Cisco Meraki MX系列 Security APPliances:
- 技术特性
- 产品对比
- 技术参数
100% centralized cloud management for security, networking, & application control
Safety, Fast.
Remotely deploy Cisco Meraki Security Appliances in minutes through zero-touch cloud provisioning. Synchronize security settings across thousands of sites using templates. Securely connect branch locations in 3 clicks in Meraki's intuitive, web-based dashboard.
Secure a Site in Minutes
Add Meraki Security Appliance to dashboard.
Enable intrusion prevention.
Select desired threat protection level.
Comprehensive Security in a Single Box
Every Meraki Security Appliance supports several features, like a stateful firewall and integrated Sourcefire intrusion prevention (IPS) engine, to secure your networks. Threat definitions and filter lists are seamlessly updated, ensuring every MX has bleeding-edge protection from the latest vulnerabilities and troublesome websites.
Intuitive, Centralized Management
The Meraki dashboard provides deep visibility and control over all of your Security Appliances from any Internet-accessible device, anytime, anywhere. View networked clients, bandwidth consumption, and application usage across all sites—and push policies to block, shape, or whitelist activity to optimize performance and user experience.
Fault Tolerant
Redundancy is built into the MX several times over: from dual WAN and cellular uplinks to keep your MX connected to the Internet, to warm spare failover that ensures device integrity, to self-healing site-to-site VPN that keeps branch locations securely connected.
SD-WAN
Built-in Software-defined WAN capabilities lower operational costs and improve resource usage for multi-site deployments, allowing network administrators to use available bandwidth more efficiently and ensure the highest possible level of performance for critical applications without sacrificing security or data privacy.
The Meraki security solution includes a complete, robust feature set right out of the box. No additional purchase required.
Identity-Based Firewall
Automatically assigns firewall and traffic shaping rules, VLAN tags, and bandwidth limits to enforce the right policies for each class of users.
Intrusion Prevention
Protects critical network resources from the latest security threats and vulnerabilities.
Auto VPN
Content Filtering
Advanced Malware Protection
Protect your network against malware using the latest threat intelligence, and identify previously unknown malicious files with retrospective detection.
High Availability & Failover
Provides device and connection integrity through multiple uplinks, warm spare failover, and self-healing VPN.
Application Visibility & Control
Identify which applications are being used, and then prioritize critical apps while limiting recreational apps.
Centralized Management
Seamlessly manage campus-wide WiFi deployments and distributed multi-site networks from a single pane-of-glass.
Try an MX for yourself and discover the power of cloud networking.
MX65/MX65W
MX84
MX100
MX400
MX600