Cisco PIX-525-UR-BUN Datasheet Page 2

  • Download
  • Add to my manuals
  • Print
  • Page
    / 15
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 1
© 2005 Cisco Systems, Inc. All rights reserved.
Important notices, privacy statements, and trademarks of Cisco Systems, Inc. can be found on cisco.com.
Page 2 of 15
and mitigation techniques such as application/protocol command filtering, content verification, and URL deobfuscation. These inspection engines
also give businesses control over instant messaging, peer-to-peer file sharing, and tunneling applications, enabling businesses to enforce usage
policies and protect network bandwidth for legitimate business applications.
Multi-Vector Attack Protection
Cisco PIX Security Appliances incorporate multi-vector attack protection services to further defend businesses from many popular forms of attacks,
including denial-of-service (DoS) attacks, fragmented attacks, replay attacks, and malformed packet attacks. Using a wealth of advanced attack
protection features, including TCP stream reassembly, traffic normalization, DNSGuard, FloodGuard, FragGuard, MailGuard, IPVerify, and TCP
intercept, Cisco PIX Security Appliances identify and stop a wide range of attacks, and can provide real-time alerts to administrators.
Flexible Access Control and Powerful Flow-Based Policies
Administrators can also easily create custom security policies using the flexible access control technologies provided by Cisco PIX Security
Appliances, including network and service object groups, user and group-based policies, and more than 100 predefined applications and protocols.
Using the powerful Modular Policy Framework introduced in Cisco PIX Security Appliance Software v7.0, administrators can define granular flow-
based and class map-based policies, which apply a set of customizable security services, such as inspection engine policies, Quality of Service (QoS)
policies, connection timers, and more, to each administrator-specified traffic flow/class. By combining these flexible access control and per-
flow/class security services, the powerful stateful inspection and application-aware firewall services, and the multi-vector attack protection services
that Cisco PIX Security Appliances deliver, businesses can enforce comprehensive security policies to protect themselves from attack.
MARKET-LEADING VOIP SECURITY SERVICES PROTECT NEXT-GENERATION CONVERGED NETWORKS
Cisco PIX Security Appliances provide market-leading protection for a wide range of voice-over-IP (VoIP) other multimedia standards. This allows
businesses to securely take advantage of the many benefits that converged data, voice, and video networks provide, including improved productivity,
lower operational costs, and increased competitive advantage. By combining VPN and Quality of Service (QoS) with the advanced protocol
inspection services that Cisco PIX Security Appliances provide for these converged networking standards, businesses can securely extend voice and
multimedia services and the benefits they deliver to remote offices, home offices, and mobile users.
ROBUST IPSEC VPN SERVICES COST EFFECTIVELY CONNECT NETWORKS AND MOBILE USERS
Using the new full-featured VPN capabilities of the Cisco PIX 525 Security Appliance, businesses can securely connect networks and mobile users
worldwide across low-cost Internet connections. Solutions supported range from standards-based site-to-site VPN using the Internet Key Exchange
(IKE) and IP Security (IPSec) VPN standards, to the innovative Cisco Easy VPN remote access capabilities found in Cisco PIX Security Appliances
and other Cisco Systems security solutions—such as Cisco IOS® routers and Cisco VPN 3000 Series Concentrators. Cisco Easy VPN delivers a
uniquely scalable, cost-effective, and easy-to-manage remote-access VPN architecture that eliminates the operational costs associated with
maintaining the remote-device configurations that are typically required by traditional VPN solutions. Cisco Easy VPN provides feature-rich remote
access VPN services, including enforcing VPN client security posture requirements and performing automated software updates of Cisco VPN
Clients, to deliver secure, easy-to-manage remote access to corporate networks. Cisco PIX Security Appliances encrypt data using 56-bit Data
Encryption Standard (DES), 168-bit Triple DES (3DES), or up to 256-bit Advanced Encryption Standard (AES) encryption. Certain Cisco PIX 525
Security Appliance models have integrated hardware VPN acceleration, delivering highly scalable, high-performance VPN services.
AWARD-WINNING RESILIENT ARCHITECTURE PROVIDES MAXIMUM BUSINESS UPTIME
Select models of Cisco PIX 525 Security Appliances provide award-winning stateful failover services that ensure resilient network protection for
enterprise network environments. Businesses can deploy Cisco PIX Security Appliances using either an Active/Standby failover design or a more
advanced Active/Active failover design, which supports complex network environments that require asymmetric routing support. Failover pairs
continuously synchronize their connection state and device configuration data, thus providing an easy-to-manage high availability solution.
Page view 1
1 2 3 4 5 6 7 ... 14 15

Comments to this Manuals

No comments