Meraki LIC-MX60W-SEC-3YR Fiche De Données

Page de 7
Cisco Systems, Inc.  |  500 Terry A. Francois Blvd, San Francisco, CA 94158  |  (415) 432-1000  |  sales@meraki.com
2
Cloud Managed Architecture
Built on Cisco Meraki’s award-winning cloud-managed architecture,
the MX is the only 100% cloud-managed Unified Threat Management
appliance. MX appliances self-provision, automatically pulling
policies and configuration settings from the cloud. Powerful remote
tools provide network-wide visibility and control, and enable
administration without on-site networking expertise.

Cloud services deliver seamless firmware and security signature
updates, automatically establish site-to-site VPN tunnels, and
provide 24x7 network monitoring. Moreover, the MX’s browser-
based management dashboard completely eliminates the need
for training.
Redundant Power
Reliable, energy
efficient design
WAN Optimization
1TB SATA disk
Multiple Uplink Ports
Link bonding/failover
3G/4G Modem Support
Automatic wireless failover
10Gb Ethernet/SFP+ Ports
For switch connectivity
Enhanced CPU
Layer 3-7 firewall
and traffic shaping
Additional Memory
For content filtering
Inside the Cisco Meraki MX  
MX400 shown, features vary by model
Ironclad Security for Edge Networks
The MX hardware platform is purpose-built for Layer 7 deep packet
inspection, with advanced security features including IPS, content
filtering, web search filtering, anti-virus / anti-phishing, and IPsec VPN
connectivity, while providing the throughput and capacity for modern,
bandwidth-intensive networks.
Layer 7 fingerprinting technology lets administrators identify
unwanted content and applications and prevent recreational apps
like BitTorrent from wasting precious bandwidth.
The integrated Sourcefire SNORT® engine delivers superior intrusion
prevention coverage, a key requirement for PCI 2.0 compliance. The
MX also uses the Webroot® BrightCloud URL categorization database
for CIPA / IWF compliant content-filtering, and Kaspersky® SafeStream
engine for anti-virus / anti-phishing filtering.
Best of all, these industry-leading Layer 7 security engines and
signatures are always kept up-to-date via the cloud, simplifying
network security management and providing peace-of-mind to
IT administrators.
Organization Level Threat Assessment
Cisco Meraki Cloud Management Architecture