Cisco PIX 525 Fiche technique - Page 3
Parcourez en ligne ou téléchargez le pdf Fiche technique pour {nom_de_la_catégorie} Cisco PIX 525. Cisco PIX 525 13 pages. Security appliance
Également pour Cisco PIX 525 : Manuel de l'utilisateur (30 pages)
Data Sheet
eliminates the operational costs associated with maintaining the remote-device configurations that
are typically required by traditional VPN solutions. Cisco Easy VPN provides feature-rich remote
access VPN services, including enforcing VPN client security posture requirements and performing
automated software updates of Cisco VPN Clients, to deliver secure, easy-to-manage remote
access to corporate networks. Cisco PIX Security Appliances encrypt data using 56-bit Data
Encryption Standard (DES), 168-bit Triple DES (3DES), or up to 256-bit Advanced Encryption
Standard (AES) encryption. Certain Cisco PIX 525 Security Appliance models have integrated
hardware VPN acceleration, delivering highly scalable, high-performance VPN services.
Award-Winning Resilient Architecture Provides Maximum Business Uptime
Select models of Cisco PIX 525 Security Appliances provide award-winning stateful failover
services that ensure resilient network protection for enterprise network environments. Businesses
can deploy Cisco PIX Security Appliances using either an Active/Standby failover design or a more
advanced Active/Active failover design, which supports complex network environments that require
asymmetric routing support. Failover pairs continuously synchronize their connection state and
device configuration data, thus providing an easy-to-manage high availability solution.
Synchronization can optionally take place over a high-speed LAN connection, providing another
layer of protection by enabling businesses to geographically separate the failover pair. In the event
of a system or network failure, network sessions are automatically transitioned between
appliances, with complete transparency to users.
Intelligent Networking Services Enable Simplified Deployment and Seamless
Network Integration
Cisco PIX Security Appliances leverage over 20 years of Cisco Systems networking leadership
and innovation to deliver a wide-range of intelligent networking services for seamless integration
into today's diverse network environments. Administrators can easily integrate Cisco PIX Security
Appliances into switched network environments by taking advantage of native 802.1q-based VLAN
support. Cisco IP phone deployments can benefit from the "zero-touch provisioning" services
provided by Cisco PIX Security Appliances, which help the phones automatically register with the
appropriate Cisco CallManager and download any additional configuration information and
software images. Businesses can improve their overall network resiliency by taking advantage of
the robust Open Shortest Path First (OSPF) dynamic routing services provided by Cisco PIX
Security Appliances, which can detect network outages within seconds and route around them.
Mission-critical real-time enterprise applications, collaborative computing applications, and
streaming multimedia services can be securely delivered using the comprehensive PIM-Sparse
Mode v2 and Bidirectional-PIM routing support provided by Cisco PIX Security Appliances.
Businesses can secure deployments of next-generation IPv6 networks using the advanced IPv6
security services provided by Cisco PIX Security Appliances, while simultaneously securing
existing IPv4 environments with the same appliance during the transition period towards an IPv6
infrastructure.
Flexible Management Solutions Lower Operational Costs
The Cisco PIX 525 Security Appliance delivers a wealth of configuration, monitoring, and
troubleshooting methods, giving businesses flexibility to use the methods that best meet their
needs. Management solutions range from centralized, policy-based management tools to
integrated, Web-based management, to support for remote-monitoring protocols such as Simple
Network Management Protocol (SNMP) and syslog. Cisco PIX Security Appliances additionally
provide up to 16 levels of customizable administrative roles, so that businesses can grant
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 3 of 13