Date post: | 20-Jul-2015 |
Category: |
Technology |
Author: | cisco-canada |
View: | 358 times |
Download: | 7 times |
Cisco Cloud Networking Workshop Presenter: Jay Bradford CNG SE
2
Housekeeping Notes May 13, 2015
3
Thank you for attending Cisco Connect Toronto 2015, here are a few housekeeping notes to ensure we all enjoy the session today.
Please ensure your cellphones / laptops are set on silent to ensure no one is disturbed during the session
A power bar is available under each desk in case you need to charge your laptop (Labs only)
House Keeping Notes
4
Cisco dCloud is a self-service platform that can be accessed via a browser, a high-speed Internet connection, and a cisco.com account
Customers will have direct access to a subset of dCloud demos and labs
Restricted content must be brokered by an authorized user (Cisco or Partner) and then shared with the customers (cisco.com user).
Go to dcloud.cisco.com, select the location closest to you, and log in with your cisco.com credentials
Review the getting started videos and try Cisco dCloud today: https://dcloud-cms.cisco.com/help
dCloud
Customers now get full dCloud experience!
5
20 min Welcome and Introduction
30 min Dashboard Demo
5 min Local MX, MS and MR configuration
30 min MX | Security Appliances Lab
45 min MS | Access Switches Lab
30 min MR | Wireless Access Points Lab
15 min SM | System Manager Demo
5 min Q&A and Wrap-Up
Agenda
6
Complete cloud-managed networking solution Wireless, switching, security, WAN optimization, and MDM, centrally managed over the web Built from the ground up for cloud management Integrated hardware, software, and cloud services
Cloud Networking Leader Ciscos fastest-growing acquisition ever: over 100% annual growth 300,000+ customer networks in 147 countries Tens of millions of devices connected worldwide
Recognized for innovation Gartner Magic Quadrant InfoWorld Technology of the Year TechWorld Mobility product of the year CRN Coolest Technologies
About Cisco cloud-managed networking
7
Bringing the cloud to enterprise networks
Meraki MS Ethernet Switches
Meraki SM Mobile Device Management
Meraki MR Wireless LAN
Meraki MX Security
Appliances
8
Scalable Unlimited throughput, no bottlenecks Add devices or sites in minutes
Reliable Highly available cloud with multiple datacenters Network functions even if connection to cloud is interrupted 99.99% uptime SLA
Secure No user traffic passes through cloud Fully HIPAA / PCI DSS 3.0 compliant (level 1 certified) 3rd party security audits, daily penetration testing Automatic firmware and security updates (user-scheduled)
Reliability and security information at meraki.cisco.com/trust
Management data (1 kb/s) WAN
Out-of-band management in every product
9
Cloud Licensing Model is Simple
Simple Cloud Licensing model No per-feature or per-user licenses Licensing options: 1 Year, 3 Year, 5 Year, 7 Year & 10 Year
Cloud License price is all inclusive Cloud Management UI 24 x 7 phone support Automated software updates Advanced hardware replacement All features built on the platform All new features
10
Dashboard Demo
11
Hands-on Labs
12
Go to dashboard.meraki.com and login with: username: [email protected] password: meraki123 X is your station ID Please select your network # on the top pull-down menu
13
Your lab gear lives in our SF office
14
Network Topology Firewall Configuration: VLAN1 (Default) Subnet: 192.168.(200+x).0/24 Interface: 192.168.(200+x).1 Switch Configuration: VLAN1 (Route to MX) Subnet: 192.168.(200+x).0/24 Interface: 192.168.(200+x).2 VLAN100 (Student) Subnet: 10.0.(100+x).0/24 Interface: 10.0.(100+x).1 VLAN200 (Staff) Subnet: 10.0.(200+x).0/24 Interface: 10.0.(200+x).1 VLAN600 (OSPF) Subnet: 192.168.0.0/24 Interface: 192.168.0.x X is your lab station number
Firewall
L3 Switch
MR18
15
MX Security Appliance
16
A Complete Unified Thread Management Solution
Application Control WAN Optimization, Traffic Shaping, Content Filtering
Security NG Firewall, Client VPN, Site to Site VPN, IDS/IPS, Anti-Malware, Geo-Firewall
Networking NAT/DHCP, 3G/4G Cellular, Static Routing, Link Balancing
17
Choosing the right MX for your environment
MX64/64W
MX80
MX100
MX400
MX600
Z1
Small branches (~50 users)
Where FW Throughput
200 Mbps
Large branch/campus (~10,000 users)
Large branch/campus (~2,000 users)
Mid-size branches (~100 users)
Mid-size branches (~500 users)
Unique Features
802.11ac Wireless (MX64W)
8 x GbE Gigabit uplinks Built-in redundancy 8 x GbE (SPF), 4 x 10GbE (SPF+) Built-in redundancy
250 Mbps 5 x GbE Gigabit uplinks (up to 2 WAN)
750 Mbps 8 x GbE Gigabit uplinks (up to 2 WAN) 2 x GbE (SPF)
1 Gbps
2 Gbps
8 x GbE Gigabit uplinks (up to 2 WAN) 8 x GbE (SPF), 4 x 10GbE (SPF+) Built-in redundancy
For teleworkers (1-5 users) Dual-radio wireless FW throughput: 50 Mbps
All devices support 3G/4G
18
Automated site-to-site VPN
Site-to-site IPsec VPN in just two clicks in the Dashboard
Simple Creates L3 site-to-site VPN tunnels with just 2 clicks in the dashboard
Automatic Comparable to Cisco DMVPN, it creates a mesh or hub-and-spoke VPN tunnel between all peers and adjusts to IP changes
Resilient Automatic failover over to secondary WAN link or 3G/4G USB modem
19
Ironclad security
Best IPS SOURCEfire IDS / IPS, updated every day
Content Filtering
4+ billions URLS, updated in real-time
Geo-based security
Block attackers from rogue countries
AV / anti-phishing
Kaspersky AV, updated every hour
PCI compliance
PCI L1 certified cloud-based management
20
MX Configuration Enable VLANs under Configure / Addressing and change the address per the diagram.
Ensure that non-tagged traffic will be part of VLAN1 (native VLAN) Reserve IP addresses .1 through .10 under DHCP Settings
Enable site-to-site VPN with following settings: mesh site-to-site VPN, check VPN health & status
Split tunnel mode, Hub-and-spoke topology (the SEVT Security Appliance as the Hub) Advertise the default subnet to your neighbors Check the Route Table and VPN Status under Monitoring
Apply the following global default policies (Hint: Below section does not use group policies)
Completely block BitTorrent For Netflix and Pandora, shape traffic to 100K down, 50 K up. Ensure they are low priority and are marked appropriately. For all voice and video conferencing, remove all bandwidth restrictions and apply priority/marking as needed. Apply content filtering for adult websites Restrict traffic to and from North Korea (hint: this is a L7 firewall policy)
21
Complete Campus Switching Portfolio
14 models scaling from access to campus aggregation
Enterprise-class performance and reliability including non-blocking Gigabit performance, 802.3af/at PoE/PoE+ on all ports, 10GbE uplinks, and voice and video QoS
Voice and video QoS
Dynamic Routing
Layer 7 app visibility
Virtual stacking
Enterprise security, ACLs
Remote packet capture, cable testing
Feature highlights
22
MS Switching: Models
MS220 MS320 MS420 Features
8, 24, 48 port models Layer 2 Gigabit SFP uplinks Supports rack-mounted RPS
23001 Integrated fans
24, 48 port models Layer 3 10Gb SFP+ uplinks Hot-swappable, redundant PSU
(with integrated fans)
24, 48 port models Layer 3 10Gb SFP+ interfaces Hot-swappable, redundant PSUs Field-replacement fans Management port
Ideal scenarios
Access switching at branch sites Deep visibility into clients,
applications Energy savings (PoE/PoE+
models)
Mission critical access switching Fast uplink requirements High availability environments Next-generation 802.11ac wireless
(MR34) Deep visibility into clients,
applications Energy savings (PoE/PoE+
models)
Campus aggregation switching Unified management from access
to aggregation layer Space-constrained locations
1 except 8-port models
23
2014 Release Mission critical features OSPF Dynamic routing with intuitive, browser-based configuration
IPv6 visibility and tracking Usage statistics for IPv6 address now in Dashboard
DHCP server Integrated DHCP service to help prevent single points of network failure
IPv4 Access Control Lists (ACLs) Granular security boundaries configurable by subnet, protocol, port range, or host.
Virtual Router Redundancy Protocol (VRRP) with DHCP Failover support High availability via a warm spare with automatic failover and DHCP failover support
Addressing evolving customer needs around redundancy, campus connectivity, and reducing complexity
24
MS Configuration Part 1 Verify that your switch is operational under Monitoring page (green status, passing traffic) Click on Initialize layer 3 features link to add following SVIs:
Name: Route to MX, Subnet: 192.168.(200+X).0/24 Interface IP: 192.168.(200+X).2 Gateway: 192.168.(200+X).1 Name: Student, Subnet: 10.0.(100+X).0/24, Interface IP: 10.0.(100+X).1, VLAN: 100 Name: Staff, Subnet: 10.0.(200+X).0/24, Interface IP: 10.0.(200+X).1, VLAN: 200 Name: OSPF, Subnet: 192.168.0.0/24, Interface IP: 192.168.0.X, VLAN: 600
Enable DHCP Server for the Student and Staff subnets Go back to MX Appliance and create static routes for the Student and Staff subnets with gateway IP address to your L3 switch SVI. Also In VPN option checked. Configure OSPF with following settings:
First configure switch port 25 to be access VLAN 600 Enable OSPF with default Area 0 Edit Student, Staff and OSPF interfaces to use the default Area 0 Below make sure that statically assigned routes override OSPF
Verify the OSPF neighbors and routes on the switch Monitoring page Start a ping to 192.168.221.1 and try again with port 25 disabled (wait about 30 sec).
25
So what is going on?
26
MS Configuration Part 2 Configure VOIP:
Under Configure / Switch Ports, select ports 5-10 and hit Edit on top Update the tag field with the word Phone Change the type to Access and update the VLANs to 100 and 600 for data and voice respectively Save the changes
Create a new port schedule Name energy-saving Select 8 to 5 on weekdays only template Save the changes
Go back to port configuration and apply the port schedule to all the ports with the tag phone (Optional) Cable test and packet capture:
Go to Switch monitoring page and click on port 1 Run a cable test by clicking on the little arrow next to it When thats successful, click on the run a packet capture on this port link Change the output Stream to CloudShark and duration to 10 sec Wait for the link to CloudShark appear under the capture button and click on it to view
27
Wireless Access Points
7 models including indoor / outdoor, high performance and value-priced Enterprise-class silicon including RF optimization, PoE, voice / video support Lifetime warranty on indoor APs
BYOD policies
Application traffic shaping
Guest access
Enterprise security
Location analytics
WIPS 3rd Security Radio
Feature highlights
28
Outdoor APs
3 Stream Triple-Radio 802.11ac 1.75 Gbit/s
MR18 MR26 2 Stream Triple-Radio 802.11a/b/g/n 600 Mbit/s
3 Stream Triple-Radio 802.11a/b/g/n 900 Mbit/s
MR34
Making room for new MRs
2 Stream Triple-Radio 802.11ac 1.2 Gbit/s
MR32
2 Stream Triple-Radio 802.11ac 1.2 Gbit/s
MR72
NEW
NEW
Indoor APs
MR66 Dual-Radio 802.11a/b/g/n 600 Mbit/s
MR62 Single-Radio 802.11b/g/n 300 Mbit/s
29
Third radio tames hostile RF environments
Radio dedicated to scanning and protecting RF environment Instantly detects and mitigates interference, vulnerabilities, and attacks on all channels Third radio enables full-time scanning with full-performance client access on 2.4 GHz and 5 GHz radios
Deeply-integrated with cloud-based software solutions: Air Marshal (security), Auto RF (performance)
No added cost or complexity Typical deployments: radio operates in background (zero-config) Power users: rich tools available for security and RF management No added cost: no extra hardware, software, or licenses
30
Bluetooth and Beacons
Bluetooth & BLE integrated in many consumer devices already
Beacons use BLE for location services like asset tracking, mobile commerce, and nav iBeacon is Apples BLE trademark
Gaining traction as an opt-in alternative to WiFi-based location services
MR32, MR72: Integrated Bluetooth to drive location trends
31
Use Case: Location Engagement with Beacons
Seamless site-wide deployment by integrating
Beacons into the AP
Better consumer experience with opt-in mobile app integration
Increased customer visibility with both WiFi and Bluetooth analytics
built-in
32
Use Case: Asset Tracking with Bluetooth
Seamless site-wide deployment with
Bluetooth integrated into the AP
Track Beacon-tagged assets with Bluetooth scanning and location
estimation
Increased administrative visibility with both WiFi and Bluetooth inventory
built-in
33
MR Configuration (APs have been turned off) Verify that your AP is operational under Monitoring page (green status, passing traffic) Rename existing SSID under Configuration to LAB X - Student and enable two additional SSIDs for Staff and Guest On your Staff SSID, use WPA2-Enterprise for authentication and add a RADIUS server with IP address 192.168.221.1, port 1812 and shared key meraki123. Change client IP assignment to Bridge Mode and VLAN tagging to 200 On your Student SSID, leave association Open but change the splash page to Sign on with my AD server and add the same IP address as above with any admin credentials. Change client IP assignment to Bridge Mode and VLAN tagging to 100 On the guest SSID, ensure the users sign on with a simple click-through splash page that refreshes every half hour (hint: customize it under Configure / Splash Page). Select NAT Mode for client IP assignment to use the Meraki AP as DHCP Server. Under Configure / Firewall & Traffic Shaping, select the guest SSID and create L7 firewall rules to block P2P File Sharing and Gaming on this SSID. Also, limit the per-client bandwidth to 1 Mbps
34
Cloud-managed Device Mobility
Flexible, easy provisioning
Centrally scale 100,000s devices worldwide
Auto-tagging, dynamic security compliance
Integrate seamlessly with the rest of your Cisco Meraki network
35
Deployment & Rollout One-step Enrollment
Browser: m.meraki.com with NetworkID SM app: NetworkID or QR code Email/SMS: enrollment link
Automatic Enrollment Meraki integrates directly with Apples DEP portal Supervise devices, disable profile removal, skip setup
Secure Enrollment by user/group Authenticate device enrollment Automatically inventory devices Automatically license and push apps Automatically configure email, network access
36
Software & App Management Grant and revoke VPP licenses directly from the Meraki Dashboard
Remotely install and inventory MSI and PKG files across devices
Auto push and remove apps by department/student/class/school using AD groups and bulk tagging
Blacklist/monitor for inappropriate apps and automatically restrict/lock-down
37
SM Demo
38
Bonus Lab Demonstration Onboarding:
Clients will download System Manager upon joining. Firewall blocks everything else. More Security with MDM:
Only allow clients with SM installed on this SSID. Use MR as DHCP server. Just for Fun: Try wishing for konami code
Thank you.