Cisco Meraki MX Firewalls is a combined UTM and Software-Defined WAN solution. Meraki is managed via the cloud, and provides core firewall services, including site-to-site VPN, plus network monitoring.
$595
per appliance
pfSense
Score 8.8 out of 10
N/A
pfSense is a firewall and load management product available through the open source pfSense Community Edition, as well as a the licensed edition, pfSense Plus (formerly known as pfSense Enterprise). The solution provides combined firewall, VPN, and router functionality, and can be deployed through the cloud (AWS or Azure), or on-premises with a Netgate appliance. It as scalable capacities, with functionality for SMBs. As a firewall, pfSense offers Stateful packet inspection, concurrent…
We continued using Cisco Meraki MX after taking over the client since they are familiar with it and enjoy the reporting it provides. We use pfSense for most new deployments as the controls it gives us are slightly better than the Cisco Meraki MX controls. That isn't to say …
pfSense always wins in the licensing realm. It requires little or no licensing to run and run forever. No ids/ips licensing, no advanced feature license, no remote access licensing. Download the community edition or buy the Netgate hardware and you are set going forward. There …
The Meraki MX lineup is well suited for organizations that need centralized management of multiple locations, as it allows for both quick deployment and simple/easy remote administration all from a single pane of glass. It also works very well for providing VPN access for remote workers and helps monitor end-device uptime. It does, however, fall a bit short in its firewall's customization, compared to traditional appliances (like our WatchGuard Firebox), so perhaps less suited for organizations that need more customization, as the Meraki MX lineup is primarily designed for simplicity and straightforward cloud-based management.
I believe PFSense is well suited for both home lab environments as well as up to small to mid-size business environments on a tight budget. However, I would implore that anything in production requires the use of the authorized hardware that PFSense sells to receive support. However, in my experience, PFSense is a solid set-and-forget firewall solution.
The Cisco Meraki MX series is phenomenal at allowing us to remotely manage networks. So the devices usually act as the brain behind our client's networks, which makes it really, really easy for our team to take a look at what's going on in those client network environments, resolve any issues, and make sure that our client's networks are staying secure.
Easy to use. Good user interface design! Easy to understand and easy to set up.
Lower hardware requirement. 3 years ago, we used an old PC to run it. Now, we have changed to a router device with Celeron CPU and 8GB RAM. It runs smoothly with a 1000G commercial broadband.
Layer seven firewall rules. Just making them more granular. We've been in meetings with Cisco SES where I've said feature requests many times and that's one of the big ones where it's just a little cumbersome to implement layer seven rules right now.
Just making them more granular. We've been in meetings with Cisco SES where I've said feature requests many times and that's one of the big ones where it's just a little cumbersome to implement layer seven rules right now.
I did kind of mention a Con in the Pro section with OpenVPN.
When I create a config for an employee other employees are able to login to that config.
I could be doing something wrong when I am making it - I am not afraid to admit that as I am pretty new to all of this, but it seems like it builds a key and I would think the key would be unique in some way to each employee, but I could be wrong.
I actually do not have a lot of Con's for this software - I did not get to set this up on our work network so I am not sure of any downfalls when installing.
I installed this on my personal machine in a Hyper-V environment to get a feel for it before I started working on it at work and it seemed pretty smooth. I didn't run into any issues.
The simplicity and ease of use for the Meraki Dashboard make it an easy choice for our organization to renew our Meraki Enterprise Agreement. We will likely continue using the Meraki MC67-C, MX450, and other MX models in their catalog until we shift away from Meraki completely
Some features simply aren't there, but the ones that are there are pretty easy to use. Sometimes it is easy to get lost when trying to find the specific device you want to work on, but that's mostly due to how rarely we have to go into the interface.
The pfSense UI is easy to navigate and pretty go look at. It is much better than some high dollar firewalls that just throw menus you you. The pfSense UI is quick and responsive and makes sense 99% of the time. Changes are committed quickly and the hardware rarely requires a reboot. It just runs.
Meraki MX devices support high availability (HA) configurations, which ensures minimal downtime if one device goes offline. This feature has helped us maintain a stable and reliable network, even in cases of hardware failures. ince Meraki is cloud-managed, we've noticed that the cloud infrastructure is generally highly reliable, with minimal service interruptions or downtime. This makes it easier to manage the network remotely without significant availability concerns. Meraki automatically pushes firmware updates and patches, which helps maintain system stability without requiring manual intervention. These updates are rolled out in a manner that ensures minimal disruption to service.
The interface is pretty responsive. The lower end devices are easy to overwhelm if you have a lot of throughput. Be sure the model you get is rated for the amount of traffic you will have. Overbuild if possible, otherwise you won't be fully leveraging the connection from your ISP.
I haven't ever had a bad experience with Meraki support. On the few occasions where I wasn't understanding the UI or needed some clarification about what a setting actually would do, I contacted them and they were very quickly able to provide help. Returns are simple and fast, too. We had to return a defective device one time and they shipped the replacement before we had even un-racked the one that was faulty. Unlike many other vendors, they didn't ask use to a do long list of scripted diagnostics, they just took my word for it that the device was broken and sent out a replacement immediately
great when they offered it, really tested your knowledge with hands on and see what your peers from other orgs know. glad to see that we were ahead of the curve of what our peers knew
Implementing Meraki MX devices in phases—starting with a pilot group or select branch offices—was invaluable. This allowed us to identify potential configuration issues, troubleshoot problems, and refine our setup before rolling it out company-wide. It also helped to get feedback from early users and adjust the deployment strategy accordingly. The SD-WAN capabilities in Meraki MX were essential for optimizing our WAN traffic and ensuring better application performance across various locations.
Cisco Meraki MX provides simplicity and scalability while cutting costs. With Meraki MX, you get a Security appliance, router, and Firewall in one appliance and managed with one GUI. These features enable the network engineers to maintain large-scale enterprises with a single dashboard from a remote site or anywhere with internet, all thanks to the Meraki cloud dashboard
Meraki has a unified management login for all devices, which is nice. It also has decent content filtering, both areas where pfSense is weaker. Where pfSense far ouclasses Meraki is in the ease of use and the other width of features. These include features such as better VPN interoperability, non-subscription based pricing, auditability, not relying on the infrastructure of a third party, more transparency of what's actually going on, easier to deploy replacements if hardware fails. Additionally, the NAT management for pfSense seems to be a bit better, as you can NAT between any network segment and not just the LAN segments out the WAN interfaces.
When I first started with my company we had various infrastructure and a mix of tech. Since going to Cisco Meraki MX we have noticed better network performance and our new sites are much easier to bring online. Users have noticed an improvement in VPN connection and getting into all our systems.
From a positive impact? Basically it allows us to set up shop very quickly. It allowed us to add sites to our network very quickly. From a negative perspective, I think the only thing is that I can see from a negative perspective is I have a preference to working with ACLI in terms of how I engage with the youth tool At the moment, the only way to actually engage with a tool is on a gui and sometimes what I'd actually like is more detailed information in terms of actual configuration that you'll actually get out of ACLI.
pfSense can be installed on commodity hardware with no licensing fees. With a simple less than 10 minute restore time, on most hardware, it's an extremely inexpensive way to achieve the same results that some of the more expensive vendors provide.
The easy to use interface has allowed configuration management to be preformed by lower level technicians with quick and easy training.