
Data Security and Retention – Cisco Meraki Cloud Architecture Basics
Meraki’s data storage and retention policies are designed to provide secure storage for data uploaded to and used by the Meraki Dashboard across all regions of the world. As discussed in the previous section, all data transferred between Meraki devices and the […]

Firmware Management and Lifecycle – Cisco Meraki Cloud Architecture Basics
Meraki strives to provide simple management of firmware for all devices across every product line. As a part of this effort, firmware upgrades to the latest Stable or Stable Release Candidate firmware may be automatically scheduled by Meraki for customer networks to […]

Creating an Organization – Building the Dashboard
Before you can create any networks or configurations, you first need to create a Dashboard organization. Go to the Meraki Dashboard home page, https://dashboard.meraki.com, and click Create an Account. Then, select a Dashboard hosting region, which will affect the data storage and […]

Creating a Network – Building the Dashboard
Immediately after you create an organization, you are presented with the option to either create a network in the new organization or to add devices to the organization inventory. For purposes of this discussion, choose to create a network. That way, you’ll […]

Claiming and Adding Devices – Building the Dashboard
After creating a network, you can begin adding devices or jump to directly configuring many of the available network-level settings for the new network. For now, you will start by adding devices to the new network before doing any configuration. Before you […]

Port Security – Cisco Storage Security
All switches in the Cisco MDS 9000 Series Switches provide port security features that reject intrusion attempts and report these intrusions to the administrator. Typically, any Fibre Channel device in a SAN can attach to any SAN switch port and access SAN […]

Dashboard Alerting and Reporting – Building the Dashboard
Now that you are familiar with the basics of creating an organization, including the networks and administrators that make up the organization, and understand some of the ways you can simplify the management of the Dashboard through the use of network and […]

Verification of Port Security – Cisco Storage Security
Port security can be verified using the commands shown next. The show port-security database commands display the configured port security information as shown in Example 20-8. Example 20-8 Verification of Port Security Database switch# show port-security database ————————————————————————–———–VSAN Logging-in Entity Logging-in Point […]

Fabric Binding – Cisco Storage Security
The fabric binding feature helps prevent unauthorized switches from joining the fabric or disrupting current fabric operations. It ensures ISLs are enabled only between specified switches in the fabric binding configuration. Fabric binding is configured on a per-VSAN basis. It uses the […]
An additional option offered by Meraki, known as Meraki Insight, is capable of more advanced monitoring and alerting than the methods previously discussed. Meraki Insight is designed specifically to provide advanced monitoring capabilities for both general connectivity and uplink health as well […]