Specification Sheet

Cisco Systems, Inc. | 500 Terry A. Francois Blvd, San Francisco, CA 94158 | (415) 432-1000 | sales@meraki.com
2
Cloud Managed Architecture
Built on Cisco Meraki’s award-winning cloud-managed architecture,
the MX is the industry’s only 100% cloud-managed Unified Threat
Management appliance. MX appliances self-provision, automatically
pulling policies and configuration settings from the cloud. Powerful
remote management tools provide network-wide visibility and
control, and enable administration without the need for on-site
networking expertise.
Cloud services deliver seamless firmware and security signature
updates, automatically establish site-to-site VPN tunnels, and
provide 24x7 network monitoring. Moreover, the MX’s intuitive
browser-based management interface removes the need for
expensive and time-consuming training.
Redundant Power
Reliable, energy
ecient design
Web Caching
1TB SATA disk
Multiple Uplink Ports
Link bonding/failover
3G/4G Modem Support
Automatic wireless failover
10Gb Ethernet/SFP+ Ports
For switch connectivity
Enhanced CPU
Layer 3-7 firewall
and trac shaping
Additional Memory
For content filtering
INSIDE THE CISCO MERAKI MX
MX400 shown, features vary by model
Ironclad Security
The MX platform has an extensive suite of security features including
IPS, content filtering, web search filtering, anti-virus / anti-phishing,
geo-IP based firewalling and IPsec VPN connectivity, while providing
the performance required for modern, bandwidth-intensive networks.
Layer 7 fingerprinting technology lets administrators identify
unwanted content and applications and prevent recreational apps
like BitTorrent from wasting precious bandwidth.
The integrated Sourcefire SNORT® engine delivers superior intrusion
prevention coverage, a key requirement for PCI 3.0 compliance. The
MX also uses the Webroot BrightCloud® URL categorization database
for CIPA / IWF compliant content-filtering, Kaspersky Safestream II®
engine for anti-virus / anti-phishing, and MaxMind for geo-IP based
security rules.
Best of all, these industry-leading Layer 7 security engines and
signatures are always kept up-to-date via the cloud, simplifying
network security management and providing peace of mind to
IT administrators.
Organization Level Threat AssessmentCisco Meraki Cloud Management Architecture