Cisco 3725 CISCO3725 Data Sheet

Product codes
CISCO3725
Page of 14
Cisco Systems, Inc.
All contents are Copyright © 1992–2004 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement.
Page 5 of 14
Three combination Voice + ATM AIM modules are available on the Cisco 3700 Series. The AIM-ATM provides
asynchronous transfer mode (ATM) services to the WAN. The AIM-VOICE-30 provides digital signal
processor (DSP) services, which can support up to 30 medium-complexity voice channels. The AIM-ATM-VOICE-
30 combines the features from the AIM-ATM and AIM-VOICE-30 modules onto a single AIM module. These AIM
modules supplement the broad portfolio of Cisco voice solutions and allow enterprises and service providers the
flexibility of implementing ATM and voice solutions on the routers. These three Voice and ATM AIM modules
provide a cost-effective option for reducing recurring cost and maximizing the benefits of the advanced bandwidth
management features of the Cisco IOS software.
The AIM-ATM offers ATM adaptation layer 2 (AAL2) and ATMadaptation layer 5 (AAL5) support for low-density
T1/E1 data and voice connections over ATM networks. It supports the following ATM-IMA capabilities: up to 4
T1/E1 of IMA with a single AIM-ATM, and 8 T1/E1 of IMA with two AIM-ATM’s (maximum 4 T1/E1 IMA bundle).
This AIM module allows service providers and enterprise customers to take advantage of the reliability and quality
of service (QoS) available with ATM connectivity. The AIM-VOICE-30 contains DSPs that can support up to
30 medium-complexity voice channels when used with the Voice/WAN (VWIC-MFT) interface card. When the AIM-
VOICE-30 can be used in a Cisco 3700, for voice over IP (VoIP) or voice over Frame Relay (VoFR) connectivity while
freeing up the network module slot for other applications. The AIM-ATM-VOICE-30 combines the ATM features
of AIM-ATM and voice features of AIM-VOICE-30 in a single AIM.
The Data Encryption AIM’s available for the Cisco 3700 Series offloads encryption processing from the CPU,
providing over 10 times the performance over software-only encryption. The AIM-VPN/EP on the Cisco 3725
supports a maximum of 800 tunnels. On the Cisco 3745, the AIM-VPN/HP supports a maximum of 1,800 tunnels.
The recently released AIM-VPN/EPII and AIM-VPN/HPII further extends the encryption performance of the
Cisco 3700. These modules offers hardware accelerated DES/3DES and the new AES (Advanced Encryption
standard) encryption at speeds up to 90-Mbps on the Cisco 3745 (max based on 1400 byte packet size). In addition
the AIM-VPN/EPII and AIM-VPN/HPII support hardware-assisted layer-3 compression services where bandwidth
conservation may lower network connection costs. The AIM-VPN/EPII on the Cisco 3725 supports a maximum
of 8,000 tunnels, and the Cisco 3745, with the AIM-VPN/HPII supports a maximum of 10,000 tunnels.
KEY APPLICATIONS AND BENEFITS
The Cisco 3700 platforms are designed for the Full Service Branch office that are deploying advanced applications,
that require higher performance for voice, security, QoS, content acceleration and delivery, and high availability
at the network edge by integrating functions previously addressed by a combination of platforms.
ADVANCED SECURITY SERVICES AND VPN’S
The Security and VPN features of the Cisco 3700 offer customers the ability to deploy proven security features such
as secure VPNs, Intrusion Detection Systems (IDS), and firewalls, as well as high-speed Internet access and the ability
to create extranets or demilitarized zones (DMZs). Cisco access routers deliver a rich, integrated package of routing,
firewall, intrusion detection, and VPN functions for multiservice applications.
VPNs help companies reap benefits such as dramatically lowered WAN costs, improved global connectivity, and
better reliability, while enabling capabilities such as secure extranet communications. Remote dial, Internet, intranet,
and extranet access can all be consolidated over a single WAN connection to the Internet. The Cisco 3700 VPN
solution supports the features essential to VPNs—IPSec data encryption, tunneling, broad certificate authority
support for public key infrastructure (PKI)—and advanced features such as stateful VPN failover, certificate auto-