毅进龙科技(深圳)有限公司

Cisco Meraki MX系列 Security APPliances:

Wireless LAN

  • 技术特性
  • 产品对比
  • 技术参数
100% centralized cloud management for security, networking, & application control

Safety, Fast.

Remotely deploy Cisco Meraki Security Appliances in minutes through zero-touch cloud provisioning. Synchronize security settings across thousands of sites using templates. Securely connect branch locations in 3 clicks in Meraki's intuitive, web-based dashboard.

Secure a Site in Minutes

Add Meraki Security Appliance to dashboard.
Enable intrusion prevention.
Select desired threat protection level.

Comprehensive Security in a Single Box

Every Meraki Security Appliance supports several features, like a stateful firewall and integrated Sourcefire intrusion prevention (IPS) engine, to secure your networks. Threat definitions and filter lists are seamlessly updated, ensuring every MX has bleeding-edge protection from the latest vulnerabilities and troublesome websites.

Intuitive, Centralized Management

The Meraki dashboard provides deep visibility and control over all of your Security Appliances from any Internet-accessible device, anytime, anywhere. View networked clients, bandwidth consumption, and application usage across all sites—and push policies to block, shape, or whitelist activity to optimize performance and user experience.

Fault Tolerant

Redundancy is built into the MX several times over: from dual WAN and cellular uplinks to keep your MX connected to the Internet, to warm spare failover that ensures device integrity, to self-healing site-to-site VPN that keeps branch locations securely connected.

SD-WAN

Built-in Software-defined WAN capabilities lower operational costs and improve resource usage for multi-site deployments, allowing network administrators to use available bandwidth more efficiently and ensure the highest possible level of performance for critical applications without sacrificing security or data privacy.

The Meraki security solution includes a complete, robust feature set right out of the box. No additional purchase required.
Identity-Based Firewall

Automatically assigns firewall and traffic shaping rules, VLAN tags, and bandwidth limits to enforce the right policies for each class of users.

Intrusion Prevention

Protects critical network resources from the latest security threats and vulnerabilities.

Auto VPN

Content Filtering

Advanced Malware Protection

Protect your network against malware using the latest threat intelligence, and identify previously unknown malicious files with retrospective detection.

High Availability & Failover

Provides device and connection integrity through multiple uplinks, warm spare failover, and self-healing VPN.

Application Visibility & Control

Identify which applications are being used, and then prioritize critical apps while limiting recreational apps.

Centralized Management

Seamlessly manage campus-wide WiFi deployments and distributed multi-site networks from a single pane-of-glass.

Try an MX for yourself and discover the power of cloud networking.

MX65/MX65W


MX84


MX100


MX400


MX600