Cisco Cisco ASA 5545-X Adaptive Security Appliance Scheda Tecnica
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Page 1 of 7
Data Sheet
Intrusion Prevention for the Cisco ASA 5500-X
Series
Series
As users and data leave the corporate boundary and the network access layer
becomes more porous, traditional signature technology alone will not suffice. Only
Cisco
becomes more porous, traditional signature technology alone will not suffice. Only
Cisco
®
intrusion prevention (IPS) technology, backed by Cisco Security Intelligence
Operations (SIO), identifies and mitigates attackers and attacks up to Layer 7 with
market-leading, context-aware threat prevention that augments your firewall and VPN
deployment.
market-leading, context-aware threat prevention that augments your firewall and VPN
deployment.
The Cisco ASA 5500-X Series IPS Solution scales from the Cisco Borderless Network Architecture to data center
architectures, with integrated form factors ranging from 1 Gbps to 10 Gbps. Strong default efficacy allows you to
install a device and secure your network immediately. Achieve full visibility across your network with Cisco Security
Manager to mitigate risk and meet compliance - all while reducing your expenses.
Figure 1. Cisco ASA with IPS Product Family
Mitigate Risks
Manage risks with a broad and deep set of inspection capabilities:
●
Defend against zero-day attacks with over 40 engines and 6500 stateful, vulnerability-based signatures that
protect against tens of thousands of current exploits - and countless more to come.
●
Inspect a wide variety of protocols to ensure RFC conformance and prevent hacks.
●
Identify the source of and block denial of service (DoS), distributed denial of service (DDoS), SYN flood,
and encrypted attacks with Cisco Global Correlation.
●
Use patented anti-evasion technology to defend and monitor against worms, viruses, Trojans,
reconnaissance attacks, spyware, botnets, phishing, peer to peer attacks, and malware, as well as
numerous evasion techniques.
●
Guard Cisco infrastructure with specific protections for Unified Communications, WLAN, routing, and
switching.
●
Utilize identity-based firewall to provide granular and powerful policy definition.