{"id":23069,"date":"2025-08-06T07:00:14","date_gmt":"2025-08-06T12:00:14","guid":{"rendered":"https:\/\/www.firewalls.com\/blog\/?p=23069"},"modified":"2025-09-26T08:59:04","modified_gmt":"2025-09-26T13:59:04","slug":"cisco-meraki-mr28-vs-mr36","status":"publish","type":"post","link":"https:\/\/www.firewalls.com\/blog\/cisco-meraki-mr28-vs-mr36\/","title":{"rendered":"Cisco Meraki MR28 vs MR36: Exploring Wireless Access Points"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"23069\" class=\"elementor elementor-23069\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7458007 e-flex e-con-boxed e-con e-parent\" data-id=\"7458007\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-612ab65 elementor-widget elementor-widget-text-editor\" data-id=\"612ab65\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Cisco Meraki is known for its cloud-managed benefits and wide range of network security products. This includes wireless access points for businesses of all sizes. Reliable to say the least, if you\u2019re looking for wireless access points (APs), then you\u2019ll have many models to choose from. <\/span><span style=\"font-weight: 400;\">When it comes to Cisco Meraki MR28 vs MR36, there are several important differences in their specs. <\/span><\/p><p><span style=\"font-weight: 400;\">The MR28 is best for entry-level deployment and medium-density networks. In contrast, <\/span><a href=\"https:\/\/www.firewalls.com\/brands\/cisco-meraki\/wireless-access-points\/mr36.html\"><span style=\"font-weight: 400;\">the MR36<\/span><\/a><span style=\"font-weight: 400;\"> is effective for high-performance environments and high-density deployments. <\/span><span style=\"font-weight: 400;\">At the end of the day, you have to reflect on your operation thoroughly to understand the true scope of your network security needs. This article offers a brief comparison between Cisco Meraki MR28 vs MR36 to help you narrow down your search.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-21616c2 elementor-widget elementor-widget-heading\" data-id=\"21616c2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Peace of Mind with Meraki Access Points\n<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9b43283 elementor-widget elementor-widget-text-editor\" data-id=\"9b43283\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Meraki APs ensure consistent network performance through reliable cloud-managed connectivity. This includes support for all environments, from small offices to booming, large enterprise networks. Among the many other popular <\/span><a href=\"https:\/\/www.firewalls.com\/blog\/cisco-meraki-mx-series\/\"><span style=\"font-weight: 400;\">Cisco Meraki products<\/span><\/a><span style=\"font-weight: 400;\">, their WAPs are popular for a wide variety of reasons.<\/span><\/p><p><span style=\"font-weight: 400;\">Regardless of how much space you&#8217;re working with, centralized dashboard management gives you the control you need. This could include making minor configurations to network monitoring and proactive maintenance. With benefits like automated updates, zero-touch provisioning, and multiple scalable models, Meraki APs are a stellar option. Since there are so many models available, it doesn&#8217;t hurt to look into the differences between Cisco Meraki MR28 vs MR36.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eae9c73 elementor-widget elementor-widget-heading\" data-id=\"eae9c73\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What is the Cisco Meraki MR28?\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-76ff3e7 elementor-widget elementor-widget-text-editor\" data-id=\"76ff3e7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">If you&#8217;re still a smaller, growing business, then the plug-and-play deployment style of the MR28 might be perfect. Keep in mind that deployment is handled via the Meraki cloud, making setup extremely easy. It delivers Wi-Fi 6 performance, as well as advanced RF optimization to automatically adjust certain settings.<\/span><\/p><p><span style=\"font-weight: 400;\">Here are a few important comparable specs that make the MR28 a standout option for smaller organizations:<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-912053b e-flex e-con-boxed e-con e-parent\" data-id=\"912053b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-683a55c e-con-full e-flex e-con e-child\" data-id=\"683a55c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-20e2fbe elementor-widget elementor-widget-text-editor\" data-id=\"20e2fbe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">2&#215;2:2 MU-MIMO 802.11ax<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">1.5 Gbps dual-radio aggregate frame rate<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Integrated enterprise security and guest access<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Application-aware traffic shaping<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Enhanced transmit power and receive sensitivity<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-feceee0 e-con-full e-flex e-con e-child\" data-id=\"feceee0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-594c680 elementor-widget elementor-widget-image\" data-id=\"594c680\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"640\" height=\"306\" src=\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2025\/06\/MR28.jpg\" class=\"attachment-large size-large wp-image-23072\" alt=\"MR28\" srcset=\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2025\/06\/MR28.jpg 948w, https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2025\/06\/MR28-300x144.jpg 300w, https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2025\/06\/MR28-768x368.jpg 768w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-34876a8 e-flex e-con-boxed e-con e-parent\" data-id=\"34876a8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2704dd9 elementor-widget elementor-widget-text-editor\" data-id=\"2704dd9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Even if this sounds like more than enough, you&#8217;ll never truly know unless you make a proper comparison. It&#8217;s safe to assume the MR36 brings something different to the table, but reviewing these numbers is how you lead yourself to the right decision.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-27f0b40 elementor-widget elementor-widget-heading\" data-id=\"27f0b40\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What is the Cisco Meraki MR36?\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4d8a428 elementor-widget elementor-widget-text-editor\" data-id=\"4d8a428\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Aside from the hardware similarities, the MR36 is meant for slightly larger operations. Its focus on next-generation deployment is great for business sectors like hospitals, retail shops, hotels, schools, and offices.<\/span><\/p><p><span style=\"font-weight: 400;\">Below are a few highlights that offer a brief comparison to the MR28:<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-295e1a0 e-flex e-con-boxed e-con e-parent\" data-id=\"295e1a0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-268beab e-con-full e-flex e-con e-child\" data-id=\"268beab\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cbfef0f elementor-widget elementor-widget-text-editor\" data-id=\"cbfef0f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">2&#215;2:2 MU-MIMO 802.11ax<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">1.5 Gbps dual-radio aggregate frame rate<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">24&#215;7 real-time WIDS\/WIPS and spectrum analytics<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Full-time Wi-Fi location tracking<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Integrated scanning radio<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c293e39 e-con-full e-flex e-con e-child\" data-id=\"c293e39\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ed6cc26 elementor-widget elementor-widget-image\" data-id=\"ed6cc26\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"640\" height=\"287\" data-src=\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2025\/06\/MR36.jpg\" class=\"attachment-large size-large wp-image-23076 lazyload\" alt=\"\" data-srcset=\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2025\/06\/MR36.jpg 776w, https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2025\/06\/MR36-300x135.jpg 300w, https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2025\/06\/MR36-768x344.jpg 768w\" data-sizes=\"(max-width: 640px) 100vw, 640px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 640px; --smush-placeholder-aspect-ratio: 640\/287;\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c4f76f7 e-flex e-con-boxed e-con e-parent\" data-id=\"c4f76f7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f1c5603 elementor-widget elementor-widget-text-editor\" data-id=\"f1c5603\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Keep in mind there are certain caveats about these specs and features. For example, 40 MHz channels are only supported in the 5 GHz band. The details aren\u2019t the only things that matter for <\/span><a href=\"https:\/\/www.firewalls.com\/blog\/choose-a-cisco-meraki-ms-switch\/\"><span style=\"font-weight: 400;\">your decision-making<\/span><\/a><span style=\"font-weight: 400;\">. However, it\u2019s the starting point for guiding your focus to the right Meraki wireless access point for your business.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eef3b08 elementor-widget elementor-widget-heading\" data-id=\"eef3b08\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cisco Meraki MR28 vs MR36 Comparison\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7dceaa3 elementor-widget elementor-widget-text-editor\" data-id=\"7dceaa3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Technical specifications in network security tech can get pretty convoluted, especially if you\u2019re trying to read through entire datasheets. While all of these details are important, it can help to summarize some of the most important details. The table below highlights some similarities as well as core differences you\u2019ll want to consider.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e44362d elementor-widget elementor-widget-shortcode\" data-id=\"e44362d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\n<table id=\"tablepress-76\" class=\"tablepress tablepress-id-76\">\n<thead>\n<tr class=\"row-1\">\n\t<th class=\"column-1\">Specification<\/th><th class=\"column-2\">Cisco Meraki MR28<\/th><th class=\"column-3\">Cisco Meraki MR36<\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-striping row-hover\">\n<tr class=\"row-2\">\n\t<td class=\"column-1\">Radio Throughput<\/td><td class=\"column-2\">Up to 1.5 Gbps aggregate (286 Mbps @ 2.4 GHz and 1,201 Mbps @ 5 GHz)<\/td><td class=\"column-3\">Up to 1.5 Gbps aggregate (286 Mbps @ 2.4 GHz and 1,201 Mbps @ 5 GHz)<\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\">MIMO Support<\/td><td class=\"column-2\">2x2:2 MU-MIMO 802.11ax<\/td><td class=\"column-3\">2x2:2 MU-MIMO 802.11ax<\/td>\n<\/tr>\n<tr class=\"row-4\">\n\t<td class=\"column-1\">Enterprise Security and Guest Access<\/td><td class=\"column-2\">Integrated<\/td><td class=\"column-3\">Integrated<\/td>\n<\/tr>\n<tr class=\"row-5\">\n\t<td class=\"column-1\">Application-Aware Traffic Shaping<\/td><td class=\"column-2\">Yes<\/td><td class=\"column-3\">Yes<\/td>\n<\/tr>\n<tr class=\"row-6\">\n\t<td class=\"column-1\">Dedicated Security Radio (WIDS\/WIPS)<\/td><td class=\"column-2\">WIDS\/WIPS with alerting and rogue AP detection (performed opportunistically)<\/td><td class=\"column-3\">24x7 real-time WIDS\/WIPS and spectrum analytics<\/td>\n<\/tr>\n<tr class=\"row-7\">\n\t<td class=\"column-1\">Wi-Fi Location Tracking<\/td><td class=\"column-2\">No<\/td><td class=\"column-3\">Full-time Wi-Fi location tracking<\/td>\n<\/tr>\n<tr class=\"row-8\">\n\t<td class=\"column-1\">Dedicated Third Radio<\/td><td class=\"column-2\">No<\/td><td class=\"column-3\">Yes<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- #tablepress-76 from cache --><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9e6ceb7 e-flex e-con-boxed e-con e-parent\" data-id=\"9e6ceb7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-06c090f elementor-widget elementor-widget-text-editor\" data-id=\"06c090f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Among their similarities, sometimes the smallest differences in specs will make the biggest impact on your decision. The short version is that the MR28 is best for smaller operations, while the MR36 is ready for larger businesses as a whole.\u00a0<\/span><\/p><p><span style=\"font-weight: 400;\">They&#8217;re both indoor wireless access points and share quite a few specifications. However, a big part of how the MR36 separates itself is with a dedicated third radio for real-time WIDS\/WIPS and automated RF optimization. You&#8217;ll also find a fourth integrated radio for Bluetooth scanning and beaconing.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2610d43 elementor-widget elementor-widget-heading\" data-id=\"2610d43\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Final Thoughts\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3df801f elementor-widget elementor-widget-text-editor\" data-id=\"3df801f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">With any kind of hardware pertaining to network security and keeping your business connected, there\u2019s a lot of tech to sort through. Although the MR28 is great for new, budding companies, it\u2019s the MR36 that\u2019s much more built for scalability.<\/span><\/p><p><span style=\"font-weight: 400;\">For those keeping their mindset on the future, the MR36 gives you much more flexibility within your network and everyday use. If you\u2019re still racking your brain about Cisco Meraki MR28 vs MR36, don\u2019t forget to <\/span><a href=\"https:\/\/www.firewalls.com\/contact\"><span style=\"font-weight: 400;\">give us a shout<\/span><\/a><span style=\"font-weight: 400;\"> for the guidance your business network needs.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c689ca1 elementor-widget elementor-widget-button\" data-id=\"c689ca1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"tel:3172254117\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Call Now<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Get a quick look at this comparison between Cisco Meraki MR28 vs MR36 to discover which model aligns with your current network demands.<\/p>\n","protected":false},"author":13,"featured_media":25574,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[601,608],"tags":[],"class_list":["post-23069","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cisco-meraki","category-wireless-access-points"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cisco Meraki MR28 vs MR36: Exploring Wireless Access Points - Firewalls.com<\/title>\n<meta name=\"description\" content=\"Get a quick look at this comparison between Cisco Meraki MR28 vs MR36 to discover which model aligns with your current network demands.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.firewalls.com\/blog\/cisco-meraki-mr28-vs-mr36\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cisco Meraki MR28 vs MR36: Exploring Wireless Access Points - Firewalls.com\" \/>\n<meta property=\"og:description\" content=\"Get a quick look at this comparison between Cisco Meraki MR28 vs MR36 to discover which model aligns with your current network demands.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.firewalls.com\/blog\/cisco-meraki-mr28-vs-mr36\/\" \/>\n<meta property=\"og:site_name\" content=\"Firewalls.com\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/firewallscom\" \/>\n<meta property=\"article:published_time\" content=\"2025-08-06T12:00:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-26T13:59:04+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2025\/08\/Blog-Header-image-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1120\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Lucas Modrall\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@firewallscom\" \/>\n<meta name=\"twitter:site\" content=\"@firewallscom\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lucas Modrall\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/cisco-meraki-mr28-vs-mr36\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/cisco-meraki-mr28-vs-mr36\\\/\"},\"author\":{\"name\":\"Lucas Modrall\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#\\\/schema\\\/person\\\/cc1ba4fb3acd1d71c1c04434567b3f53\"},\"headline\":\"Cisco Meraki MR28 vs MR36: Exploring Wireless Access Points\",\"datePublished\":\"2025-08-06T12:00:14+00:00\",\"dateModified\":\"2025-09-26T13:59:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/cisco-meraki-mr28-vs-mr36\\\/\"},\"wordCount\":772,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/cisco-meraki-mr28-vs-mr36\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/Blog-Header-image-1.png\",\"articleSection\":[\"Cisco Meraki\",\"Wireless Access Points\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/cisco-meraki-mr28-vs-mr36\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/cisco-meraki-mr28-vs-mr36\\\/\",\"url\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/cisco-meraki-mr28-vs-mr36\\\/\",\"name\":\"Cisco Meraki MR28 vs MR36: Exploring Wireless Access Points - Firewalls.com\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/cisco-meraki-mr28-vs-mr36\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/cisco-meraki-mr28-vs-mr36\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/Blog-Header-image-1.png\",\"datePublished\":\"2025-08-06T12:00:14+00:00\",\"dateModified\":\"2025-09-26T13:59:04+00:00\",\"description\":\"Get a quick look at this comparison between Cisco Meraki MR28 vs MR36 to discover which model aligns with your current network demands.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/cisco-meraki-mr28-vs-mr36\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/cisco-meraki-mr28-vs-mr36\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/cisco-meraki-mr28-vs-mr36\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/Blog-Header-image-1.png\",\"contentUrl\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/Blog-Header-image-1.png\",\"width\":1120,\"height\":630,\"caption\":\"Cisco Meraki MR28 vs MR36- Exploring Wireless Access Points\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/cisco-meraki-mr28-vs-mr36\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cisco Meraki MR28 vs MR36: Exploring Wireless Access Points\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/\",\"name\":\"Firewalls.com\",\"description\":\"Your Home For Cyber Security News, Stories, &amp; Tutorials\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#organization\",\"name\":\"Firewalls.com\",\"url\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/08\\\/BrandedLogo-TagLineBelow.png\",\"contentUrl\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/08\\\/BrandedLogo-TagLineBelow.png\",\"width\":365,\"height\":85,\"caption\":\"Firewalls.com\"},\"image\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"http:\\\/\\\/www.facebook.com\\\/firewallscom\",\"https:\\\/\\\/x.com\\\/firewallscom\",\"https:\\\/\\\/www.linkedin.com\\\/company-beta\\\/1439857\\\/\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/firewallsDotCom\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#\\\/schema\\\/person\\\/cc1ba4fb3acd1d71c1c04434567b3f53\",\"name\":\"Lucas Modrall\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c7d2017c4bb69e7b8adb91dbbfcc089b8e3a8f50a1ea2fddd1fdb91a7c47cd74?s=96&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c7d2017c4bb69e7b8adb91dbbfcc089b8e3a8f50a1ea2fddd1fdb91a7c47cd74?s=96&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c7d2017c4bb69e7b8adb91dbbfcc089b8e3a8f50a1ea2fddd1fdb91a7c47cd74?s=96&r=g\",\"caption\":\"Lucas Modrall\"},\"description\":\"Lucas is a Content Writer for Firewalls.com. He copywrites all of our short and long-form blog content.\",\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/in\\\/lucas-m-5b4106186\\\/\"],\"url\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/author\\\/lucasm\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cisco Meraki MR28 vs MR36: Exploring Wireless Access Points - Firewalls.com","description":"Get a quick look at this comparison between Cisco Meraki MR28 vs MR36 to discover which model aligns with your current network demands.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.firewalls.com\/blog\/cisco-meraki-mr28-vs-mr36\/","og_locale":"en_US","og_type":"article","og_title":"Cisco Meraki MR28 vs MR36: Exploring Wireless Access Points - Firewalls.com","og_description":"Get a quick look at this comparison between Cisco Meraki MR28 vs MR36 to discover which model aligns with your current network demands.","og_url":"https:\/\/www.firewalls.com\/blog\/cisco-meraki-mr28-vs-mr36\/","og_site_name":"Firewalls.com","article_publisher":"http:\/\/www.facebook.com\/firewallscom","article_published_time":"2025-08-06T12:00:14+00:00","article_modified_time":"2025-09-26T13:59:04+00:00","og_image":[{"width":1120,"height":630,"url":"http:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2025\/08\/Blog-Header-image-1.png","type":"image\/png"}],"author":"Lucas Modrall","twitter_card":"summary_large_image","twitter_creator":"@firewallscom","twitter_site":"@firewallscom","twitter_misc":{"Written by":"Lucas Modrall","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.firewalls.com\/blog\/cisco-meraki-mr28-vs-mr36\/#article","isPartOf":{"@id":"https:\/\/www.firewalls.com\/blog\/cisco-meraki-mr28-vs-mr36\/"},"author":{"name":"Lucas Modrall","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/cc1ba4fb3acd1d71c1c04434567b3f53"},"headline":"Cisco Meraki MR28 vs MR36: Exploring Wireless Access Points","datePublished":"2025-08-06T12:00:14+00:00","dateModified":"2025-09-26T13:59:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.firewalls.com\/blog\/cisco-meraki-mr28-vs-mr36\/"},"wordCount":772,"commentCount":0,"publisher":{"@id":"https:\/\/www.firewalls.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.firewalls.com\/blog\/cisco-meraki-mr28-vs-mr36\/#primaryimage"},"thumbnailUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2025\/08\/Blog-Header-image-1.png","articleSection":["Cisco Meraki","Wireless Access Points"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.firewalls.com\/blog\/cisco-meraki-mr28-vs-mr36\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.firewalls.com\/blog\/cisco-meraki-mr28-vs-mr36\/","url":"https:\/\/www.firewalls.com\/blog\/cisco-meraki-mr28-vs-mr36\/","name":"Cisco Meraki MR28 vs MR36: Exploring Wireless Access Points - Firewalls.com","isPartOf":{"@id":"https:\/\/www.firewalls.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.firewalls.com\/blog\/cisco-meraki-mr28-vs-mr36\/#primaryimage"},"image":{"@id":"https:\/\/www.firewalls.com\/blog\/cisco-meraki-mr28-vs-mr36\/#primaryimage"},"thumbnailUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2025\/08\/Blog-Header-image-1.png","datePublished":"2025-08-06T12:00:14+00:00","dateModified":"2025-09-26T13:59:04+00:00","description":"Get a quick look at this comparison between Cisco Meraki MR28 vs MR36 to discover which model aligns with your current network demands.","breadcrumb":{"@id":"https:\/\/www.firewalls.com\/blog\/cisco-meraki-mr28-vs-mr36\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.firewalls.com\/blog\/cisco-meraki-mr28-vs-mr36\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.firewalls.com\/blog\/cisco-meraki-mr28-vs-mr36\/#primaryimage","url":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2025\/08\/Blog-Header-image-1.png","contentUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2025\/08\/Blog-Header-image-1.png","width":1120,"height":630,"caption":"Cisco Meraki MR28 vs MR36- Exploring Wireless Access Points"},{"@type":"BreadcrumbList","@id":"https:\/\/www.firewalls.com\/blog\/cisco-meraki-mr28-vs-mr36\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.firewalls.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Cisco Meraki MR28 vs MR36: Exploring Wireless Access Points"}]},{"@type":"WebSite","@id":"https:\/\/www.firewalls.com\/blog\/#website","url":"https:\/\/www.firewalls.com\/blog\/","name":"Firewalls.com","description":"Your Home For Cyber Security News, Stories, &amp; Tutorials","publisher":{"@id":"https:\/\/www.firewalls.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.firewalls.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.firewalls.com\/blog\/#organization","name":"Firewalls.com","url":"https:\/\/www.firewalls.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/08\/BrandedLogo-TagLineBelow.png","contentUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/08\/BrandedLogo-TagLineBelow.png","width":365,"height":85,"caption":"Firewalls.com"},"image":{"@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/firewallscom","https:\/\/x.com\/firewallscom","https:\/\/www.linkedin.com\/company-beta\/1439857\/","https:\/\/www.youtube.com\/user\/firewallsDotCom"]},{"@type":"Person","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/cc1ba4fb3acd1d71c1c04434567b3f53","name":"Lucas Modrall","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c7d2017c4bb69e7b8adb91dbbfcc089b8e3a8f50a1ea2fddd1fdb91a7c47cd74?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c7d2017c4bb69e7b8adb91dbbfcc089b8e3a8f50a1ea2fddd1fdb91a7c47cd74?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c7d2017c4bb69e7b8adb91dbbfcc089b8e3a8f50a1ea2fddd1fdb91a7c47cd74?s=96&r=g","caption":"Lucas Modrall"},"description":"Lucas is a Content Writer for Firewalls.com. He copywrites all of our short and long-form blog content.","sameAs":["https:\/\/www.linkedin.com\/in\/lucas-m-5b4106186\/"],"url":"https:\/\/www.firewalls.com\/blog\/author\/lucasm\/"}]}},"_links":{"self":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts\/23069","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/comments?post=23069"}],"version-history":[{"count":21,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts\/23069\/revisions"}],"predecessor-version":[{"id":23098,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts\/23069\/revisions\/23098"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/media\/25574"}],"wp:attachment":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/media?parent=23069"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/categories?post=23069"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/tags?post=23069"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}