Tuesday, October 15, 2024
 
  • Wi-Fi Installation

    Pavestone Main Building

    802.11 Root Bridges

    Visit the Showcase

  • Wi-Fi Installation

    Pavestone Plant 1

    802.11 Bridge

    Visit the Showcase

  • Wi-Fi Installation - Airport Bridges

    Airport Bridges Layout

    Two Wireless Bridges Installed

    Visit the Showcase

  • Wi-Fi Installation - Airport Bridges

    Main Building Installation

    802.11 Root Bridge for the Hanger Expansion

    Visit the Showcase

  • Wi-Fi Installation - Airport Bridges

    Hanger Expansion

    Clear Line of Sight from the Main Building to the New Hanger Space

    Visit the Showcase

  • Wi-Fi Installation - Airport Bridges

    Hanger Bridge Installation

    802.11 Outdoor Bridge with Integrated Antenna

    Visit the Showcase

  • Wi-Fi Installation - Airport Bridges

    Dual Bridge Installation on Engineering Building

    One of Two 802.11 Non-Root Bridges

    Visit the Showcase

  • Wi-Fi Installation - Airport Bridges

    Installation Complete!

    802.11 Non-Root Bridge

    Visit the Showcase

    
 
 Meraki Solutions

Cloud Networking Architecture

Wireless
   - MR30H
   - MR33
   - MR42
   - MR52
   - MR53
   - MR74
   - MR84
   - Z1

Security

Switching

Communications

Security Cameras

 
    Cloud Managed Security
 

100% centralized cloud management for security, networking, and application control

Cloud Managed Security

Safety, Fast.

Remotely deploy Cisco Meraki Security Appliances in minutes through zero-touch cloud provisioning. Synchronize security settings across thousands of sites using templates. Securely connect branch locations in 3 clicks in Meraki’s intuitive, web-based dashboard.

Secure a Site  in Minutes

  1. Add Meraki Security Appliance to dashboard.
  2. Enable intrusion prevention.
  3. Select desired threat protection level.

Comprehensive Security  in a Single Box

Every Meraki Security Appliance supports several features, like a stateful firewall and integrated Sourcefire intrusion prevention (IPS) engine, to secure your networks. Threat definitions and filter lists are seamlessly updated, ensuring every MX has bleeding-edge protection from the latest vulnerabilities and troublesome websites.

Fault Tolerance

Redundancy is built into the MX several times over: from dual WAN and cellular uplinks to keep your MX connected to the Internet, to warm spare failover that ensures device integrity, to self-healing site-to-site VPN that keeps branch locations securely connected.

Intuitive Centralized Management

The Meraki dashboard provides deep visibility and control over all of your Security Appliances from any Internet-accessible device, anytime, anywhere. View networked clients, bandwidth consumption, and application usage across all sites—and push policies to block, shape, or whitelist activity to optimize performance and user experience.

The Meraki MX includes a complete, robust feature set right out of the box. No additional purchase required.

Identity-Based Firewall

Automatically assigns firewall and traffic shaping rules, VLAN tags, and bandwidth limits to enforce the right policies for each class of users.

Intrusion  Prevention

Protects critical network resources from the latest security threats and vulnerabilities.

Auto  VPN

Securely connects branch locations using mesh or hub-and-spoke topologies.

Content  Filtering

Block undesirable web content across 70+ categories, and leverage cloud lookups to filter billions of URLs.

Advanced Malware Protection

Protect your network against malware using the latest threat intelligence, and identify previously unknown malicious files with retrospective detection.

High Availability  & Failover

Provides device and connection integrity through multiple uplinks, warm spare failover, and self-healing VPN.

Application  Visibility & Control

Identify which applications are being used, and then prioritize critical apps while limiting recreational apps.

Centralized Management

Seamlessly manage campus-wide WiFi deployments and distributed multi-site networks from a single pane-of-glass.

Enterprise License

Stateful firewall, Site to site VPN, Client VPN, Branch routing, Link bonding and failover Application contro,l Web caching

Advanced Security License

All enterprise features, plus:

Content filtering, Google SafeSearch, YouTube for Schools, Intrusion prevention (IPS), Anti-Virus and Anti-Phishing, Geo-based IP rules

All MX Security Appliances include upgrades, phone support, and a lifetime warranty at no additional cost.

Models

MX64

INTERFACES: 5 × GbE USB 3G/4G
FIREWALL THROUGHPUT: 250 Mbps
VPN THROUGHPUT: 100 Mbps
RECOMMENDED CLIENTS: 50
LIST PRICE:    $595

MX64W

INTERFACES: 5 × GbE 802.11ac/n WiFi USB 3G/4G
FIREWALL THROUGHPUT: 250 Mbps
VPN THROUGHPUT: 100 Mbps
RECOMMENDED CLIENTS: 50
LIST PRICE:    $945

MX65

INTERFACES: 12 × GbE (2 PoE+) USB 3G/4G
FIREWALL THROUGHPUT: 250 Mbps
VPN THROUGHPUT: 100 Mbps
RECOMMENDED CLIENTS: 50
LIST PRICE:   $945

MX65W

INTERFACES: 12 × GbE (2 PoE+) 802.11ac/n WiFi USB 3G/4G
FIREWALL THROUGHPUT: 250 Mbps
VPN THROUGHPUT: 100 Mbps
RECOMMENDED CLIENTS: 50
LIST PRICE:   $1,245

MX84

INTERFACES: 10 × GbE 2 × SFP USB 3G/4G
FIREWALL THROUGHPUT: 500 Mbps
VPN THROUGHPUT: 250 Mbps
RECOMMENDED CLIENTS: 200
LIST PRICE:    $1,995

MX100

INTERFACES: 9 × GbE 2 × SFP USB 3G/4G
FIREWALL THROUGHPUT: 750 Mbps
VPN THROUGHPUT: 500 Mbps
RECOMMENDED CLIENTS: 500
LIST PRICE:    $4,995

MX400

INTERFACES:  Up to 20 × GbE Up to 16 × SFP Up to 4 × SFP+ USB 3G/4G
FIREWALL THROUGHPUT: 1 Gbps
VPN THROUGHPUT: 1 Gbps
RECOMMENDED CLIENTS: 2,000
LIST PRICE:    $15,995.00

MX600

INTERFACES: Up to 20 × GbE Up to 16 × SFP Up to 4 × SFP+ USB 3G/4G
FIREWALL THROUGHPUT: 1 Gbps
VPN THROUGHPUT: 1 Gbps
RECOMMENDED CLIENTS:  10,000
LIST PRICE:    $31,995.00

* North American list price shown. International pricing, discounts and promotions available through Meraki authorized resellers. 

RHO Wireless recommends the Meraki Solution because you need a
wireless network that Simply Work!

  Contact Us for a Quotation  
 
Copyright 2019 by Onre' Productions      Terms of Use     Privacy Statement