Next-Gen Firewall
Next-Gen Firewall
| Layer 7 traffic classification and control
| Intrusion detection engine
| Identity-based and device-aware security
With the proliferation of modern applications and mixed-use networks, host and port based security is no longer sufficient. Cisco Meraki's layer 7 "next generation" firewall, included in MX security appliances and every wireless AP, gives administrators complete control over the users, content, and applications on their network.
Layer 7 traffic classification and control
Meraki's proprietary packet processing engine analyzes network traffic up to and including layer 7, using sophisticated fingerprinting to identify users, content, and applications on the network. Each network flow is categorized, and access control policies are enforced — for example, blocking Netflix and prioritizing video conferencing. By classifying traffic at layer 7, Meraki's next generation firewall controls evasive, encrypted, and peer-to-peer applications, like BitTorrent or Skype, that cannot be controlled by traditional firewalls. Meraki's next generation firewall is included in all wireless access points and security appliances.
Identity-based content filtering
Meraki security appliances feature a powerful category-based content filter, which matches content against millions of URLs in dozens of categories. Meraki's content filtering engine features native Active Directory integration to apply access controls specific to each class of users. Content lists and application signatures are updated dynamically from the cloud, so that security policies remain up to date even as content and applications change.
Device-aware firewall rules
Meraki's wireless firewall includes device-aware access controls, enabling administrators to ensure the appropriate level of network access for each class of devices. Layer 7 device fingerprints automatically detect and classify Apple iOS, Android, Windows, Mac OS, and other clients. These fingerprints are integrated into Meraki's firewall, so that administrators can,
for example, apply firewall rules specific to iPads in a Bring Your Own Device (BYOD) network.