Cisco PIX 501 3DES BUNDLE CHASSIS AND SOFTWARE 10U 사양 가이드
Cisco Systems, Inc.
All contents are Copyright © 1992–2004 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement.
Page 1 of 11
DATA SHEET
CISCO PIX 501 SECURITY APPLIANCE
The Cisco
®
PIX
®
501 Security Appliance delivers enterprise-class security for small office and teleworker environments, in a reliable, easy-to-
deploy purpose-built appliance. Its compact, high performance design incorporates a four-port 10/100 Fast Ethernet switch, making it ideal for
securing high-speed broadband Internet connections. Part of the market-leading Cisco PIX Security Appliance Series, the Cisco PIX 501
Security Appliance provides a wide range of rich, integrated security services, advanced networking services, and powerful remote management
capabilities in a compact, all-in-one security solution.
Figure 1
Cisco PIX 501 Security Appliance
ENTERPRISE-CLASS SECURITY FOR SMALL OFFICE ENVIRONMENTS
The Cisco PIX 501 Security Appliance delivers a multi layered defense for small office network environments through rich, integrated security
services, including stateful inspection firewall services, advanced application and protocol inspection, site-to-site and remote access VPN, in-
line intrusion prevention, and robust multimedia and voice security—all in a single, integrated solution.
Cisco PIX Security Appliances incorporate the state-of-the-art Cisco Adaptive Security Algorithm, which provides stateful inspection firewall
services by tracking the state of all authorized network communications and by preventing unauthorized network access. As an additional layer
of security, Cisco PIX Security Appliances integrate over two dozen purpose-built inspection engines that perform in-depth Layers 4–7
inspection of network traffic flows for many of today’s popular applications and protocols. To defend networks from application layer attacks
and to give businesses more control over applications and protocols in their environment, these inspection engines incorporate extensive
application and protocol knowledge and employ security enforcement technologies that range from protocol conformance checking, application
and protocol state tracking, Network Address Translation (NAT) services, and attack detection and mitigation techniques such as protocol field
length checking and URL length checking.