Cisco Cisco ASA 5545-X Adaptive Security Appliance - No Payload Encryption 데이터 시트

다운로드
페이지 7
 
 
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. 
Page 1 of 7 
Data Sheet 
Intrusion Prevention for the Cisco ASA 5500-X 
Series 
As users and data leave the corporate boundary and the network access layer 
becomes more porous, traditional signature technology alone will not suffice. Only 
Cisco
®
 intrusion prevention (IPS) technology, backed by Cisco Security Intelligence 
Operations (SIO), identifies and mitigates attackers and attacks up to Layer 7 with 
market-leading, context-aware threat prevention that augments your firewall and VPN 
deployment. 
The Cisco ASA 5500-X Series IPS Solution scales from the Cisco Borderless Network Architecture to data center 
architectures, with integrated form factors ranging from 1 Gbps to 10 Gbps. Strong default efficacy allows you to 
install a device and secure your network immediately. Achieve full visibility across your network with Cisco Security 
Manager to mitigate risk and meet compliance - all while reducing your expenses. 
Figure 1.    Cisco ASA with IPS Product Family 
 
Mitigate Risks 
Manage risks with a broad and deep set of inspection capabilities: 
● 
Defend against zero-day attacks with over 40 engines and 6500 stateful, vulnerability-based signatures that 
protect against tens of thousands of current exploits - and countless more to come. 
● 
Inspect a wide variety of protocols to ensure RFC conformance and prevent hacks. 
● 
Identify the source of and block denial of service (DoS), distributed denial of service (DDoS), SYN flood, 
and encrypted attacks with Cisco Global Correlation. 
● 
Use patented anti-evasion technology to defend and monitor against worms, viruses, Trojans, 
reconnaissance attacks, spyware, botnets, phishing, peer to peer attacks, and malware, as well as 
numerous evasion techniques. 
● 
Guard Cisco infrastructure with specific protections for Unified Communications, WLAN, routing, and 
switching. 
● 
Utilize identity-based firewall to provide granular and powerful policy definition.