MX Sizing Guide: Choosing the Right Cisco Meraki Appliance for Your Network

This document provides a comprehensive Sizing Guide for networks deploying Cisco Meraki MX firewall appliances. It is designed to assist you in selecting the most appropriate MX model, understanding performance variations based on enabled features, and comparing MX appliances to other vendors.

Current Firmware Version: MX 18.2x

Understanding This Sizing Guide

This guide is intended to support the architectural design of networks incorporating MX security and SD-WAN appliances. It aims to address key questions such as:

  • How to determine the ideal MX model for evaluation?
  • How do different features impact device performance?
  • How do MX models stack up against competitors?

While this document offers valuable guidance, we highly recommend conducting a proof of concept in your specific network environment to validate design and implementation. Each network possesses unique characteristics, and real-world testing is crucial.

With each new MX firmware release, performance metrics like throughput, feature-specific data, and session/flow capacity may be updated. This guide will be regularly revised to reflect the latest performance benchmarks across various scenarios and network environments.

It’s important to remember that the performance figures presented here are derived from controlled testing environments, simulating optimal network conditions. Real-world network behavior and traffic profiles can vary, and these factors should be considered during your sizing process.

The performance metrics detailed in this guide are based on the Current Firmware Version mentioned above. Please note that MX 18.2x firmware is not supported on all platforms. Further compatibility details can be found here.

Cisco Meraki MX Portfolio Capabilities: An Overview

Cisco Meraki MX Security and SD-WAN Appliances offer a robust, all-in-one solution, integrating unified threat management (UTM) and SD-WAN functionalities. Selecting the right MX appliance hinges on your specific use case and deployment needs. For detailed specifications of vMX devices, please consult the vMX specific data sheet.

The following tables summarize the hardware capabilities across the MX, Z-Series, and vMX portfolios.

MX-Series Appliances

For MX67(C/W) models, a convertible LAN interface provides dual WAN capability. Cellular failover is available for models without integrated cellular by using an MG cellular gateway. Dual power supply models feature active/standby redundancy but do not offer combined power output. MX68 and MX75 offer PoE+ on LAN ports, while MX85, MX95, and MX105 provide PoE+ on WAN ports, supporting PoE/PoE+ to an MG gateway. Refer to specific product datasheets for complete details. HTTPS Inspection is supported natively via Cisco Umbrella SD-WAN extension or through third-party VPN integration.

MX67 (C/W) MX68 (W/CW) MX75 MX85 MX95 MX105 MX250 MX450
Dual Active WAN Yes Yes Yes Yes Yes Yes Yes Yes
3G/4G Failover Yes Yes Yes Yes Yes Yes Yes Yes
Built-in LTE Modem* Yes Yes No No No No No No
Built-in Wi-Fi** Yes Yes No No No No No No
Built-in PoE+ No Yes Yes Yes Yes Yes No No
WAN Fiber Connectivity No No SFP SFP SFP+ SFP+ SFP, SFP+ SFP, SFP+
Dual Power Supply No No No No No Yes Yes Yes
Form Factor Desktop Desktop Desktop 1U 1U 1U 1U 1U
HTTPS Inspection Yes Yes Yes Yes Yes Yes Yes Yes
Advanced Malware Protection (AMP) Yes Yes Yes Yes Yes Yes Yes Yes
Intrusion Detection and Prevention (SNORT IPS/IDS) Yes Yes Yes Yes Yes Yes Yes Yes

* – Only on models designated with ‘C’ (e.g., MX67C, MX68C). ** – Only on models designated with ‘W’ (e.g., MX67W, MX68W).

Z-Series Teleworker Gateways

Z3 (C) Z4 (C)
Dual Active WAN No No
3G/4G Failover Model Available Yes Yes
Built-in LTE Modem Model Available Yes Yes
Built-in Wi-Fi Available Yes Yes
Built-in PoE (LAN Port) Model Available Yes (802.3af, PoE) Yes (802.3at, PoE+)
WAN Fiber Connectivity No No
Dual Power Supply No No
Form Factor Desktop Desktop
HTTPS Inspection Yes Yes
Advanced Malware Protection (AMP) No Yes
Intrusion Detection and Prevention (SNORT IPS/IDS) No No

vMX-Series Virtual Appliances

vMX-Small vMX-Medium vMX-Large vMX-Extra Large
Dual WAN N/A N/A N/A N/A
3G/4G/5G Failover N/A N/A N/A N/A
Built-in LTE Modem Model Available N/A N/A N/A N/A
Built-in Wireless Available N/A N/A N/A N/A
Built-in PoE+ Model Available N/A N/A N/A N/A
WAN Fiber Connectivity N/A N/A N/A N/A
Dual Power Supply N/A N/A N/A N/A
Form Factor Virtual Virtual Virtual Virtual
HTTPS Inspection N/A N/A N/A N/A
Advanced Malware Protection (AMP) N/A N/A N/A N/A
Intrusion Detection and Prevention (SNORT IPS/IDS) N/A N/A N/A N/A

Use Case Based MX Model Recommendations

Device throughput, feature set, and flow table capacity are key factors in determining use case suitability. For sizing purposes, we assume each client consumes up to 50 flows.

MX-Series Recommended Device Count

MX67 MX68 MX75 MX85 MX95 MX105 MX250 MX450
Recommended Maximum Device Count 50 50 200 250 500 750 2,000 10,000

Z-Series Recommended Device Count

Z3 (C) Z4 (C)
Recommended Maximum Device Count 5 15

vMX-Series Recommended Device Count

vMX-Small vMX-Medium vMX-Large vMX-Extra Large
Recommended Maximum Device Count 500 2,500 10,000 20,000

Feature-Specific Performance Data

Consider the following points regarding feature performance:

  • Maximum site-to-site VPN tunnel counts are based on lab tests without client traffic over VPN.
  • Recommended maximum site-to-site VPN tunnel counts are based on lab tests with client traffic over VPN.
  • Client VPN load balancing can be implemented for deployments requiring over 500 connections.
  • Specific criteria must be met for WAN, dynamic path selection, or tunnel failover times to be achieved.

MX-Series Feature Performance

MX67 MX68 MX75 MX85 MX95 MX105 MX250 MX450
Maximum Site to Site VPN Tunnel Count 50 50 75 200 500 1,000 3,000 5,000
Recommended Maximum Site to Site VPN Tunnel Count 50 50 75 100 250 500 1,000 1,500
Maximum Number of Client VPN Tunnels 50 50 75 100 250 250 500 500
Maximum Number of AnyConnect Sessions 100 100 250 250 500 750 1000 1500
WAN Failover < 5 Sec < 5 Sec < 5 Sec < 5 Sec < 5 Sec < 5 Sec < 5 Sec < 5 Sec
Auto VPN Tunnel Failover Sub-second Sub-second Sub-second Sub-second Sub-second Sub-second Sub-second Sub-second
Dynamic Path Selection Sub-second Sub-second Sub-second Sub-second Sub-second Sub-second Sub-second Sub-second

Z-Series Feature Performance

Z3 (C) Z4 (C)
Maximum Site to Site VPN Tunnel Count 10 10
Recommended Maximum Site to Site VPN Tunnel Count 4 8
Maximum Number of Client VPN Tunnels 1 2
WAN Failover < 5 Sec < 5 Sec
Auto VPN Tunnel Failover Sub-second Sub-second
Dynamic Path Selection Sub-second Sub-second

vMX-Series Feature Performance

vMX-Small vMX-Medium vMX-Large vMX-Extra Large
Maximum Site to Site VPN Tunnel Count 50 250 1,000 10,000
Recommended Maximum Site to Site VPN Tunnel Count 50 250 1,000 10,000
Maximum Number of Client VPN Tunnels 50 250 500 To be announced
WAN Failover N/A N/A N/A N/A
Auto VPN Tunnel Failover Sub-second Sub-second Sub-second Sub-second
Dynamic Path Selection Sub-second Sub-second Sub-second Sub-second

Flow and Session Capacity for MX Appliances

Understanding the flow and session capacity of each appliance is crucial for proper sizing. A flow is defined as any transmission on an open socket within a 5-minute window. These values represent maximum capacities, not recommended operating levels.

MX-Series Session Capacity

MX67 MX68 MX75 MX85 MX95 MX105 MX250 MX450
Maximum Concurrent Sessions 25,000 25,000 50,000 125,000 200,000 250,000 500,000 1,000,000

Z-Series Session Capacity

Z3 (C) Z4 (C)
Maximum Concurrent Sessions 5,000 10,000

vMX-Series Session Capacity

vMX-Small vMX-Medium vMX-Large vMX-Extra Large
Maximum Concurrent Sessions 25,000 125,000 1,000,000 1,000,000

Performance Benchmarks for MX Appliances

Industry-standard benchmarks facilitate comparisons between MX appliances and those from other vendors. These tests are conducted under ideal network conditions with optimized traffic patterns. Unless specified, features are disabled when measuring maximum throughput for a given feature. Actual performance may vary.

Key considerations for performance data:

  • Firewall Throughput Tests: Layer 3 Firewall, QoS, and DPI (NBAR) are enabled.
  • Advanced Security Throughput Tests (MX-Series): QoS, DPI (NBAR), IPS Ruleset ‘Connectivity’, AMP, Content Filtering, and IPS Mode (Detection or Prevention) are enabled.
  • Single & Multi-Tunnel VPN Throughput Tests: QoS, DPI (NBAR), and Layer 3 Firewall are enabled.
  • Secure Teleworker Throughput Tests (Z-Series): QoS, DPI (NBAR), and AMP are enabled.

MX-Series Performance Data

MX67 MX68 MX75 MX85 MX95 MX105 MX250 MX450
Firewall Throughput RFC2544 – 1518 Byte 700 Mbps 700 Mbps 1 Gbps 1 Gbps 2.5 Gbps 5 Gbps 7.5 Gbps 10 Gbps
Firewall Throughput EMIX 700 Mbps 700 Mbps 1 Gbps 1 Gbps 2.5 Gbps 5 Gbps 7 Gbps 10 Gbps
NGFW Throughput (Advanced Security – Prevention) EMIX 300 Mbps 300 Mbps 500 Mbps 500 Mbps 1.5 Gbps 2 Gbps 1.5 Gbps 3.5 Gbps
NGFW Throughput (Advanced Security – Detection) EMIX 400 Mbps 400 Mbps 1 Gbps 1 Gbps 2 Gbps 2.5 Gbps 3.5 Gbps 7 Gbps
Single Tunnel VPN Throughput RFC2544 1400 Byte 400 Mbps 400 Mbps 1 Gbps 1 Gbps 2.0 Gbps 2.5 Gbps 3 Gbps 3.5 Gbps
Multi-Tunnel VPN Throughput RFC2544 1400 Byte ≤ 400 Mbps ≤ 400 Mbps 1 Gbps 1 Gbps 2.5 Gbps 3 Gbps 3.5 Gbps 4.5 Gbps
Single Tunnel VPN Throughput EMIX 300 Mbps 300 Mbps 1 Gbps 1 Gbps 1.5 Gbps 2 Gbps 2 Gbps 3 Gbps
Multi-Tunnel VPN Throughput EMIX ≤ 300 Mbps ≤300 Mbps ≤ 1 Gbps ≤ 1 Gbps ≤ 1.5 Gbps ≤ 2 Gbps ≤ 2 Gbps 4.5 Gbps

Note: NGFW = next-generation firewall, EMIX = enterprise mix

Z-Series Performance Data

Z3 (C) Z4 (C)
Secure Teleworker Throughput NA 300 Mbps
Firewall Throughput RFC2544 – 1518 Byte 200 Mbps 500 Mbps
Firewall Throughput EMIX 200 Mbps 500 Mbps
Single Tunnel VPN Throughput RFC2544 1400 Byte 75 Mbps 250 Mbps
Single Tunnel VPN Throughput EMIX 50 Mbps 250 Mbps

vMX-Series Performance Data

vMX-Small vMX-Medium vMX-Large vMX-Extra Large
vMX VPN Throughput iPerf 250 Mbps 500 Mbps 1 Gbps 10 Gbps

Feature Benefits and Performance Considerations

Each MX feature offers distinct advantages for specific network scenarios. Below is a detailed look at key features, their use cases, and sizing recommendations for deployment.

Cisco Advanced Malware Protection (AMP)

Cisco AMP, a leading anti-malware solution, is integrated into MX Security Appliances. For guest VLANs, consider disabling AMP and using firewall rules for isolation. If endpoints are protected by a robust malware client like AMP for Endpoints, disabling AMP on the MX for internal traffic might be considered for optimized performance.

Content Filtering

Powered by Cisco TALOS, content filtering allows blocking website categories based on organizational policies. Implement content filtering strategically, blocking only necessary categories aligned with your organization’s security posture.

Web-Safe Search

MX Security Appliances can enforce web-safe search filtering for all web searches. For effective filtering, this feature should be used in conjunction with the “disable encrypted search” option.

Cisco IPS/IDS (SNORT)

The Snort-based Intrusion Prevention and Detection System (IPS/IDS) monitors and safeguards your network from malicious activities. Rulesets beyond ‘Connectivity’ can have a greater impact on performance. In bandwidth-constrained environments, avoid sending IDS/IPS syslog data over VPN.

HTTPS Inspection

HTTPS Inspection enhances advanced security features by enabling inspection of encrypted HTTPS traffic. Utilizing Cisco Umbrella SD-WAN extensions to offload HTTPS Inspection processing from MX appliances can significantly reduce performance overhead.

VPN Tunnel Count

Auto VPN simplifies VPN tunnel creation between sites. Consider using split-tunnel VPN configurations when deploying security services at the network edge to optimize VPN tunnel usage and performance.

FIPS Mode

FIPS (Federal Information Processing Standard) mode ensures that MX devices utilize only FIPS-compliant cryptographic mechanisms. When planning to implement FIPS mode, consult with your account specialist for proper sizing and network architecture guidance, as it can impact performance, especially with VPN services.

Performance Impact Breakdown by Feature

Feature Name Performance Impact
Cisco Advanced Malware Protection (AMP) Low
Content Filtering Low
Web-Safe Search Low
FIPS Mode (Non-VPN Services) Low
Cisco IDS/IPS (SNORT) Medium
HTTPS Inspection (On-device) High
Number of VPN Tunnels High
FIPS Mode (VPN Services) High

Comments

No comments yet. Why don’t you start the discussion?

Leave a Reply

Your email address will not be published. Required fields are marked *