Meraki MX60W MX60W-HW ユーザーズマニュアル

製品コード
MX60W-HW
ページ / 8
Cisco Systems, Inc.  |  660 Alabama St, San Francisco, CA 94110  |  (415) 432-1000  |  sales@meraki.com
2
Cloud Managed Architecture
Built on Cisco Meraki’s award-winning cloud-managed architecture,
the MX is the only 100% cloud-managed networking and security
appliance. MX appliances self-provision, automatically pulling
policies and configuration settings from the cloud. Powerful remote
tools provide network-wide visibility and control, and enable
administration without on-site networking expertise.

Cloud services deliver seamless firmware and security signature
updates, automatically establish site-to-site VPN tunnels, and
provide 24x7 network monitoring. Moreover, the MX’s browser-
based management dashboard completely eliminates the need
for training.
Redundant Power
Reliable, energy
efficient design
WAN Optimization
1TB SATA disk
Multiple Uplink Ports
Link bonding/failover
3G/4G Modem Support
Automatic wireless failover
10Gb Ethernet/SFP+ Ports
For switch connectivity
Enhanced CPU
Layer 3-7 firewall
and traffic shaping
Additional Memory
For content filtering
Inside the Cisco Meraki MX  
MX400 shown, features vary by model
Ironclad Security for Edge Networks
The MX hardware platform is purpose-built for Layer 7 deep packet
inspection, with advanced security features including intrusion
detection (IDS), content filtering, web search filtering, anti-virus / anti-
phishing, and IPsec VPN connectivity, while providing the throughput
and capacity for modern, bandwidth-intensive networks.
Layer 7 fingerprinting technology lets administrators identify
unwanted content and applications and prevent recreational apps
like BitTorrent from wasting precious bandwidth.
The integrated Sourcefire® Snort® engine delivers superior intrusion
detection coverage, a key requirement for PCI 2.0 compliance. The
MX also uses the Webroot® BrightCloud URL categorization database
for CIPA / IWF compliant content-filtering, and Kaspersky® SafeStream
engine for anti-virus / anti-phishing filtering.
Best of all, these industry-leading Layer 7 security engines and
signatures are always kept up-to-date via the cloud, simplifying
network security management and providing peace-of-mind to
IT administrators.
Organization Level Threat Assessment
Cisco Meraki Cloud Management Architecture