Meraki Insight Alerts – Building the Dashboard

An additional option offered by Meraki, known as Meraki Insight, is capable of more advanced monitoring and alerting than the methods previously discussed. Meraki Insight is designed specifically to provide advanced monitoring capabilities for both general connectivity and uplink health as well […]

Read More

Data Security and Retention – Cisco Meraki Cloud Architecture Basics

Meraki’s data storage and retention policies are designed to provide secure storage for data uploaded to and used by the Meraki Dashboard across all regions of the world. As discussed in the previous section, all data transferred between Meraki devices and the […]

Read More

Firmware Management and Lifecycle – Cisco Meraki Cloud Architecture Basics

Meraki strives to provide simple management of firmware for all devices across every product line. As a part of this effort, firmware upgrades to the latest Stable or Stable Release Candidate firmware may be automatically scheduled by Meraki for customer networks to […]

Read More

Creating an Organization – Building the Dashboard

Before you can create any networks or configurations, you first need to create a Dashboard organization. Go to the Meraki Dashboard home page, https://dashboard.meraki.com, and click Create an Account. Then, select a Dashboard hosting region, which will affect the data storage and […]

Read More

Creating a Network – Building the Dashboard

Immediately after you create an organization, you are presented with the option to either create a network in the new organization or to add devices to the organization inventory. For purposes of this discussion, choose to create a network. That way, you’ll […]

Read More

Claiming and Adding Devices – Building the Dashboard

After creating a network, you can begin adding devices or jump to directly configuring many of the available network-level settings for the new network. For now, you will start by adding devices to the new network before doing any configuration. Before you […]

Read More

Port Security – Cisco Storage Security

All switches in the Cisco MDS 9000 Series Switches provide port security features that reject intrusion attempts and report these intrusions to the administrator. Typically, any Fibre Channel device in a SAN can attach to any SAN switch port and access SAN […]

Read More

Dashboard Alerting and Reporting – Building the Dashboard

Now that you are familiar with the basics of creating an organization, including the networks and administrators that make up the organization, and understand some of the ways you can simplify the management of the Dashboard through the use of network and […]

Read More

Verification of Port Security – Cisco Storage Security

Port security can be verified using the commands shown next. The show port-security database commands display the configured port security information as shown in Example 20-8. Example 20-8 Verification of Port Security Database switch# show port-security database ————————————————————————–———–VSAN Logging-in Entity Logging-in Point […]

Read More

Fabric Binding – Cisco Storage Security

The fabric binding feature helps prevent unauthorized switches from joining the fabric or disrupting current fabric operations. It ensures ISLs are enabled only between specified switches in the fabric binding configuration. Fabric binding is configured on a per-VSAN basis. It uses the […]

Read More