
Firewall ConFiguraTion
Security features enabled:
• VPN concentrator mode
• Full-tunnel VPN
• WAN optimization
TesT TraFFiC paTTern
All traffic is via VPN, including HTTP/S for Web browsing and
download, and considerable amount of file transfers to simulate
backup and other corporate data exchange.
MX60 / MX60W
MX80
MX100
MX400
MX600
Max VPN throughput
40Mbps
70Mbps
200Mbps
500Mbps
1Gbps
Max per-tunnel VPN
throughput
15Mbps
40Mbps
50Mbps
100Mbps
100Mbps
Max VPN Sessions
25
50
250
1,000
5,000
100% VPN
30% HTTP
30% HTTPS
40% FTP
ThroughpuT ConFiguraTion
USE CASE:
Head-end concentrator for retail branches
MX is deployed in the datacenter as a one-armed VPN / WAN optimization aggregator,
possibly as an Active / Passive HA pair.
Conclusion
While every network will have a unique traffic pattern, this guide highlights a few common
scenarios to help you choose the right Cisco Meraki MX product for your environment.
Consider planning for future growth by allocating buffer room in your firewall selection
(e.g., if you currently have 550 users, choose an MX that supports 1000 users). This will
ensure that you can continue enabling additional security and network features as they
become available. Also considering ISP speeds are increasing 29% year over year, it is
important to choose a firewall that will serve you well over many years.
Cisco Systems, Inc. | 500 Terry A. Francois Blvd, San Francisco, CA 94158 | (415) 432-1000 | [email protected]
8