Automatic VPN creation
Unique, automatically created VPN connections between sites allow you to securely and easily connect individual branch offices. Using IPsec protocols, the MX can connect branch offices to the central and each other in the same way as a virtual Ethernet cable connects them. Connections between sites can be established with a single click in the Cisco Meraki dashboard. Traditional inter-site VPN configuration issues are eliminated: route discovery, key negotiation, authentication, security rules, encryption maps, and access lists are all handled automatically from the cloud. Whole and split tunnel VPNs can be easily configured.
Control applications, users and devices
MX is designed for modern networks that are used in many ways and provide extensive visibility and control of users, content, and applications. These are more than just simple host- and port-based solutions. The Layer 7 identification method used by the MX appliance also classifies applications that are encrypted or try to avoid identification, including P2P applications. Unwanted web traffic can be blocked by filtering content following CIPA rules, limiting applications that consume a large portion of bandwidth, such as streaming video and P2P. The MX appliance also provides an overview of users on the network and identifies clients by device type (e.g., iPads) and even usernames. It can be controlled to restrict or block users and apply different rules to different classes of users through integration with Active Directory.
Prevention of penetration
Each Cisco Meraki MX device supports unique threat prevention through the integrated Sourcefire module. Networks can be secured from the latest exploits, vulnerabilities, viruses, rootkits, and other threats in seconds, with threat definitions automatically updated to ensure protection from even the latest types of attacks. Data is presented in real-time, so IT administrators can quickly assess the current threat status - and past trends - and make appropriate decisions.
Content filtering
The content filter on the MX appliance is CIPA compliant and allows administrators to block entire categories of content and individual URLs. Integrating with AD allows different content filtering rules to be applied to different groups. The MX appliance automatically refreshes filter lists from the cloud, so your rules will always be up-to-date, even if the website changes. Integrated Google SafeSearch and YouTube for School technologies allow you to create a secure learning environment without adding additional devices or complex configuration
WAN optimization
Zařízení MX umožňuje nároky aplikací na šířku pásma v rámci lokality až o 99% zrychlit provoz využívající protokoly CIFS, FTP, http a TCP. Nejnovější modul pro optimalizaci WAN využívá pokročilé algoritmy, odstraňování duplicit, kompresi a mazipaměť na bázi pevného disku k tomu, aby byla síť WAN stejně rychlá a výkonná jako LAN. Integrovaná webová mezipaměť výrazně zrychluje fungování webu pro uživatele, kteří sledují videa nebo používají online aplikace
Application-aware firewall
An integrated firewall that protects your network's application from malicious entities. It's no longer enough to block protocols, hosts, and ports - the firewall must also consider users, content, and applications. It protects your network with an Integrated Prevention System (IPS) and Snort-based intrusion prevention, including signature, protocol, anomaly, and threat isolation. Custom rules can be used to secure the network, allowing only approved services and connections. With a single click, you can easily segregate voice, video, and data traffic and deploy global rules across VPNs