Cisco Meraki MX64 Cloud Managed - security appliance

Mfg.Part: MX64-HW | CDW Part: 3612803 | UNSPSC: 43222501
Availability: 4-6 days
Order fulfilled by a CDW partner.
Warranties
Was $595.00
$367.07 Advertised Price
Advertised Price
Lease Option ($10.83/month) Lease Price Information
Note: Leasing is available to organizations only. Leasing is not available to individuals.
Product Details
  • Security appliance
  • GigE
View Full Product Details
Better Together
Cisco Meraki MX64 Cloud Managed - security appliance
Quick View
Total Price:

Product Overview

Main Features
  • Security appliance
  • GigE
The Meraki MX64 is a cloud-managed network security appliance designed to make distributed networks fast, secure, and easy to manage. Designed for small branch locations and packed with Unified Threat Management (UTM) features like IPS, AV, Content Filtering and VPN, the MX64 is ideal for reducing overall IT cost while enhancing network reliability and security.

Cisco Meraki MX64 Cloud Managed - security appliance is rated3.00 out of5 by4.
Rated 5 out of 5 by from No upgrade pathI have purchased several of Meraki's appliances for 10 offices, but when we tried to consolidate 3 offices in to 1 I wanted to trade in/up 3 smaller MX devices in to a larger unit. NO GO, I had to purchase the larger unit as well as the License key as those are not upgradable. So if you really need to think about where your company is going in the next few years before purchasing this product as you will be left with devices you cannot use.
Date published: 2015-12-02T00:00:00-05:00
Rated 5 out of 5 by from If you need a simple firewall / content filter, maybe...In my opinion, this firewall allows ANY ANY on internal networks by default, does not have many of the features other firewalls in this price range have, and has limited to no value once your license expires.
Date published: 2017-03-28T00:00:00-04:00
Rated 5 out of 5 by from Missing Key Features of a Firewall / ProxyIf you need a simple firewall / content filter and are not hosting any services, using a VPN, or doing really anything other then protecting your network from hackers and browsing the web then the MX64 will be fine. Otherwise I HIGHLY recommend avoiding the Cisco Meraki MX product line.To say the Cisco Meraki MX series is missing some essential features of a firewall/proxy box would be a huge understatement. For example one of their big selling points is how easy it is to setup a site to site VPN. It is pretty easy, I will admit that, but once setup some of the key features are either hard to use or missing completely. For example there is a section called "Site to Site VPN Firewall". You would think this is a firewall to restrict traffic between a site to site VPN and you would be right. However the firewall rules have to be written out per IP address and per port. So if you want bi-directional communication between one of your subnets and one of your remote peers subnet for 10 different ports you have to write 20 rules, 10 from your subnet to theirs for each port and another ten the other way. If you have 5 subnets internally and they have 5 subnets those same 10 ports will now take 500 SEPARATE RULES! It doesn't allow you to put in multiple subnets and ports per line. And if you are doing a Site to Site VPN with a Non-Meraki peer then the site to site firewall doesn't work at all. I talked to tech support (January 2016) about this and they said that is true and its not a "feature that has been implemented yet".The problem is this is one of many features that haven't been implemented. For example the client VPN can be setup a single way, L2TP. It uses Aggressive mode IKE with a preshared key, which by the way fails PCI compliance scans. When asked about this I was told that's the only option and they are not looking to change that.Logging is a big missing one also. You can write firewall rules and the interface lets you see "hits" against each rule but there is no way to see what actually was accepted or blocked by a rule. So if you write all your rules and then you have a Deny rule as your last rule, a industry standard, there is no way to actually log what is hitting the deny rule. There is no way to see whats hitting any rule other then a hit counter. When I asked tech support about that (January 2016) I was told "Oh, just put a allow all rule before your deny rule". *smh*These are examples of the shortcomings I've found in the first month of working with the MX units and I've asked my sales person what the return policy is on it. I have both a MX84 and a MX64 and both have the same limitations and issues. I am coming from a Forefront TMG 2010 server which at 6 years old and going end of life this year has twice the features and is easier to use then this device. This really feels like a incomplete product just thrown on the market and touted as "Cloud Enabled" to make it sell but it's a bunch of smoke and mirrors.
Date published: 2016-01-26T00:00:00-05:00
Rated 5 out of 5 by from Aimed at the SMBThe MX64 is perfect for a small-medium business who has a need for advanced security features and capabilities but does not have the size or labor force to be able to afford a full time Cisco trained network engineer. Easy to use and with powerful features: firewall, site-to-site vpn, client vpn, web filtering, traffic capture, automated alerts. The MX64 doesn't have all the features of a full blown solution, but it has 95+% of what you need at 10% of the cost.I'm particularly fond of being able to pre-configuring a via the cloud and sending it to a remote site directly without needing to route it through the home office first.
Date published: 2016-06-28T00:00:00-04:00