Part no: MR46

Cisco Meraki MR46 Cloud Managed Access Point

Call for Details | Why Can't I See a Price?

Touchpoint can assist with new and Cisco-refurbished equipment in most cases.

Request a Quote

  • We are a B2B sales organisation & do not sell to individual consumers.
  • This field is hidden when viewing the form
  • This field is hidden when viewing the form
  • This field is hidden when viewing the form

Cisco Meraki MR46 Cloud Managed Access Point

Part Number: MR46

 

Ideal use cases
  • Performance-critical wireless LANs
  • High-density environments
Hardware features
  • 4 radios: 2.4 GHz, 5 GHz, dual-band
  • Embedded WIDS/WIPS and Bluetooth
  • 4-stream UL/DL MU-MIMO 802.11ax
  • 1 × 2.5 Gbps Multigigabit Ethernet port
  • PoE: 802.3at
  • AC adapter available
Cloud management
  • Network-wide visibility and control
  • Self-provisioning for rapid deployment
  • Automatic reporting
  • Seamless firmware updates
Enterprise security
  • 802.1X and native Active Directory integration
  • Air Marshal: Real-time WIPS with forensics
  • Stateful Layer 3-7 firewall
  • Identity-based group policies
  • Built-in antivirus scan (NAC)
  • Built-in Umbrella DNS Security*
  • Adaptive Policy automated segmentation**
Guest access
  • 1-click secure guest access
  • Guest isolation firewall
  • Customizable splash pages
  • Integrated Facebook login
RF optimization
  • Dual-concurrent radios with MU-MIMO support
  • Radios optimized for rate-vs-range performance
  • Third radio dedicated to security and RF management
  • Built-in real-time RF spectrum view
  • Cloud-based automatic RF optimization
Layer 7 traffic shaping
  • Classifies hundreds of applications
  • Create per-application bandwidth limits
  • Prioritize productivity apps
  • Restrict or block recreational traffic
Presence location analytics
  • Measure visitor capture rate, visit length, and repeat visit rate
  • Measure visitor trends over time and compare performance across locations
Device management
  • Create device-specific firewall rules
  • Monitor and track device inventory
  • Deploy applications and enforce security settings