Meraki MR34 Cloud Managed AP MR34-HW 数据表
产品代码
MR34-HW
Cisco Systems, Inc. | 500 Terry A. Francois Blvd, San Francisco, CA 94158 | (415) 432-1000 | sales@meraki.com
5
Client Location Tracking
Device Reporting and Analytics
Device-Based Group Policies
Auto-Tunneling VPN Technology
Leveraging the Meraki cloud architecture, site-to-site VPNs can be
enabled via a single click without any command-line configurations
or multi-step key permission setups; Meraki cloud management
automatically tunnels, hole punches, and configures devices to
eliminate the complexity seen in traditional VPN setups. Complete
with IPsec encryption, deploy the following architectural setups
within minutes:
enabled via a single click without any command-line configurations
or multi-step key permission setups; Meraki cloud management
automatically tunnels, hole punches, and configures devices to
eliminate the complexity seen in traditional VPN setups. Complete
with IPsec encryption, deploy the following architectural setups
within minutes:
• Teleworker VPN: Securely extend the corporate LAN to remote
sites wirelessly, using the MR series with your own server or a
Meraki MX
Meraki MX
• Site-to-site VPN: Multi-branch VPN w/ WAN optimization and
Content Filtering (using Meraki MX Security Appliance)
• Secure roaming: Layer 2 and layer 3 roaming for large campus
environments
Distributed Packet Processing
Meraki devices execute packet processing at the edge. Each wireless
access point features a high performance CPU that enforces layer
3-7 firewall policies, application QoS, network access control (NAC),
and more. Meraki networks scale seamlessly: add capacity by simply
deploying more APs, without concern for controller bottlenecks or
choke points.
access point features a high performance CPU that enforces layer
3-7 firewall policies, application QoS, network access control (NAC),
and more. Meraki networks scale seamlessly: add capacity by simply
deploying more APs, without concern for controller bottlenecks or
choke points.
Every Meraki wireless access point is built with the packet
processing resources to secure and control its client traffic, without
need for a wireless LAN controller. Meraki APs are built with a high
performance CPU, hardware-accelerated encryption, and extended
memory resources to implement stateful firewall policies, voice and
video optimization, and even layer 7 traffic classification and QoS.
processing resources to secure and control its client traffic, without
need for a wireless LAN controller. Meraki APs are built with a high
performance CPU, hardware-accelerated encryption, and extended
memory resources to implement stateful firewall policies, voice and
video optimization, and even layer 7 traffic classification and QoS.