Key
Features
Inside
the MX
MX Series
Overview
Call us toll-free at 877-449-0458
or email us at Sales@CorporateArmor.com
The Cisco Meraki MX80
is a member of the only
100% cloud-managed
UTM series of appliances.
The MX80 appliance self-
provisions, automatically pulling policies and configuration
settings from the cloud. Powerful remote tools provide
network-wide visibility and control, and enable administration without on-site networking expertise.
Cloud services deliver seamless firmware and security
signature updates, automatically establish site-to-site VPN
tunnels, and provide 24x7 network monitoring. So you are
always kept up-to-date via the cloud, providing peace-of-mind
to IT administrators. Moreover, the MX80’s browser-based management dashboard completely eliminates the need
for training.
The MX80 hardware platform is purpose-built for Layer 7
deep packet inspection, with advanced security features
including IPS, content filtering, web search filtering, anti-
virus - anti-phishing, and IPsec VPN connectivity, while
providing the throughput and capacity for modern,
bandwidth-intensive networks.
The integrated Sourcefire SNORT® engine delivers superior intrusion prevention coverage, a key requirement for PCI
3.0 compliance. The MX80 also uses the Webroot® URL categorization database for CIPA / IWF compliant content-
filtering, Kaspersky® engine for anti-virus / anti-phishing
filtering, and MaxMind for geo-IP based security rules.
• 250 Mbps Stateful Firewall Throughput
• 5xGbE Ports
• Auto VPN™ self-configuring site-to-site
VPN
• 3G / 4G failover via USB modem
• Interoperates with standards-based
IPsec VPNs
• Dual-band 802.11n/ac, 2x2 MIMO with
2 spatial streams
• Google SafeSearch and YouTube for
Schools
Purchase now from the
Nation’s Premier Partner
by clicking the image above or
contact one of their Security
Focused Sales Engineers
at 877-449-0458.
Sizing Guide
Datasheet
Cloud Mgt
Key
Features
Inside
the MX
MX Series
Overview
Call us toll-free at 877-449-0458
or email us at Sales@CorporateArmor.com
Cisco Meraki MX Security Appliances are ideal for organizations with large
numbers of distributed sites. Since the MX is 100% cloud managed, installation
and remote management are simple. The MX has a comprehensive suite of
network services, eliminating the need for multiple appliances. Services include
a next-generation firewall content filtering web search filtering SNORT® based
intrusion prevention, web caching, WAN optimization, multiple WAN uplinks
and 4G failover.
UTM Capabilities
• Identity-based security policies and application management.
• Content filtering: CIPA-compliant content filter, safe-seach
enforcement (Google/Bing), and YouTube for schools.
• Intrusion Prevention: PCI Compliant IPS using industry-leading
SNORT® signature database from SourceFire.
• Application-aware traffic control: set bandwidth policies based
on Layer & application type (e.g. YouTube, Skype, P2P).
Branch Gateway Services
• Built-in DHCP, NAT, QoS, and VLAN management services.
• Web caching: accelerates frequently accessed content.
• Link bonding combines multiple WAN links into a single
high-speed interface with policies for QoS, traffic shaping,
and failover.
• Layer 3 failover: automatic detection of layer 2 and layer 3
outages and fast failover, including 3G/4G USB modems.
• WAN optimization: data redundancy elimination, protocol
optimization and compression provide bandwidth savings
up to 99%.
Industry-Leading Cloud Management
• Unified WAN, LAN, and wireless LAN management through a
web-based dashboard.
• Template based settings scale from small deployments to large,
multi-site deployments with tens of thousands of devices.
• Role-based administration, email alerts on configuration change,
connectivity issues and power loss, and auditable change logs.
• Summary reports with user, device, and application usage
details archived in the cloud.
Site-to-Site VPN with 4G Failover
• Auto VPN: automatic routing table generation, IKE/IPsec setup and
key exchange via Cisco Meraki's secure cloud.
• Automatic failover to secondary WAN link or 4G connection.
• Interoperates with standards-based IPSec VPNs.
• Automated MPLS to VPN failover.
• Client VPN: L2TP IPSec support for native Windows, Mac OS X, iPad
and Android clients with no per-user licensing fees.
Back
to Top
Key
Features
Inside
the MX
MX Series
Overview
Call us toll-free at 877-449-0458
or email us at Sales@CorporateArmor.com
Ironclad Security for Edge Networks
The MX hardware platform is purpose-built for Layer 7 deep packet inspection, with advanced security features including IPS, content filtering web search filtering anti-virus/anti-phishing, and IPsec VPN connectivity, while providing the throughput and capacity for modern bandwidth-intensive networks.
Layer 7 fingerprinting technology lets administrators identify unwanted content and applications and prevent recreational apps like BitTorrent from wasting precious bandwidth.
The integrated Sourcefir SNORT® engine delivers superior intrusion prevention coverage, a key requirement for PCI 2.0 compliance. The MX also uses the Webroot® BrightCloud URL categorization database for CIPA / IWF compliant content-filtering and Kaspersky® SafeStream engine for anti-virus / anti-phishing filtering.
Best of all, these industry-leading Layer 7 security engines and signatures are always kept up-to-date via the cloud, simplifying network security management and providing peace-of-mind to IT administrators.
Meraki’s founders invented Cloud Networking while working as grad students at M.I.T. Cisco Meraki now has a complete line of cloud networking products that power over 20,000 customer networks, including massive global deployments with tens of thousands of devices.
Built on Cisco Meraki’s award-winning
cloud-managed architecture, the MX
is the only 100% cloud-managed
Unified Threat Management appliance.
MX appliances self-provision,
automatically pulling policies and
configuration settings from the cloud.
Powerful remote tools provide network-
wide visibility and control, and enable
administration without on-site
networking expertise.
Cloud services deliver seamless firmware
and security signature updates, automatically establish site-
to-site VPN tunnels, and provide 24x7 network monitoring.
Moreover, the MX’s browser-based management dashboard
completely eliminates the need for training.
What is Cloud Networking?
Cloud Networking provides centralized management, visibility, and
control without the cost and complexity of controller appliances or
overlay management software. Cisco Meraki products are built from
the ground up for cloud management, and come out of the box with
centralized management, layer 7 device and application visibility, real
time web-based diagnostics, monitoring, reporting, and much, much
more. Cisco Meraki deploys quickly and easily, without training or
proprietary command line interfaces.
MX400 shown, features vary by model
Key
Features
Inside
the MX
MX Series
Overview
Call us toll-free at 877-449-0458
or email us at Sales@CorporateArmor.com
Identity-Based Firewall
Automatically assigns firewall and traffic shaping
rules, VLAN tags, and bandwidth limits to enforce
the right policies for each class of users.
Identity-Based Firewall
Automatically assigns firewall and traffic shaping
rules, VLAN tags, and bandwidth limits to enforce
the right policies for each class of users.
Identity-Based Firewall
Automatically assigns firewall and traffic shaping
rules, VLAN tags, and bandwidth limits to enforce
the right policies for each class of users.
Identity-Based Firewall
Automatically assigns firewall and traffic shaping
rules, VLAN tags, and bandwidth limits to enforce
the right policies for each class of users.
Identity-Based Firewall
Automatically assigns firewall and traffic shaping
rules, VLAN tags, and bandwidth limits to enforce
the right policies for each class of users.
Identity-Based Firewall
Automatically assigns firewall and traffic shaping
rules, VLAN tags, and bandwidth limits to enforce
the right policies for each class of users.
Identity-Based Firewall
Automatically assigns firewall and traffic shaping
rules, VLAN tags, and bandwidth limits to enforce
the right policies for each class of users.
Identity-Based Firewall
Automatically assigns firewall and traffic shaping
rules, VLAN tags, and bandwidth limits to enforce
the right policies for each class of users.
Intuitive, Centralized Management
Remotely deploy Cisco Meraki Security Appliances in minutes through zero-touch cloud provisioning. Synchronize security settings across thousands of sites using templates. Securely connect branch locations in 3 clicks in Meraki’s intuitive, web-based dashboard.
The Meraki dashboard provides deep visibility and control over all of your Security Appliances from any Internet-accessible device, anytime, anywhere. View networked clients, bandwidth consumption, and application usage across all sites - and push policies to block, shape, or whitelist activity to optimize performance and user experience.
Try an MX for yourself and discover
the power of cloud networking.
©Copyright 2016 - Corporate Armor Inc. - All Rights Reserved - All Logos, Trademarks, Descriptions, Documents & Images are the property of their respective owner.