dashboard: Master the configuration of strong authentication methods, including multifactor authentication (MFA) and SAML single sign-on (SSO).
Security Operations: Explore the native Meraki tools and external solutions for compliance reporting, centralized logging, and incident response.
User Authentication: Delve into the setup of authentication infrastructures supporting wired, wireless, and VPN access, including Meraki Cloud Authentication, SAML, and RADIUS.
Wired and Wireless LAN Security: Learn how to secure your LAN with features like 802.1X authentication, firewalling, and adaptive policies
Introduction
Meraki’s History
Security Frameworks and Industry Best Practices
Meraki Dashboard and Trust
Role-Based Access Control (RBAC)
Securing Administrator Access to Meraki Dashboard
Security Operations
User Authentication
Wired and Wireless LAN Security
Meraki MX and WAN Security
Securing User Traffic
Securing End-User Devices
Physical Security
Appendix A Comparison of Common Security Standards and Framework Requirements