{"id":15242,"date":"2020-03-17T14:49:13","date_gmt":"2020-03-17T19:49:13","guid":{"rendered":"https:\/\/www.firewalls.com\/blog\/?p=15242"},"modified":"2025-12-19T09:07:22","modified_gmt":"2025-12-19T14:07:22","slug":"cisco-meraki-firewalls","status":"publish","type":"post","link":"https:\/\/www.firewalls.com\/blog\/cisco-meraki-firewalls\/","title":{"rendered":"How to Choose a Cisco Meraki Firewall for your Small Business"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"15242\" class=\"elementor elementor-15242\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f6ca666 e-flex e-con-boxed e-con e-parent\" data-id=\"f6ca666\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-186bc02f elementor-widget elementor-widget-text-editor\" data-id=\"186bc02f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h1>Shopping for Cisco Meraki MX Firewalls<\/h1><p><a href=\"https:\/\/www.firewalls.com\/brands\/cisco-meraki\/firewalls.html\" target=\"_blank\" rel=\"noopener noreferrer\">Cisco Meraki MX Security &amp; SD-WAN Appliances<\/a> (or as we affectionately call them: firewalls) provide Unified Threat Management for small businesses, branch offices, datacenters, and distributed enterprise environments. 100% cloud managed and filled to the brim with comprehensive security features, Cisco Meraki firewalls reduce complexity and save money by eliminating the need for multiple appliances.<\/p><h3>Why Meraki Firewalls?<\/h3><p>As small businesses explore digital transformation and all the advanced security and networking that it offers, automated services become more important. Cisco Meraki MX firewalls make intelligent site-to-site VPN easy with Auto VPN. Auto VPN automatically generates VPN routes using IKE\/IPSec that can connect with all IPSec VPN devices and services. Automated MPLS to VPN failover in case of a connection failure is resolved in a matter of seconds, minimizing downtime over remote access.<\/p><h3>\u00a0<\/h3><p><a href=\"https:\/\/www.firewalls.com\/blog\/sd-wan-migration\/\" target=\"_blank\" rel=\"noopener noreferrer\">SD-WAN is another key aspect of digital transformation<\/a> and Cisco Meraki includes SD-WAN capabilities with each firewall. Software-defined WAN lowers operational costs and improves performance of remotely-accessed resources. Policy-based routing, support for application-layer profiles, active\/active VPN, and dynamic path selection ensure the apps and services your employees use most are always available.<\/p><p>Cisco Meraki MX firewalls include all the advanced security services you expect out of a next generation firewall: intrusion prevention powered by Cisco-developed <a href=\"https:\/\/www.snort.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">SNORT<\/a>, <a href=\"https:\/\/www.firewalls.com\/blog\/content-filtering\/\" target=\"_blank\" rel=\"noopener noreferrer\">content filtering<\/a>, anti-malware, geo-based firewalling, remote access connectivity, and advanced malware protection. Layer 7 fingerprinting allows small businesses to identify PUAs and unproductive content so that company bandwidth isn&#8217;t wasted on time-wasters like BitTorrent.<\/p><h3>Choosing a Cisco Meraki MX Firewall<\/h3><p>It can be a challenge to spot the difference between two similar firewalls, but the devil is always in the details. Here are a few key differentiators between <a href=\"https:\/\/www.firewalls.com\/brands\/cisco-meraki\/firewalls.html\" target=\"_blank\" rel=\"noopener noreferrer\">Cisco Meraki firewalls<\/a> to help you decide which device is right for your network.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f704e5f elementor-widget elementor-widget-image\" data-id=\"f704e5f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"315\" height=\"160\" src=\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/03\/download.jpg\" class=\"attachment-full size-full wp-image-15243\" alt=\"\" srcset=\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/03\/download.jpg 315w, https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/03\/download-300x152.jpg 300w\" sizes=\"(max-width: 315px) 100vw, 315px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-96f8382 elementor-widget elementor-widget-text-editor\" data-id=\"96f8382\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4><strong>Power of Ethernet<\/strong><\/h4><p>The\u00a0<a href=\"https:\/\/www.firewalls.com\/brands\/cisco-meraki\/cisco-meraki-firewalls\/meraki-mx68.html\" target=\"_blank\" rel=\"noopener noreferrer\">Cisco Meraki MX68<\/a> includes Power-over-Ethernet capabilities. The rear of these MX firewall models feature a pair of 802.3at (PoE+) ports. With them, you get built-in power supply capabilities for tricky installations where outlets may be unavailable. These two 802.3at ports provide a total of 60W power. In other words, you can leave the AC adapters at home.<\/p><h4><strong>Integrated 802.11ac Wave 2 Wireless<\/strong><\/h4><p>The <a href=\"https:\/\/www.firewalls.com\/meraki-mx67w-router-appliance-only-with-802-11ac.html\" target=\"_blank\" rel=\"noopener noreferrer\">MX67W<\/a> and <a href=\"https:\/\/www.firewalls.com\/meraki-mx68w-router-appliance-only-with-802-11ac.html\" target=\"_blank\" rel=\"noopener noreferrer\">MX68W<\/a> provide wireless firewalling capabilities, integrating Cisco Meraki&#8217;s industry-recognized wireless technology in an SMB-friendly compact form factor. Enjoy unified central management of all network security and wireless devices.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e14fa72 elementor-widget elementor-widget-image\" data-id=\"e14fa72\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.firewalls.com\/\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"900\" height=\"150\" data-src=\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2025\/01\/Blog-Banner-General-Buy-Now-Red-High-Quality.jpg\" class=\"attachment-full size-full wp-image-18860 lazyload\" alt=\"Blog-Banner-General-Buy-Now-Red-High-Quality\" data-srcset=\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2025\/01\/Blog-Banner-General-Buy-Now-Red-High-Quality.jpg 900w, https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2025\/01\/Blog-Banner-General-Buy-Now-Red-High-Quality-300x50.jpg 300w, https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2025\/01\/Blog-Banner-General-Buy-Now-Red-High-Quality-768x128.jpg 768w\" data-sizes=\"(max-width: 900px) 100vw, 900px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 900px; --smush-placeholder-aspect-ratio: 900\/150;\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8412d4c elementor-widget elementor-widget-text-editor\" data-id=\"8412d4c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4><strong>Meraki vMX100 Virtual Firewall<\/strong><\/h4><p>Virtual firewalls provide the benefit of simple configurations and appliance-less deployment. The <a href=\"https:\/\/www.firewalls.com\/brands\/cisco-meraki\/firewalls\/vmx100.html\" target=\"_blank\" rel=\"noopener noreferrer\">Meraki vMX100<\/a> is added via Amazon Web Services or Azure and configured directly in the Meraki dashboard, just as you would manage any other MX firewall appliance. Licensing only&#8211;no on-premise equipment required!<\/p><h4><strong>Cisco Meraki MX64 vs MX65<\/strong><\/h4><p>At first glance, these two models look pretty similar. Both clock in at 200 Mbps of Advanced Security Throughput (when the full range of intelligent security services are operating). They also offer 100 Mbps of VPN Throughput. The <a href=\"https:\/\/www.firewalls.com\/brands\/cisco-meraki\/firewalls\/mx64.html\" target=\"_blank\" rel=\"noopener noreferrer\">MX64<\/a> can be converted to support WAN and includes 3 dedicated GbE RJ45 interfaces. Why aren&#8217;t we talking more about the MX65? Because it reached end of sale in 2019 and is no longer available. If you&#8217;re looking for something comparable &#8211; the MX68 is your best bet.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1c9f917 elementor-widget elementor-widget-image\" data-id=\"1c9f917\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"164\" data-src=\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/03\/mx68.png\" class=\"attachment-full size-full wp-image-15245 lazyload\" alt=\"\" data-srcset=\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/03\/mx68.png 800w, https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/03\/mx68-300x62.png 300w, https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/03\/mx68-768x157.png 768w\" data-sizes=\"(max-width: 800px) 100vw, 800px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 800px; --smush-placeholder-aspect-ratio: 800\/164;\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6c0f0e1 elementor-widget elementor-widget-text-editor\" data-id=\"6c0f0e1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3><strong>Cisco Meraki MX67 and MX68<\/strong><\/h3><p><a href=\"https:\/\/www.firewalls.com\/brands\/cisco-meraki\/firewalls\/mx67.html\" target=\"_blank\" rel=\"noopener noreferrer\">Meraki MX67<\/a> and <a href=\"https:\/\/www.firewalls.com\/brands\/cisco-meraki\/firewalls\/mx68.html\" target=\"_blank\" rel=\"noopener noreferrer\">MX68 firewalls<\/a> are designed with built-in cellular modems that simplify deployments requiring a cellular uplink backup. This kind of cellular uplink infrastructure is ideal for remote locations that rely on continuous WAN circuits. That is to say, where you need high availability and redundancy, the cellular uplink provides a valuable backup.<\/p><p>The MX68 includes the Power of Ethernet capabilities described in the section above as well as dual WAN interfaces and 10 LAN RJ45 interfaces. On the other hand, the MX67 includes only one dedicated WAN interface and three LAN RJ45 interfaces.<\/p><p><strong>Meraki MX84, MX100, MX250, &amp; MX450<\/strong><\/p><p>The <a href=\"https:\/\/www.firewalls.com\/brands\/cisco-meraki\/firewalls.html\" target=\"_blank\" rel=\"noopener noreferrer\">Cisco Meraki MX84 and above appliances<\/a> pack a bit more punch behind their security performance.<\/p><ul><li style=\"list-style-type: none;\"><ul><li>MX84 Recommended Users &amp; VPN Throughput: <strong>200 users, 250 Mbps<\/strong><\/li><li>MX100 Recommended Users &amp; VPN Throughput: <strong>500 users, 500 Mbps<\/strong><\/li><li>MX250 Recommended Users &amp; VPN Throughput: <strong>2,000 users, 1.0 Gbps<\/strong><\/li><li>MX450 Recommended Users &amp; VPN Throughput: <strong>10,000 users, 2.0 Gbps<\/strong><\/li><\/ul><\/li><\/ul><p>In sum, it&#8217;s clear these models are designed for medium branches and enterprise networks. With top-end speeds up to 6.0 Gbps of stateful firewall inspection, the advanced security technology behind <a href=\"https:\/\/www.firewalls.com\/brands\/cisco-meraki\/firewalls.html\" target=\"_blank\" rel=\"noopener noreferrer\">Cisco Meraki MX firewalls<\/a> bring serious security and performance.<\/p><h3>\u00a0<\/h3><h3>Advanced Security Licenses and Support<\/h3><p style=\"text-align: left;\">Check out our <a href=\"https:\/\/www.firewalls.com\/licensing.html\" target=\"_blank\" rel=\"noopener noreferrer\">Renewals &amp; Licensing<\/a> wizard to find advanced security licenses for Cisco Meraki MX firewalls like <a href=\"https:\/\/documentation.meraki.com\/MX\/Other_Topics\/MX_Security_Appliance_FAQ#Advanced_Security\" target=\"_blank\" rel=\"noopener noreferrer\">Cisco Meraki Advanced Security Licensing<\/a>.<\/p><p><a href=\"https:\/\/www.firewalls.com\/brands\/cisco-meraki\/firewalls.html\" target=\"_blank\" rel=\"noopener noreferrer\"><button class=\"btn btn-primary\">Shop Cisco Meraki MX Firewalls<\/button><\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Choosing a Cisco Meraki MX firewall can be a challenge when you can&#8217;t find the fine details. Check out our breakdown of the MX64, MX67, MX68, &#038; more.<\/p>\n","protected":false},"author":5,"featured_media":27394,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[601,597],"tags":[],"class_list":["post-15242","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cisco-meraki","category-firewalls"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to Choose a Cisco Meraki Firewall for your Small Business - Firewalls.com<\/title>\n<meta name=\"description\" content=\"Choosing a Cisco Meraki MX firewall can be a challenge when you can&#039;t find the fine details. Check out our breakdown of the MX64, MX67, Mx68, &amp; more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.firewalls.com\/blog\/cisco-meraki-firewalls\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Choose a Cisco Meraki Firewall for your Small Business - Firewalls.com\" \/>\n<meta property=\"og:description\" content=\"Choosing a Cisco Meraki MX firewall can be a challenge when you can&#039;t find the fine details. Check out our breakdown of the MX64, MX67, Mx68, &amp; more.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.firewalls.com\/blog\/cisco-meraki-firewalls\/\" \/>\n<meta property=\"og:site_name\" content=\"Firewalls.com\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/firewallscom\" \/>\n<meta property=\"article:published_time\" content=\"2020-03-17T19:49:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-19T14:07:22+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/03\/Blog-Header-image.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1120\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Andrew Harmon\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@firewallscom\" \/>\n<meta name=\"twitter:site\" content=\"@firewallscom\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Andrew Harmon\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/cisco-meraki-firewalls\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/cisco-meraki-firewalls\\\/\"},\"author\":{\"name\":\"Andrew Harmon\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#\\\/schema\\\/person\\\/8e89a2f96065af1717d00dfd06dca962\"},\"headline\":\"How to Choose a Cisco Meraki Firewall for your Small Business\",\"datePublished\":\"2020-03-17T19:49:13+00:00\",\"dateModified\":\"2025-12-19T14:07:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/cisco-meraki-firewalls\\\/\"},\"wordCount\":769,\"publisher\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/cisco-meraki-firewalls\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/Blog-Header-image.png\",\"articleSection\":[\"Cisco Meraki\",\"Firewalls\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/cisco-meraki-firewalls\\\/\",\"url\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/cisco-meraki-firewalls\\\/\",\"name\":\"How to Choose a Cisco Meraki Firewall for your Small Business - Firewalls.com\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/cisco-meraki-firewalls\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/cisco-meraki-firewalls\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/Blog-Header-image.png\",\"datePublished\":\"2020-03-17T19:49:13+00:00\",\"dateModified\":\"2025-12-19T14:07:22+00:00\",\"description\":\"Choosing a Cisco Meraki MX firewall can be a challenge when you can't find the fine details. Check out our breakdown of the MX64, MX67, Mx68, & more.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/cisco-meraki-firewalls\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/cisco-meraki-firewalls\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/cisco-meraki-firewalls\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/Blog-Header-image.png\",\"contentUrl\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/Blog-Header-image.png\",\"width\":1120,\"height\":630,\"caption\":\"Cisco Meraki MX Firewalls\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/cisco-meraki-firewalls\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Choose a Cisco Meraki Firewall for your Small Business\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/\",\"name\":\"Firewalls.com\",\"description\":\"Your Home For Cyber Security News, Stories, &amp; Tutorials\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#organization\",\"name\":\"Firewalls.com\",\"url\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/08\\\/BrandedLogo-TagLineBelow.png\",\"contentUrl\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/08\\\/BrandedLogo-TagLineBelow.png\",\"width\":365,\"height\":85,\"caption\":\"Firewalls.com\"},\"image\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"http:\\\/\\\/www.facebook.com\\\/firewallscom\",\"https:\\\/\\\/x.com\\\/firewallscom\",\"https:\\\/\\\/www.linkedin.com\\\/company-beta\\\/1439857\\\/\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/firewallsDotCom\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#\\\/schema\\\/person\\\/8e89a2f96065af1717d00dfd06dca962\",\"name\":\"Andrew Harmon\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g\",\"caption\":\"Andrew Harmon\"},\"description\":\"Andrew Harmon was the Director of Marketing for Firewalls.com, co-host of the Ping podcast, and engineer-to-English translator of the network security lexicon. Andrew focused on creating content for small business owners and cybersecurity novices to make this crucial facet of modern business more approachable for non-experts everywhere.\",\"sameAs\":[\"https:\\\/\\\/www.Firewalls.com\",\"aharmon@firewalls.com\"],\"url\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/author\\\/aharmon\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Choose a Cisco Meraki Firewall for your Small Business - Firewalls.com","description":"Choosing a Cisco Meraki MX firewall can be a challenge when you can't find the fine details. Check out our breakdown of the MX64, MX67, Mx68, & more.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.firewalls.com\/blog\/cisco-meraki-firewalls\/","og_locale":"en_US","og_type":"article","og_title":"How to Choose a Cisco Meraki Firewall for your Small Business - Firewalls.com","og_description":"Choosing a Cisco Meraki MX firewall can be a challenge when you can't find the fine details. Check out our breakdown of the MX64, MX67, Mx68, & more.","og_url":"https:\/\/www.firewalls.com\/blog\/cisco-meraki-firewalls\/","og_site_name":"Firewalls.com","article_publisher":"http:\/\/www.facebook.com\/firewallscom","article_published_time":"2020-03-17T19:49:13+00:00","article_modified_time":"2025-12-19T14:07:22+00:00","og_image":[{"width":1120,"height":630,"url":"http:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/03\/Blog-Header-image.png","type":"image\/png"}],"author":"Andrew Harmon","twitter_card":"summary_large_image","twitter_creator":"@firewallscom","twitter_site":"@firewallscom","twitter_misc":{"Written by":"Andrew Harmon","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.firewalls.com\/blog\/cisco-meraki-firewalls\/#article","isPartOf":{"@id":"https:\/\/www.firewalls.com\/blog\/cisco-meraki-firewalls\/"},"author":{"name":"Andrew Harmon","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/8e89a2f96065af1717d00dfd06dca962"},"headline":"How to Choose a Cisco Meraki Firewall for your Small Business","datePublished":"2020-03-17T19:49:13+00:00","dateModified":"2025-12-19T14:07:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.firewalls.com\/blog\/cisco-meraki-firewalls\/"},"wordCount":769,"publisher":{"@id":"https:\/\/www.firewalls.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.firewalls.com\/blog\/cisco-meraki-firewalls\/#primaryimage"},"thumbnailUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/03\/Blog-Header-image.png","articleSection":["Cisco Meraki","Firewalls"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.firewalls.com\/blog\/cisco-meraki-firewalls\/","url":"https:\/\/www.firewalls.com\/blog\/cisco-meraki-firewalls\/","name":"How to Choose a Cisco Meraki Firewall for your Small Business - Firewalls.com","isPartOf":{"@id":"https:\/\/www.firewalls.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.firewalls.com\/blog\/cisco-meraki-firewalls\/#primaryimage"},"image":{"@id":"https:\/\/www.firewalls.com\/blog\/cisco-meraki-firewalls\/#primaryimage"},"thumbnailUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/03\/Blog-Header-image.png","datePublished":"2020-03-17T19:49:13+00:00","dateModified":"2025-12-19T14:07:22+00:00","description":"Choosing a Cisco Meraki MX firewall can be a challenge when you can't find the fine details. Check out our breakdown of the MX64, MX67, Mx68, & more.","breadcrumb":{"@id":"https:\/\/www.firewalls.com\/blog\/cisco-meraki-firewalls\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.firewalls.com\/blog\/cisco-meraki-firewalls\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.firewalls.com\/blog\/cisco-meraki-firewalls\/#primaryimage","url":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/03\/Blog-Header-image.png","contentUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/03\/Blog-Header-image.png","width":1120,"height":630,"caption":"Cisco Meraki MX Firewalls"},{"@type":"BreadcrumbList","@id":"https:\/\/www.firewalls.com\/blog\/cisco-meraki-firewalls\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.firewalls.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How to Choose a Cisco Meraki Firewall for your Small Business"}]},{"@type":"WebSite","@id":"https:\/\/www.firewalls.com\/blog\/#website","url":"https:\/\/www.firewalls.com\/blog\/","name":"Firewalls.com","description":"Your Home For Cyber Security News, Stories, &amp; Tutorials","publisher":{"@id":"https:\/\/www.firewalls.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.firewalls.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.firewalls.com\/blog\/#organization","name":"Firewalls.com","url":"https:\/\/www.firewalls.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/08\/BrandedLogo-TagLineBelow.png","contentUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/08\/BrandedLogo-TagLineBelow.png","width":365,"height":85,"caption":"Firewalls.com"},"image":{"@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/firewallscom","https:\/\/x.com\/firewallscom","https:\/\/www.linkedin.com\/company-beta\/1439857\/","https:\/\/www.youtube.com\/user\/firewallsDotCom"]},{"@type":"Person","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/8e89a2f96065af1717d00dfd06dca962","name":"Andrew Harmon","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g","caption":"Andrew Harmon"},"description":"Andrew Harmon was the Director of Marketing for Firewalls.com, co-host of the Ping podcast, and engineer-to-English translator of the network security lexicon. Andrew focused on creating content for small business owners and cybersecurity novices to make this crucial facet of modern business more approachable for non-experts everywhere.","sameAs":["https:\/\/www.Firewalls.com","aharmon@firewalls.com"],"url":"https:\/\/www.firewalls.com\/blog\/author\/aharmon\/"}]}},"_links":{"self":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts\/15242","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/comments?post=15242"}],"version-history":[{"count":20,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts\/15242\/revisions"}],"predecessor-version":[{"id":25622,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts\/15242\/revisions\/25622"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/media\/27394"}],"wp:attachment":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/media?parent=15242"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/categories?post=15242"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/tags?post=15242"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}