Meraki MX85 Router/Security Appliance
What is Pre-Order / Special Order
What is Pre-Order / Special Order
We are just not quite the same as many of the other online stores. I know it is easy to say that, but we just aren't.
The Tech Geeks, under their parent company Twelve Times (Worldwide) Pty Ltd trade in Australia, New Zealand and the United Kingdom.
This allows us to purchase stock from suppliers from locations where they have it available. We are then able to import those products directly, along with providing localised Warranty and Replacement as required.
We only list items that we know have been, or are about to be released to us and since we purchase only in small batches these are often flown in on short time frames.
We list on each product our expected shipments and ones that we have already sent out to customers. Please use these dates as a guideline as we always suggest 14-21 days just to allow for air freight or customs hold ups.
Description
Description
A building block for SASE in a rack-mountable form factor. Small to medium branch security and SD-WAN appliance for up to 250 users.
A valid Meraki licence is needed for this device to function
The Meraki MX85 Cloud Managed Security Firewall Appliance is a multifunctional security and SD-WAN enterprise appliance with a wide set of capabilities to address multiple use cases.
Organisations across all industries with up to 250 employees can rely on the MX85 to deliver secure connectivity to hub locations or multi-cloud environments, as well as application quality of experience (QoE), through advanced analytics with machine learning.
Features:
End-to-end health of web applications at-a-glance across the LAN, WAN, and application server.
Machine-learned smart application thresholds autonomously applied to identify true anomalies based on past behavioural patterns.
Monitor the health of all MX85 WAN links, including cellular, across your entire organisation.
Detailed hop-by-hop VoIP performance analysis across all uplinks.
Next-gen layer 7 firewall for identity-based security policies and application management.
Advanced Malware Protection with sandboxing; file reputation-based protection engine powered by Cisco AMP.
Intrusion prevention: PCI-compliant IPS sensor using industry-leading SNORT signature database from Cisco.
Granular and automatically updated category-based content filtering.
Other capabilities: SSL decryption/inspection, data loss prevention (DLP), cloud access security broker (CASB), SaaS tenant restrictions, granular app control, file type control.
Built-in DHCP, NAT, QoS, and VLAN management services.
Web caching to accelerate frequently accessed content.
Load balancing to combine multiple WAN links into a single high-speed interface, with policies for QoS, traffic shaping, and failover.
Smart connection monitoring provides automatic detection of layer 2 and layer 3 outages and fast failover, including the option of integrated LTE Advanced or 3G/4G modems.
Unified firewall, switching, wireless LAN, and mobile device management through an intuitive web-based dashboard.
Template-based settings scale easily from small deployments to tens of thousands of devices.
Role-based administration, configurable email alerts for a variety of important events, and easily auditable change logs.
Summary reports with user, device, and application usage details archived in the cloud.
Auto VPN allows automatic VPN route generation using IKE/ IKEv2/IPsec setup; runs on physical MX85 appliances and as a virtual instance in public and private clouds.
SD-WAN with active/active VPN, policy-based-routing, dynamic VPN path selection, and support for application-layer performance profiles to ensure prioritisation of applications types that matter.
Interoperates with all IPsec VPN devices and services.
Automated MPLS to VPN failover within seconds of a connection failure.
L2TP IPsec remote client VPN included at no extra cost with support for native Windows, Mac OS X, iPad, and Android clients.
Support for Cisco AnyConnect remote client VPN (AnyConnect licence required, sold separately).
Payment & Security
Payment methods
Your payment information is processed securely. We do not store credit card details nor have access to your credit card information.