Meraki MX80 Security Appliance

Meraki MX80 Security Appliance

The Cisco Meraki MX80

is a member of the only

100% cloud-managed

UTM series of appliances.

The MX80 appliance self-

provisions, automatically pulling policies and configuration

settings from the cloud. Powerful remote tools provide

network-wide visibility and control, and enable administration without on-site networking expertise.

 

Cloud services deliver seamless firmware and security

signature updates, automatically establish site-to-site VPN

tunnels, and provide 24x7 network monitoring. So you are

always kept up-to-date via the cloud, providing peace-of-mind

to IT administrators. Moreover, the MX80’s browser-based management dashboard completely eliminates the need

for training.

 

The MX80 hardware platform is purpose-built for Layer 7

deep packet inspection, with advanced security features

including IPS, content filtering, web search filtering, anti-

virus - anti-phishing, and IPsec VPN connectivity, while

providing the throughput and capacity for modern,

bandwidth-intensive networks.

 

The integrated Sourcefire SNORT® engine delivers superior intrusion prevention coverage, a key requirement for PCI

3.0 compliance. The MX80 also uses the Webroot® URL categorization database for CIPA / IWF compliant content-

filtering, Kaspersky® engine for anti-virus / anti-phishing

filtering, and MaxMind for geo-IP based security rules.

Product Highlights

• 250 Mbps Stateful Firewall Throughput

 

• 5xGbE Ports

 

• Auto VPN™ self-configuring site-to-site

   VPN

 

• 3G / 4G failover via USB modem

 

• Interoperates with standards-based

   IPsec VPNs

 

• Dual-band 802.11n/ac, 2x2 MIMO with

   2 spatial streams

 

• Google SafeSearch and YouTube for

   Schools

Ironclad Security from the Premier Cisco Meraki Partner, Corporate Armor.

Purchase now from the

Nation’s Premier Partner

by clicking the image above or

contact one of their Security

Focused Sales Engineers

at 877-449-0458.

Sizing Guide

 Datasheet

Cloud Mgt

 

Cisco Meraki MR Cloud-Managed enterprise 802.11ac Wireless AP Access Points

MX Cloud-Managed

Security Appliances

Key

Features

Inside

the MX

MX Series

Overview

Call us toll-free at 877-449-0458

or email us at Sales@CorporateArmor.com

Cisco Meraki MX Security Appliances are ideal for organizations with large

numbers of distributed sites. Since the MX is 100% cloud managed, installation

and remote management are simple. The MX has a comprehensive suite of

network services, eliminating the need for multiple appliances. Services include

a next-generation firewall content filtering web search filtering SNORT® based

intrusion prevention, web caching, WAN optimization, multiple WAN uplinks

and 4G failover.

UTM Capabilities

• Identity-based security policies and application management.

 

• Content filtering: CIPA-compliant content filter, safe-seach

   enforcement (Google/Bing), and YouTube for schools.

 

• Intrusion Prevention: PCI Compliant IPS using industry-leading

   SNORT® signature database from SourceFire.

 

• Application-aware traffic control: set bandwidth policies based

   on Layer & application type (e.g. YouTube, Skype, P2P).

Feature-Rich Unified

Threat Management

Branch Gateway Services

• Built-in DHCP, NAT, QoS, and VLAN management services.

 

• Web caching: accelerates frequently accessed content.

 

• Link bonding combines multiple WAN links into a single

   high-speed interface with policies for QoS, traffic shaping,

   and failover.

 

• Layer 3 failover: automatic detection of layer 2 and layer 3

   outages and fast failover, including 3G/4G USB modems.

 

• WAN optimization: data redundancy elimination, protocol

   optimization and compression provide bandwidth savings

   up to 99%.

Industry-Leading Cloud Management

• Unified WAN, LAN, and wireless LAN management through a

   web-based dashboard.

 

• Template based settings scale from small deployments to large,

   multi-site deployments with tens of thousands of devices.

 

• Role-based administration, email alerts on configuration change,

   connectivity issues and power loss, and auditable change logs.

 

• Summary reports with user, device, and application usage

   details archived in the cloud.

Site-to-Site VPN with 4G Failover

• Auto VPN: automatic routing table generation, IKE/IPsec setup and

   key exchange via Cisco Meraki's secure cloud.

 

• Automatic failover to secondary WAN link or 4G connection.

 

• Interoperates with standards-based IPSec VPNs.

 

• Automated MPLS to VPN failover.

 

• Client VPN: L2TP IPSec support for native Windows, Mac OS X, iPad

   and Android clients with no per-user licensing fees.

Back

to Top

Inside the Cisco Meraki MX

Ironclad Security for Edge Networks

The MX hardware platform is purpose-built for Layer 7 deep packet inspection, with advanced security features including IPS, content filtering web search filtering anti-virus/anti-phishing, and IPsec VPN connectivity, while providing the throughput and capacity for modern bandwidth-intensive networks.

 

Layer 7 fingerprinting technology lets administrators identify unwanted content and applications and prevent recreational apps like BitTorrent from wasting precious bandwidth.

 

The integrated Sourcefir SNORT® engine delivers superior intrusion prevention coverage, a key requirement for PCI 2.0 compliance. The MX also uses the Webroot® BrightCloud URL categorization database for CIPA / IWF compliant content-filtering and Kaspersky® SafeStream engine for anti-virus / anti-phishing filtering.

 

Best of all, these industry-leading Layer 7 security engines and signatures are always kept up-to-date via the cloud, simplifying network security management and providing peace-of-mind to IT administrators.

Meraki’s founders invented Cloud Networking while working as grad students at M.I.T. Cisco Meraki now has a complete line of cloud networking products that power over 20,000 customer networks, including massive global deployments with tens of thousands of devices.

Cloud Managed Architecture

Built on Cisco Meraki’s award-winning

cloud-managed architecture, the MX

is the only 100% cloud-managed

Unified Threat Management appliance.

MX appliances self-provision,

automatically pulling  policies and

configuration settings from the cloud.

Powerful remote tools provide network-

wide visibility and control, and enable

administration without on-site

networking expertise.

 

Cloud services deliver seamless firmware

and security signature updates, automatically establish site-

to-site VPN tunnels, and  provide 24x7 network monitoring.

Moreover, the MX’s browser-based management dashboard

completely eliminates the need for training.

 

What is Cloud Networking?

Cloud Networking provides centralized management, visibility, and

control without the cost and complexity of controller appliances or

overlay management software. Cisco Meraki products are built from

the ground up for cloud management, and come out of the box with

centralized management, layer 7 device and application visibility, real

time web-based diagnostics, monitoring, reporting, and much, much

more. Cisco Meraki deploys quickly and easily, without training or

proprietary command line interfaces.

MX400 shown, features vary by model

The Meraki security solution includes a complete,

robust feature set right out of the box. No additional

purchase required.

Identity-Based Firewall

Automatically assigns firewall and traffic shaping

rules, VLAN tags, and bandwidth limits to enforce

the right policies for each class of users.

Identity-Based Firewall

Automatically assigns firewall and traffic shaping

rules, VLAN tags, and bandwidth limits to enforce

the right policies for each class of users.

Identity-Based Firewall

Automatically assigns firewall and traffic shaping

rules, VLAN tags, and bandwidth limits to enforce

the right policies for each class of users.

Identity-Based Firewall

Automatically assigns firewall and traffic shaping

rules, VLAN tags, and bandwidth limits to enforce

the right policies for each class of users.

Identity-Based Firewall

Automatically assigns firewall and traffic shaping

rules, VLAN tags, and bandwidth limits to enforce

the right policies for each class of users.

Identity-Based Firewall

Automatically assigns firewall and traffic shaping

rules, VLAN tags, and bandwidth limits to enforce

the right policies for each class of users.

Identity-Based Firewall

Automatically assigns firewall and traffic shaping

rules, VLAN tags, and bandwidth limits to enforce

the right policies for each class of users.

Identity-Based Firewall

Automatically assigns firewall and traffic shaping

rules, VLAN tags, and bandwidth limits to enforce

the right policies for each class of users.

Intuitive, Centralized Management

 

Remotely deploy Cisco Meraki Security Appliances in minutes through zero-touch cloud provisioning. Synchronize security settings across thousands of sites using templates. Securely connect branch locations in 3 clicks in Meraki’s intuitive, web-based dashboard.

 

The Meraki dashboard provides deep visibility and control over all of your Security Appliances from any Internet-accessible device, anytime, anywhere. View networked clients, bandwidth consumption, and application usage across all sites - and push policies to block, shape, or whitelist activity to optimize performance and user experience.

Try an MX for yourself and discover

the power of cloud networking.

©Copyright 2016 - Corporate Armor Inc. - All Rights Reserved - All Logos, Trademarks, Descriptions, Documents & Images are the property of their respective owner.