Switches for Any Environment Data Sheet
Meraki Switches combine the simplicity of the cloud-managed dashboard with power of enterprise-grade hardware to cater to the demands from next-gen wired and wireless networks.QoS
for Voice and Video
Access Switches CLICK for Data Sheet: MS120
MS120-8
MS125
Stackable Access Switches CLICK FOR Data Sheet:
MS210
MS225
MS250
MS390
Aggregation Switches CLICK for Data Sheet:
MS410
MS425
MS450
Deploy
latency-sensitive applications such as voice and
video by guaranteeing network performance. Voice and
QoS features such as per-VLAN and protocol-based
prioritization, as well as flexible QoS assignments,
give inuitive, granular control.
Intelligent
use of LLDP on the network makes deploying devices
such as VoIP phones painless. Simply select a VLAN
for voice in the dashboard, and selected ports will
accept tagged traffic on the voice VLAN. The port
also uses LLDP advertisements to recommend devices
use that VLAN for voice traffic.
REMOTE Live Tools and Alerts
MS
Switches make powerful live tools available for
remote troubleshooting at any time. From
infrastructure uptime and performance testing to
device troubleshooting, live tools simplify
day-to-day network administration and dramatically
shorten time to resolution. Built-in Ethernet
cable testing no longer requires an excursion to one
or more switch closets just to verify cable
integrity. Simply select a switch port, run a cable
test, and see results right in the dashboard, even
if there is no device connected on the other
end.Each Meraki MS is automatically monitored 24×7
via the cloud. Email and text message alerts are
configurable to immediately notify administrators of
configuration changes, switch downtime, and even
per-port disconnection events.
Enterprise
Security
Extending
security down to the port level has never been
easier. MS Switches integrate seamlessly with
enterprise-grade security systems using 802.1X.
Define access policies, segregate guest devices, and
quarantine entire environments right from the
dashboard.
Applying
policies on many ports takes just a few clicks —
even if the ports are spread across many switches.
Simply search to find the ports of interest, click
to apply the desired policies, and save your
changes. Policies are pushed immediately to the
desired ports.
Seamless
firmware updates, two factor authentication, and
other built-in protections make secure, PCI and
HIPAA-compliant networks easy and cost
effective.