Meraki Architecture
Does my network traffic flow through Cisco Meraki's cloud infrastructure?
No. Cisco Meraki uses an out of band management architecture, meaning that only management data flows through Cisco Meraki's cloud infrastructure. No user traffic passes through Cisco Meraki's datacenters, and your data stays on your network.
What happens if I can't access Cisco Meraki's cloud?
Your network continues to function normally even if you can't access the cloud. Users can authenticate, firewall rules remain in place, and traffic flows at full line rate. Only management functions – reports, configuration tools, etc. are interrupted.
How do firmware upgrades work? How often do I get new features?
Cisco Meraki provides firmware updates via seamless, over-the-web upgrades. Cisco Meraki releases updates each quarter that contain new features, performance improvements, and other enhancements. Firmware upgrades are delivered securely over the web, which you can reschedule or cancel at any time.
What sized network is most appropriate for Cisco Meraki?
Cisco Meraki's cloud architecture provides a feature set that is rich enough for large enterprise deployments, yet is easy enough to be used by IT generalists without training. Cloud based infrastructure provides cost advantages in both small and large networks, and Cisco Meraki's cloud infrastructure scales seamlessly from small branches to large campus environments and distributed networks.
How do I determine what Cisco Meraki MX Security Appliance is most appropriate for my environment?
Cisco Meraki's MX Sizing Guide is your best source to determine what MX Security Appliance will be appropriate for your environment. Alternatively you may Contact Us and our Cisco Meraki experts will help you select the appropriate model.
How does Cisco Meraki's security compare to traditional network infrastructure?
Cisco Meraki has made major investments in the security of its cloud infrastructure, providing safeguards and tools to all Cisco Meraki customers. For example, Cisco Meraki undergoes daily penetration testing by an independent 3rd party, has received PCI Level 1 certification, and provides numerous security tools to help customers to harden their networks.