Call a Specialist Today! (02) 9388 1741
Free Delivery! Free Delivery!

Cisco Meraki MR66
Dual-Radio Outdoor 802.11n Access Point

Cisco Meraki MR66

Customers Please Note: The antennas and power adapters are sold separately

Sorry, this product is no longer available, It has been replaced by the new MR74, click here!.

This product is only available while inventory permits or for license renewals.


Customers Please Note: If you currently own a MR66 and need to renew your license, you can still purchase Enterprise Cloud Controller Licensing and Renewal Licensing below.


Click here to jump to more pricing!

Please Note: All prices displayed are Ex-VAT. 20% VAT is added during the checkout process.


Overview:

High performance, ruggedized, outdoor cloud-managed wireless LAN

The Cisco Meraki MR66 is an enterprise class, dual-concurrent 802.11n cloud managed access point designed for high-density deployments in harsh outdoor locations and industrial indoor environments. The MR66 features dual-concurrent, dual-band operation and advanced 802.11n technologies such as MIMO and beamforming, delivering the high capacity, throughput and reliable coverage required by the most demanding business applications, even in harsh environments.

MR66 and the Cisco Meraki Cloud Controller: A Powerful Combination

The MR66 is managed through the Cisco Meraki Enterprise Cloud Controller, with an intuitive browser-based interface that lets you get up and running quickly without training or certifications. Since the MR66 is self-configuring and managed over the web, it can even be deployed at a remote location without on-site IT staff.

The MR66 is monitored 24x7 from the Cisco Meraki Enterprise Cloud Controller which delivers real-time alerts if your network encounters problems. Remote diagnostics tools also enable real-time troubleshooting over the web.

The MR66's firmware is always kept up to date from the cloud. New features, bug fixes, and enhancements are delivered seamlessly over the web, so you never have to manually download software updates or worry about missing security patches.

MR66 Highlights

Ideal use cases
  • Harsh, rugged, and outdoor environments
  • High-density deployments
  • Voice, video, and performance-intensive networks

Hardware features

  • IP67 rated, tested for dust, shock, vibration, and moisture
  • Dual-radio 802.11n, up to 600 Mbps
  • Gigabit Ethernet port, 802.3af PoE compatible

Cloud management

  • Network-wide visibility and control
  • Self-provisioning for rapid deployment
  • Automatic reporting
  • Seamless firmware updates

Enterprise security

  • 802.1X and native Active Directory integration
  • Intrusion detection and prevention (WIDS/WIPS)
  • Stateful Layer 3-7 firewall
  • Identity-based group policies
  • Built-in antivirus scan (NAC)

Guest access

  • 1-click secure guest access
  • Guest isolation firewall
  • Customizable splash pages
RF optimization
  • Cloud based RF planning
  • Built in spectrum analysis
  • Dual-concurrent radios with band steering

Layer 7 traffic shaping

  • Classifies hundreds of applications
  • Create per-application bandwidth limits
  • Prioritize productivity apps
  • Restrict recreational traffic

Mesh

  • Self-configuring, self-optimizing mesh
  • High performance multi-radio routing protocols
  • Extends coverage to hard-to-wire areas
  • Self-heals after cable or switch failures

Device management

  • Create device-specific firewall rules
  • Deploy applications and updates
  • Troubleshoot issues with built-in RDP

Recommended Use Cases

Outdoor coverage for high client-density corporate campuses, educational institutions, metro Wi-Fi, and parks

  • Provide high-speed access to a large number of clients
  • Point-to-multipoint mesh

Indoor coverage for industrial areas (e.g., warehouses, manufacturing facilities)

  • Reliable coverage for scanner guns, security cameras, and POS devices
  • High speed-access for iPads, tablets and laptops

Long distance point-to-point links

  • Build a long-distance bridge between two networks
  • Two MR66s can establish up to a 20 km link using high-gain antennas

Features:

Dual enterprise class 802.11n radios, up to 600 Mbps

The MR66 features two powerful radios and advanced RF design for enhanced receive sensitivity. Combined with 802.11n technologies including MIMO and beamforming, the MR66 delivers up to 600 Mbps throughput and up to 50% increased capacity compared to typical rugged enterprise-class 802.11g access points, meaning fewer access points are required for a given deployment. In addition, dual-concurrent 802.11n radios and band steering technology allow the MR66 to automatically serve legacy 802.11b/g clients using the 2.4 GHz radio and newer 802.11n clients using the 5 GHz radio, thus providing maximum speed to all clients.

Rugged industrial design

The MR66 is designed and tested for salt spray, vibration, extreme thermal conditions, shock and dust and is IP67-rated, making it ideal for extreme environments. Despite its rugged design, MR66 has a low profile and is easy to deploy.

Application-aware traffic shaping

The MR66 includes an integrated layer 7 packet inspection, classification, and control engine, enabling you to set QoS policies based on traffic type. Prioritize your mission critical applications, while setting limits on recreational traffic, e.g. peer-to-peer and video streaming.

Automatic cloud-based RF optimization with spectrum analysis

The MR66's sophisticated, automated RF optimization means that there is no need for the dedicated hardware or RF expertise typically required to tune a wireless network. An integrated spectrum analyzer monitors the airspace for neighboring WiFi devices as well as non-802.11 interference - microwave ovens, Bluetooth headsets, etc. The Cisco Meraki cloud then automatically optimizes the MR66's channel selection, transmit power, and client connection settings, providing optimal performance even under challenging RF conditions.

Integrated enterprise security and guest access

The MR66 features integrated, easy-to-configure security technologies to provide secure connectivity for employees and guests alike. Advanced security features such as AES hardware based encryption and WPA2-Enterprise authentication with 802.1X and Active Directory integration provide wire-like security with the convenience of wireless mobility. One-click guest isolation provides secure, Internet-only access for visitors. Our policy firewall (Identity Policy Manager) enables group or device-based, granular access policy control. PCI compliance reports check network settings against PCI requirements to simplify secure retail deployments.

Secure wireless environments using Air Marshal

Cisco Meraki wireless comes equipped with Air Marshal, a built-in wireless intrusion prevention system (WIPS) for threat detection and attack remediation. APs will scan their environment opportunistically or in real-time based on intuitive user-defined preferences. Alarms and auto-containment of malicious rogue APs are configured via flexible remediation policies, ensuring optimal security and performance in even the most challenging wireless environments.

High performance mesh

The MR66's advanced mesh technologies like multi-channel routing protocols and multiple gateway support enable scalable, high throughput coverage of hard-to-wire areas with zero configuration. Mesh also improves network reliability - in the event of a switch or cable failure, the MR66 will automatically revert to mesh mode, providing continued gateway connectivity to clients.

Self-configuring, self-optimizing, self-healing

When plugged in, the MR66 automatically connects to the Cisco Meraki cloud, downloads its configuration, and joins your network. It self optimizes, determining the ideal channel, transmit power, and client connection parameters. It also self heals, responding automatically to switch failures and other errors.

Low profile, environmentally friendly design

In addition to eliminating excess packaging and documentation, 90% of the access point materials are recyclable. A maximum power draw of only 10.5 watts and a cloud-managed architecture mean that pollution, material utilization and your electric bill are kept to a minimum.

Solutions:

MR Cloud Managed Wireless Access Points

The Meraki MR series is the world's first enterprise-grade line of cloud-managed WLAN access points. Designed for challenging enterprise environments, the MR access points use advanced 802.11ac and 802.11n technologies including MIMO, beam forming and channel bonding to deliver the throughput and reliable coverage required by demanding business applications.

Centralized Cloud Management

The award-winning Cisco Meraki cloud management architecture provides powerful and intuitive centralized management, while eliminating the cost and complexity of traditional on-site wireless controllers. Seamlessly manage campus-wide WiFi deployments and distributed multi-site networks with zero-touch access point provisioning, network-wide visibility and control, cloud-based RF optimization, seamless firmware updates and more. With an intuitive browser-based user interface, Meraki WLANs configure in minutes without training or dedicated staff. Adding new sites to a network takes minutes, not hours or days, and there's no need to train additional staff to monitor or manage the remote networks. Meraki devices self-provision, enabling large campus and multi-site deployments without on-site IT.

34 Guts
Class-Leading Enterprise Features

Cisco Meraki access points are built from the highest grade components and carefully optimized for a seamless user experience. The outcome: faster connections, greater user capacity, more coverage, and fewer support calls.

Built for Performance
Built for Performance

Enterprise-class 802.11ac and 802.11n APs feature high power radios and enhanced receive sensitivity. MIMO and integrated beamforming maximize capacity without sacrificing range.

  • Enhanced CPU for line-rate deep packet inspection
  • Flash memory provisioned for cloud management
  • Custom RF design for enhanced performance

Dedicated Security Radio
Dedicated Security Radio

In addition to the high-power 2.4 GHz and 5 GHz client-serving radios, the Meraki MR34 packs a dedicated security radio. The radio:

  • Continuously scans and protects against security threats
  • Senses the RF environment and adapts to interference
  • Automatically configures RF settings to maximize performance

Rapid Deployment and Scalability

Built from the ground up for multi-site networks, Meraki access points have revolutionized distributed branch wireless networking. Zero-touch deployments, multi-site visibility and control, and automated alerts make deploying, securing, and centrally managing branch networks a breeze.

The Meraki cloud-managed architecture enables plug and play branch deployments and provides centralized visibility and control across any number of distributed locations. Since Meraki MR series APs are managed entirely through the Meraki web-based dashboard, configuration and diagnostics can be performed remotely just as easily as they can be performed on-site, eliminating costly field visits. Each device downloads its configuration via Meraki's cloud, applying your network and security policies automatically so you don't have to provision them on-site.

Meraki Cloud Management Architecture
Meraki Cloud Management Architecture

High Performance RF Design

Every Meraki access point continuously and automatically monitors its surroundings to maximize WiFi performance. By measuring channel utilization, signal strength, throughput, signals from non-Meraki APs, and non-WiFi interference, Meraki APs automatically optimize WiFi performance of individual APs and maximize system-wide performance.

Meraki APs have been deployed and proven in the most demanding environments, supporting more than 100 users per AP and collectively serving hundreds of Megabits per second of user traffic to thousands of devices. By eliminating traditional hardware controllers, Meraki also eliminates the performance bottleneck that often chokes high-density wireless deployments.

By measuring utilization from neighboring APs, detecting WiFi signals from non-Meraki APs, and identifying non-WiFi interference, Meraki APs continuously stay on top of changing and challenging conditions. Tools such as real-time spectrum analysis and live channel utilization deliver immediate information on the RF environment at any part of the network. Even in dynamic environments, Meraki networks automatically detect and adapt to interference from non-WiFi sources.

Real-time and historical metrics ensure maximum system-wide performance. Wireless channels, AP output power, and client connection settings are automatically adapted to changing performance and interference conditions, eliminating the need for tedious manual adjustment of dozens of independent parameters.

Mesh networking, included in every Meraki AP, extends coverage to hard to wire areas and creates a self-healing network that is resilient to cable and switch failures, continuing to operate despite failures or configuration changes in the rest of the network, without the need for manual configuration or optimization.

User Analytics and Traffic Shaping
User Analytics and Traffic Shaping
Multi-Site Management
Multi-Site Management
Live Troubleshooting Tools
Live Troubleshooting Tools
Air Marshal: Real-Time Wireless Intrusion Prevention System
Air Marshal: Real-Time Wireless Intrusion Prevention System

Enterprise Security and a Dedicated Radio

The MR series comes equipped with complete out-of-the-box enterprise class security. Segment wireless users, applications, and devices; secure your network from attacks and enforce the right policies for each class of users. A built-in stateful policy firewall, 802.1X/RADIUS support, and native Active Directory integration deliver fine-grained access control, while a guest access firewall provides secure, Internetonly guest WiFi in just one click. Integrated network access control (NAC) provides end-user anti-virus scanning for accurate client device posture asessment to protect your wired and wireless network against virus infections.

Indoor APs feature a radio dedicated to full-time scanning, rogue AP containment, and automatic RF optimization. With Air Marshal, it is possible to set up a real-time wireless intrusion detection and prevention system (WIDS/WIPS) with user-defined threat remediation policies and intrusion alarms, enabling secure wireless environments without complex setup or systems integration. Auto RF eliminates the need for manual RF configuration by scanning the environment for utilization, interference, and other metrics, and computing the optimal channel and power settings for every AP in the network. Meraki WLANs are fully HIPAA and PCI compliant.

Built-in Guest Access

Meraki cloud management provides the ability to customize and integrate splash pages onto each Meraki MR access point, with options for click-through or sign-on splash using your own RADIUS server or the Meraki cloud-based RADIUS user database. The Meraki MR series features a complete array of built-in captive portal tools, including a guest ambassador portal for new-user sign-on, splash sign-in tracking, application blocking and traffic shaping, free and paid tiers of access, integrated credit-card processing and prepaid codes generation, and splash by-pass for corporate-issued or recognized devices.

The Entire Network Under A Single Pane Of Glass

Powerful and intuitive multi-site management via the cloud, while eliminating the cost and complexity of traditional on-site wireless controllers.

The industry's only end-to-end solution which unifies WAN, LAN, wireless LAN, and mobile device management under a single pane of glass.

The Entire Network Under A Single Pane Of Glass

Meraki Mobile App

Meraki Mobile AppThe Meraki dashboard mobile app, available for iOS and Android, is ideal for network management on the go.

Monitor
Manage your entire Meraki infrastructure from anywhere

  • Monitor wireless, switching, and security infrastructure
  • See network status and usage
  • Receive push notifications for network outages

Speed Deployments

  • Scan AP barcode to add it to your network
  • Use the phone's camera to photograph the AP mounting location
  • Pinpoint the AP location using GPS

Troubleshoot Remotely

  • Verify connectivity using live tools
  • Measure network throughput remotely
  • Reboot devices without on-site staff

CMX

The Meraki MR series tracks probing MAC addresses from associated and non-associated clients. This data is exported in real time from the access points to Meraki's cloud for analytics; information is then calculated and then presented in the Meraki dashboard to display metrics such as user dwell-time, repeat visits and capture rate (people passing by vs. coming inside a site). This information can be used by retailers, hospitality, and enterprise customers to understand foot traffic and visitor behavior across sites, and can facilitate an optimization of opening hours, marketing initatives, and staffing policies.

CMX Location Analytics (for non-associated clients)
CMX Location Analytics (for non-associated clients)

CMX Location Analytics (for non-associated clients)

BYOD-ready, Out of the Box

User-owned devices have exploded onto networks everywhere, with new iPads, Androids, and smartphones connecting every day. Meraki MR series APs feature built-in support for BYOD and make it easier than ever to securely track and support user-owned iPads, tablets, smartphones, and laptops - without extra appliances, licenses, or complex VLAN configurations. Using integrated Layer 7 client fingerprinting, client devices are automatically identified and classified, letting you distinguish between iPads and iPhones, device operating systems, and even manufacturer. Device-specific policies can be automatically applied to restrict, quarantine, or throttle userowned devices. Client fingerprinting combined with a heuristicsdriven reporting engine allows you to generate detailed reports of BYOD clients that have connected, measure the bandwidth and applications they've accessed, and even see their percentage of total traffic. Bonjour forwarding facilitates seamless discovery of Apple devices across VLANs, rounding out a full BYOD-centric feature set.

Complete with a free mobile device management (MDM) client agent called Systems Manager, monitor each of your organization's devices, showing useful metrics including client hardware/software information and recent location, and centrally manage your corporate devices with a great degree of granulaity; log in with remote desktop or command-line, push new applications, and remotely lock and erase devices.

Client Location Tracking
Client Location Tracking
Device Reporting and Analytics
Device Reporting and Analytics

Device-Based Group Policies
Device-Based Group Policies

Auto-Tunneling VPN Technology
Leveraging the Meraki cloud architecture, site-to-site VPNs can be enabled via a single click without any command-line configurations or multi-step key permission setups; Meraki cloud management automatically tunnels, hole punches, and configures devices to eliminate the complexity seen in traditional VPN setups. Complete with IPsec encryption, deploy the following architectural setups within minutes:

  • Teleworker VPN: Securely extend the corporate LAN to remote sites wirelessly, using the MR series with your own server or a Meraki MX
  • Site-to-site VPN: Multi-branch VPN w/ WAN optimization and Content Filtering (using Meraki MX Security Appliance)
  • Secure roaming: Layer 2 and layer 3 roaming for large campus environments

Distributed Packet Processing
Meraki devices execute packet processing at the edge. Each wireless access point features a high performance CPU that enforces layer 3-7 firewall policies, application QoS, network access control (NAC), and more. Meraki networks scale seamlessly: add capacity by simply deploying more APs, without concern for controller bottlenecks or choke points.

Every Meraki wireless access point is built with the packet processing resources to secure and control its client traffic, without need for a wireless LAN controller. Meraki APs are built with a high performance CPU, hardware-accelerated encryption, and extended memory resources to implement stateful firewall policies, voice and video optimization, and even layer 7 traffic classification and QoS.

Cloud Management:

Cloud Management

Cisco Meraki's cloud based management provides centralized visibility & control over Cisco Meraki's wired & wireless networking hardware, without the cost and complexity of wireless controllers or overlay management systems. Integrated with Cisco Meraki's entire product portfolio, cloud management provides feature rich, scalable, and intuitive centralized management for networks of any size.

Highlights

  • Unified visibility and control of the entire network via a single dashboard: wireless, switching, and security appliances
  • Streamlines large networks with tens of thousands of endpoints
  • Zero-touch provisioning for rapid deployment
  • Built-in multi site network management tools
  • Automated network monitoring and alerts
  • Intuitive interface eliminates costly training or added staff
  • Network tagging engine - search and sync settings by tag
  • Role-based administration and auditable change logs
  • Continuous feature updates delivered from the cloud
  • Highly available and secure (PCI / HIPAA compliant)

Cloud Managed Networks

Cisco Meraki's hardware products are built from the ground up for cloud management. As a result, they come out of the box with centralized control, layer 7 device and application visibility, real time web-based diagnostics, monitoring, reporting, and much more.

Cisco Meraki networks deploy quickly and easily, without training or dedicated staff. Moreover, Cisco Meraki provides a rich feature set that provides complete control over devices, users, and applications, allowing for flexible access policies and rich security without added cost or complexity.

Cisco Meraki's cloud management provides the features, security, and scalability for networks of any size. Cisco Meraki scales from small sites to campuses, and even distributed networks with thousands of sites. Cisco Meraki devices, which self-provision via the cloud, can be deployed in branches without IT. Firmware and security signature updates are delivered seamlessly, over the web. With the cloud, branches can automatically establish secure VPN tunnels between one another with a single click.

With a secure, PCI and HIPAA compliant architecture and fault tolerant design that preserves local network functionality during WAN outages, Cisco Meraki is field proven in high security and mission critical network applications.

Cloud Management Architecture

Cisco Meraki's architecture provides feature rich network management without on-site management appliances or WiFi controllers.

Every Cisco Meraki device - including wirelesss access points, Ethernet switches, and security appliances - connects over the Internet to Cisco Meraki's datacenters, which run Cisco Meraki's cloud management platform. These connections, secured via SSL, utilize a patented protocol that provides real time visibility and control, yet uses minimal bandwidth overhead (typically 1 kbps or less.)

In place of traditional command-line based network configuration, Cisco Meraki provides a rich web based dashboard, providing visibility and control over up to tens of thousands of Cisco Meraki devices, anywhere in the world. Tools, designed to scale to large and distributed networks, make policy changes, firmware updates, deploying new branches, etc. simple and expedient, regardless of size or location. Cisco Meraki's real time protocols combine the immediacy of on-premise management applications with the simplicity and centralized control of a cloud application.

Every Cisco Meraki device is engineered for cloud management. Specifically, this means that Cisco Meraki devices are designed with memory and CPU resources to perform packet processing, QoS, layer 3-7 security, encryption, etc. at the network edge. As a result, no network traffic passes through the cloud, with the cloud providing management functionality out of the data path. This architecture enables networks to scale horizontally, adding capacity simply by adding more endpoints, without concern for centralized bottlenecks or chokepoints. Equally important, since all packet processing is performed on premise, end-user functionality is not compromised if the network's connection to the cloud is interrupted.

Cisco Meraki's cloud platform is designed to spread computation and storage across independent server clusters in geographically isolated datacenters. Any server or datacenter can fail without affecting customers or the rest of the system. Additionally, Cisco Meraki's datacenter design is field proven to support tens of thousands of endpoints.

Cloud Hosted Management

Cloud Management Architecture

Powerful Insight and Troubleshooting Tools

Cisco Meraki's cloud architecture delivers powerful insight and includes live tools integrated directly into the dashboard, giving instant analysis of performance, connectivity, and more. Using live tools, network administrators no longer need to go on site to perform routine troubleshooting tests. Visibility into devices, users, and applications gives administrators the information needed to enforce security policies and enable the performance needed in today's demanding network environments.

Troubleshooting tools such as ping, traceroute, throughput, and even live packet captures are integrated directly into the Cisco Meraki dashboard, dramatically reducing resolution times and enabling troubleshooting at remote locations without on-site IT staff.

Layer 7 application visibility

Layer 7 application visibility



Integrated multi-site management
Integrated multi-site management

Live Troubleshooting Tools
Live Troubleshooting Tools

User and Device Fingerprints
User and Device Fingerprints

Automatic E-mail Alerts
Automatic E-mail Alerts
Scheduled Firmware Updates
Scheduled Firmware Updates

Out-of-Band Control PlaneOut-of-Band Control Plane

Cisco Meraki's out-of-band control plane separates network management data from user data. Management data (e.g., configuration, statistics, monitoring, etc.) flows from Cisco Meraki devices (wireless access points, switches, and security appliances) to Cisco Meraki's cloud over a secure Internet connection. User data (web browsing, internal applications, etc.) does not flow through the cloud, instead flowing directly to its destination on the LAN or across the WAN.

Advantages of an out of band control plane:

Scalability

  • Unlimited throughput: no centralized controller bottlenecks
  • Add devices or sites without MPLS tunnels
  • Add switching capacity without stacking limitations

Reliability

  • Redundant cloud service provides high availability
  • Network functions even if management traffic is interrupted

Security

  • No user traffic passes through Cisco Meraki's datacenters
  • Fully HIPAA / PCI compliant

What happens if a network loses connectivity to the Cisco Meraki cloud?
Because of Cisco Meraki's out of band architecture, most end users are not affected if Cisco Meraki wireless APs, switches, or security appliances cannot communicate with Cisco Meraki's cloud services (e.g., because of a temporary WAN failure):

  • Users can access the local network (printers, file shares, etc.)
  • If WAN connectivity is available, users can access the Internet
  • Network policies (firewall rules, QoS, etc.) continue to be enforced
  • Users can authenticate via 802.1X/RADIUS and can roam wirelessly between access points
  • Users can initiate and renew DHCP leases
  • Established VPN tunnels continue to operate
  • Local configuration tools are available (e.g., device IP configuration)

While Cisco Meraki's cloud is unreachable, management, monitoring, and hosted services are temporarily unavailable:

  • Configuration and diagnostic tools are unavailable
  • Usage statistics are stored locally until the connection to the cloud is re-established, at which time they are pushed to the cloud
  • Splash pages and related functionality are unavailable

Cisco Meraki Datacenter Design

Cisco Meraki's cloud management service is colocated in tier-1, SAS70 type II certified datacenters. These datacenters feature state of the art physical and cyber security and highly reliable designs. All Cisco Meraki services are replicated across multiple independent datacenters, so that customer-facing services fail over rapidly in the event of a catastrophic datacenter failure.

Redundancy
  • Five geographically dispersed datacenters
  • Every customer's data (network configuration and usage metrics) replicated across three independent datacenters
  • Real-time data replication between datacenters (within 60 seconds)
  • Nightly archival backups

Availability Monitoring

  • 24x7 automated failure detection - all servers are tested every five minutes from multiple locations
  • Rapid escalation procedures across multiple operations teams
  • Independent outage alert system with 3x redundancy

Disaster Recovery

  • Rapid failover to hot spare in event of hardware failure or natural disaster
  • Out of band architecture preserves end-user network functionality, even if connectivity to Cisco Meraki's cloud services is interrupted
  • Failover procedures drilled weekly

Cloud Services Security

  • 24x7 automated intrusion detection
  • Protected via IP and port-based firewalls
  • Access restricted by IP address and verified by public key (RSA)
  • Systems are not accessible via password access
  • Administrators automatically alerted on configuration changes

Physical Security

  • High security card keys and biometric readers control facility access
  • All entries, exits, and cabinets are monitored by video surveillance
  • Security guards monitor all traffic into and out of the datacenters 24x7, ensuring that entry processes are followed
Out-of-Band Architecture
  • Only configuration and usage statistics are stored in the cloud
  • End user data does not traverse through the datacenter
  • All sensitive data (e.g., passwords) stored in encrypted format

Disaster Preparedness

  • Datacenters feature sophisticated sprinkler systems with interlocks to prevent accidental water discharge
  • Diesel generators provide backup power in the event of power loss
  • UPS systems condition power and ensure orderly shutdown in the event of a full power outage
  • Each datacenter has service from at least two top-tier carriers
  • Seismic bracing for raised floor, cabinets, and support systems
  • In the event of a catastrophic datacenter failure, services fail over to another geographically separate datacenter

Environmental Controls

  • Over-provisioned HVAC systems provide cooling and humidity control
  • Flooring systems are dedicated for air distribution

Certification

  • Cisco Meraki datacenters are SAS70 type II certified
  • PCI level 1 certified

Service Level Agreement

  • Cisco Meraki's cloud management is backed by a 99.99% uptime SLA. See meraki.cisco.com/trust for details.

Security Tools for Administrators

In addition to Cisco Meraki's secure out-of-band architecture and hardened datacenters, Cisco Meraki provides a number of tools for administrators to maximize the security of their network deployments. These tools provide optimal protection, visibility, and control over your Cisco Meraki network.

Two-factor authentication
Two-factor authentication adds an extra layer of security to an organization's network by requiring access to an administrator's phone, in addition to her username and password, in order to log in to Cisco Meraki's cloud services. Cisco Meraki's two factor authentication implementation uses secure, convenient, and cost effective SMS technology: after entering their username and password, an administrator is sent an a one-time passcode via SMS, which they must enter before authentication is complete. In the event that a hacker guesses or learns an administrator's password, she still will not be able to access the organization's account, as the hacker does not have the administrator's phone. Cisco Meraki includes two-factor authentication for all enterprise users at no additional cost.

Password policies
Organization-wide security policies for Cisco Meraki accounts help protect access to the Cisco Meraki dashboard. These tools allow administrators to:

  • Force periodic password changes (e.g., every 90 days)
  • Require minimum password length and complexity
  • Lock users out after repeated failed login attempts
  • Disallow password reuse
  • Restrict logins by IP address

Role-based administration
Role-based administration lets supervisors appoint administrators for specific subsets of an organization, and specify whether they have read-only access to reports and troubleshooting tools, administer managed guest access, or can make configuration changes to the network. This minimizes the chance of accidental or malicious misconfiguration, and restricts errors to isolated parts of the network.

Configuration change alerts
The Cisco Meraki system can automatically send human-readable email and text message alerts when configuration changes are made, enabling the entire IT organization to stay abreast of new policies. Change alerts are particularly important with large or distributed IT organizations.

Configuration and login audits
Cisco Meraki logs the time, IP, and approximate location (city, state) of logged in administrators. A searchable configuration change log indicates what configuration changes were made, who they were made by, and which part of the organization the change occurred in.

SSL certificates
Cisco Meraki accounts can only be accessed via https, ensuring that all communication between an administrator's browser and Cisco Meraki's cloud services is encrypted.

Idle Timeout
30 seconds before being logged out, users are shown a notice that allows them to extend their session. Once time expires, users are asked to log in again.

Technical Specifications:

Top View

MR66Specifications
Radio
  • 1 x 802.11b/g/n radio, 1 x 802.11a/n radio
  • Auto-selection of optimal 2.4 GHz or 5 GHz band
  • Max radio rate of 300 Mbps per radio
  • 2.4 GHz +26 dBm peak transmission power
  • 5 GHz +24 dBm peak transmission power
Interfaces
  • One 100/1000 Mbps auto-crossover Ethernet port
  • Four external N-type connectors
  • Signal strength LEDs
802.11n Capabilities
  • 2 x 2 multiple input, multiple output (MIMO) with two spatial streams
  • Maximal ratio combining (MRC)
  • Beamforming
  • Packet aggregation
  • Cyclic shift diversity (CSD) support
Power
  • Power over Ethernet: 24 - 57 V (802.3af compatible)
  • Power consumption: 10.5 W max
  • Power over Ethernet injector sold separately
Mounting
  • Mounts to walls and horizontal, vertical, and angled poles
  • Mounting hardware included
Physical Security
  • Security screw included
  • Kensington lock hard point
  • Anti-tamper cable bay
  • Concealed mount plate
Environment
  • Operating temperature: -4°F to 122°F (-20°C to 50°C)
  • IP67 environmental rating (sealed against water and dust)
Physical Dimensions 10.5" x 7.6" x 2.2" (267 mm x 192 mm x 57 mm) not including mount
Weight 1.9 lb (862 g)
Antenna
  • Integrated omni-directional antennas
  • Gain: 3 dBi
Security
  • Integrated policy firewall (Identity Policy Manager)
  • Air Marshal: real-time WIPS with forensics
  • Guest Isolation
  • WEP, WPA
  • WPA2-PSK
  • WPA2-Enterprise with 802.1X
  • TKIP and AES encryption
  • VLAN tagging (802.1Q)
Quality of Service
  • Wireless Quality of Service (WMM/802.11e)
  • DSCP (802.1p)
Mobility
  • PMK and OKC credential support for fast Layer 2 roaming
  • 802.11r and 802.11k
  • L3 roaming
LED Indicators
  • 4 signal strength
  • 1 Ethernet connectivity
  • 1 power/booting/firmware upgrade status
Regulatory
  • FCC (US)
  • IC (Canada)
  • CE (Europe) with DFS
  • C-Tick (Australia)
Certification Wi-Fi Alliance
Warranty 1 year hardware warranty with advanced replacement included

RF Performance Table:

Maximum hardware capability shown above. Transmit power is configurable in increments of 1 dB and is automatically limited by the Cisco Meraki Cloud Controller to comply with local regulatory settings.

Operating Band Operating Mode Data Rate TX Power (dBm) RX Sensitivity
2.4 GHz 802.11b 1 Mb/s 23 -96
2 Mb/s 23 -94
5.5 Mb/s 22 -95
11 Mb/s 21 -92
2.4 GHz 802.11g 6 Mb/s 20 -95
9 Mb/s 26 -94
12 Mb/s 25 -93
18 Mb/s 25 -93
24 Mb/s 24 -90
36 Mb/s 24 -87
48 Mb/s 23 -83
54 Mb/s 21 -81
2.4 GHz 802.11n (HT20) MCS0/8 HT20 22 -96
MCS1/9 HT20 22 -94
MCS2/10 HT20 21 -92
MCS3/11 HT20 21 -89
MCS4/12 HT20 21 -85
MCS5/13 HT20 21 -82
MCS6/14 HT20 20 -81
MCS7/15 HT20 19 -79
2.4 GHz 802.11n (HT40) MCS0/8 HT40 21 -93
MCS1/9 HT40 21 -91
MCS2/10 HT40 21 -89
MCS3/11 HT40 21 -86
MCS4/12 HT40 21 -82
MCS5/13 HT40 21 -79
MCS6/14 HT40 19 -78
MCS7/15 HT40 18 -77
5 GHz 802.11g 6 Mb/s 24 -97
9 Mb/s 24 -96
12 Mb/s 23 -94
18 Mb/s 23 -92
24 Mb/s 22 -90
36 Mb/s 21 -87
48 Mb/s 20 -85
54 Mb/s 20 -83
5 GHz 802.11n (HT20) MCS0/8 HT20 23 -98
MCS1/9 HT20 23 -96
MCS2/10 HT20 22 -93
MCS3/11 HT20 21 -90
MCS4/12 HT20 21 -84
MCS5/13 HT20 20 -82
MCS6/14 HT20 19 -80
MCS7/15 HT20 15 -79
5 GHz 802.11n (HT40) MCS0/8 HT40 23 -94
MCS1/9 HT40 22 -93
MCS2/10 HT40 21 -91
MCS3/11 HT40 20 -88
MCS4/12 HT40 19 -85
MCS5/13 HT40 18 -81
MCS6/14 HT40 18 -78
MCS7/15 HT40 14 -76

Compare Access Points:



  MR66 MR72
MR66 MR72
Usage Rugged/outdoor WLAN, outdoor campuses, industrial, point to point links Rugged/outdoor WLAN, outdoor campuses, industrial, point to point links
Radio specification
  • 1 x 802.11b/g/n radio
  • 1 x 802.11a/n radio
  • 600 Mbit/sec max rate
  • 2x2 MIMO, beamforming
  • 1 x 802.11b/g/n radio
  • 1 x 802.11ac/n radio
  • 1 x WIDS/WIPS radio
  • 1 x Bluetooth radio
  • 1.2 Gbit/sec max rate
  • 2x2 MIMO, beamforming
Interface 1 x Gigabit Ethernet port 1 x Gigabit Ethernet port
Power 802.3af Power over Ethernet 802.3af Power over Ethernet
Physical design
  • Rugged industrial design
  • Water and dust sealed (IP67 rated)
  • Vibration and shock tested
  • Rugged industrial design
  • Water and dust sealed (IP67 rated)
  • Vibration and shock tested
Performance features
  • Priority Voice (802.11e/WMM)
  • Enterprise-grade CPU
  • Hardware-accelerated encryption
  • High-density support
  • Band-steering
  • Priority Voice (802.11e/WMM)
  • Enterprise-grade CPU
  • Hardware-accelerated encryption
  • High-density support
  • Band-steering
Mesh networking Multi-radio mesh Multi-radio mesh

Documentation:

Download the Cisco Meraki MR66 Datasheet (PDF).

It appears you don't have a PDF plugin for this browser. No biggie... you can click here to download the PDF file.

Pricing Notes:

Cisco Meraki Products
Cisco Meraki Accessories
Cisco Meraki 802.3at PoE Injector
#MA-INJ-4
Our Price: £85.09
Inc. VAT: £102.11
Cisco Meraki AC Adapter for MR Wireless Access Points (UK Plug)
#MA-PWR-30W-UK
Our Price: £19.13
Inc. VAT: £22.96
Enterprise Cloud Controller Licensing and Renewal Licensing
Complete enterprise management feature set, including network access control, RADIUS authentication, multi-site management, guest access, diagnostics, monitoring, and traffic shaping. Includes enterprise-class phone support.
Cisco Meraki Enterprise Cloud Controller License, 1 Year
#LIC-ENT-1YR
Our Price: £85.15
Inc. VAT: £102.18
Cisco Meraki Enterprise Cloud Controller License, 3 Year
#LIC-ENT-3YR
Our Price: £191.58
Inc. VAT: £229.90
Cisco Meraki Enterprise Cloud Controller License, 5 Year
#LIC-ENT-5YR
Our Price: £319.30
Inc. VAT: £383.16
Cisco Meraki Enterprise Cloud Controller License, 7 Year
#LIC-ENT-7YR
Our Price: £587.07
Inc. VAT: £704.48
Cisco Meraki Enterprise Cloud Controller License, 10 Year
#LIC-ENT-10YR
Our Price: £838.67
Inc. VAT: £1,006.40