Cisco PIX 501 Arkusz danych
Przeglądaj online lub pobierz pdf Arkusz danych dla Sprzęt sieciowy Cisco PIX 501. Cisco PIX 501 8 stron. Data sheet
Również dla Cisco PIX 501: Skrócona instrukcja obsługi (20 strony), Skrócona instrukcja obsługi (21 strony), Skrócona instrukcja obsługi (20 strony), Skrócona instrukcja obsługi (18 strony)
Data Sheet
Cisco PIX 501 Security Appliance
®
®
The Cisco
PIX
501 Security Appliance delivers enterprise-class security for small office
and teleworker environments, in a reliable, easy-to-deploy purpose-built appliance. Its
compact, high performance design incorporates a four-port 10/100 Fast Ethernet switch,
making it ideal for securing high-speed broadband Internet connections. Part of the
market-leading Cisco PIX Security Appliance Series, the Cisco PIX 501 Security
Appliance provides a wide range of rich, integrated security services, advanced
networking services, and powerful remote management capabilities in a compact, all-in-
one security solution.
Figure 1.
Cisco PIX 501 Security Appliance
Enterprise-Class Security for Small Office Environments
The Cisco PIX 501 Security Appliance delivers a multi layered defense for small office network
environments through rich, integrated security services, including stateful inspection firewall
services, advanced application and protocol inspection, site-to-site and remote access VPN, in-line
intrusion prevention, and robust multimedia and voice security—all in a single, integrated solution.
Cisco PIX Security Appliances incorporate the state-of-the-art Cisco Adaptive Security Algorithm,
which provides stateful inspection firewall services by tracking the state of all authorized network
communications and by preventing unauthorized network access. As an additional layer of
security, Cisco PIX Security Appliances integrate over two dozen purpose-built inspection engines
that perform in-depth Layers 4–7 inspection of network traffic flows for many of today's popular
applications and protocols. To defend networks from application layer attacks and to give
businesses more control over applications and protocols in their environment, these inspection
engines incorporate extensive application and protocol knowledge and employ security
enforcement technologies that range from protocol conformance checking, application and
protocol state tracking, Network Address Translation (NAT) services, and attack detection and
mitigation techniques such as protocol field length checking and URL length checking.
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 1 of 8