Home
Cisco Catalyst 6500 & 7600 virtual FW licensing f/ 50 VF
Contents
1. Part Number Description FR SVC FWM GTP GTP Protocol Inspection Engine license for Cisco FWSM Software 3 1 3 2 Table 6 System Requirements Support for FWSM 3 1 3 2 Supervisor Engines Cisco IOS 12 2 18 SXF and higher 720 32 12 2 18 SXF2 and higher 2 720 32 Catalyst OS 8 5 3 and higher 2 720 32 Support for FWSM 2 3 and 2 3 FWSM Features Supervisor Engines Multiple SVIs Transparent Firewall with Failover Cisco IOS 12 1 13 E 2 No No 12 1 19 E 2 Yes No 12 1 22 E and higher 2 Yes Yes 12 2 14 SY and higher 2 Yes No 12 2 14 SX and higher 2 720 No No 12 2 17a SX3 2 720 Yes Yes 1 The FWSM does not support the supervisor 1 or 1A FWSM supports Supervisor Engine 2 with Multilayer Switch Feature Card 2 MSFC2 Supervisor 32 or Supervisor 720 Supports multiple switched VLAN interfaces SVIs between the Multilayer Switch Feature Card MSFC and FWSM An SVI is a VLAN interface that is routed on the MSFC Supports transparent firewall mode when you use failover Failover requires BPDU forwarding to the FWSM Other releases that do not support BPDU forwarding only support transparent mode without failover All contents are Copyright 1992 2007 Cisco Systems Inc All rights reserved This document is Cisco Public Information Page 10 of 12 Data Sheet a Support for FWSM 2 3 and 2 3 12 2 17b SXA 2 720 Yes Y
2. 1 million concurrent connections 100 000 connection setups and teardowns per second 256 000 concurrent NAT or PAT translations e Jumbo Ethernet packets 8500 bytes supported VLAN Interfaces 1000 total per service module 256 VLANs per security context in routed mode 8 VLAN pairs per security context in transparent mode Access Lists e Up to 80 000 Access Control Entries in single context mode Note the FWSM implements Layer 3 and 4 access control security checks in hardware with virtually no performance impact using non upgradeable high speed memory Virtual Firewalls Security Contexts e 20 50 100 250 Virtual Firewall licenses e 2 Virtual Firewalls and 1 administrative context are provided for testing purposes All contents are Copyright 1992 2007 Cisco Systems Inc All rights reserved This document is Cisco Public Information Page 4 of 12 Data Sheet ee FWSM Overall Feature Summary Table 2 provides an overall feature summary of the Cisco FWSM Table 2 FWSM Overall Feature Summary Features Summary Scalable Architecture to Support e A variety of industry proven clustering techniques deliver a seamless method Up to 20 Gbps of Firewall to scale firewall performance to 20 Gbps and beyond Services within the Catalyst 6K Infrastructure Visibility into Encrypted Threats Leveraging SSL decryption capabilities within the Catalyst 6K infrastructure the FWSM has the
3. randomized TCP sequence numbers port numbers and additional TCP flags and applies security policy to these connections Building upon the network based firewall services the FWSM also delivers strong application layer security through intelligent application aware inspection engines that examine network flows at Layers 4 7 To defend networks from application layer attacks these inspection engines incorporate extensive application and protocol knowledge and employ security enforcement technologies that include standards conformance checking protocol anomaly detection application and protocol state tracking bidirectional NAT services bidirectional ACLs Port Address Translation PAT and attack detection and mitigation techniques such as application protocol command filtering content verification URL obfuscation and URL filtering These inspection engines give businesses control over instant messaging peer to peer file sharing and tunneling applications In addition the FWSM provides market leading protection for a wide range of VoIP and other multimedia standards Cisco FWSM Platform Performance and Capacities Table 1 provides information on the performance and capacity of the Cisco FWSM Table 1 Cisco FWSM Platform Performance and Capacities Capacities Performance e 5 5 Gbps throughput per service module Up to 4 FWSMs 20 Gbps per Catalyst 6500 chassis with static VLAN or IOS Policy based Routing 2 8 Mpps
4. A 7600 with VPNSM and FWSM Internet Access y with Virtual Firewalls i pe Remote Site Internet Access c adien orporate with Virtual Firewalls Headauarters Security Services Expansion Existing VPN Infrastructure gt All contents are Copyright 1992 2007 Cisco Systems Inc All rights reserved This document is Cisco Public Information Page 8 of 12 Data Sheet a Ordering Information Table 3 Cisco Firewall Services Module Hardware and Software Part Numbers Product Number Description Hardware WS SVC FWM 1 K9 Firewall Services Module for Cisco Catalyst 6500 and 7600 Series WS SVC FWM 1 K9 Firewall Services Module for Cisco Catalyst 6500 and 7600 Series spare Security Bundles WS C6506 E FWM K9 Cisco Catalyst 6506 Firewall Security System with Enhanced Chassis and Supervisor 720 3B WS C6509 E FWM K9 Cisco Catalyst 6509 Firewall Security System with Enhanced Chassis and Supervisor 720 3B WS C6513 FWM K9 Cisco Catalyst 6513 Firewall Security System with Supervisor 720 3B WS 6509EXL 2FWM kK9 Cisco Catalyst 6509 Firewall Security System with Enhanced Chassis Supervisor 720 3BXL and two Firewall Service Modules WS 6513XL 2FWM K9 Cisco Catalyst 6513 Firewall Security System with Supervisor 720 3BXL and two Firewall Service Modules WS 6506 EXL FWM K9 Cisco Catalyst 6506 Firewall Security System with Enhanced Chassis Supervisor 720 3BXL
5. IP traffic standard ACL for OSPF route distribution per user Cisco Secure Access Control Server ACS based ACLs per user ACL override object fgrouping for ACLs time based ACLs Cisco Modular Policy Framework MPF with flow based security policies Cut through user authentication proxy with local database and external AAA server support TCP HTTP FTP HTTPS and others URL filtering Filter HTTP HTTPS and FTP requests by Websense Enterprise or HTTP filtering by N2H2 now part of Secure Computing Corporation Same security level communication between VLANs without NAT static policies and per host maximum connection limit Protection from denial of service DoS attacks DNS Guard Flood Defender Flood Guard TCP Intercept with SYN cookies organization Unicast Reverse Path Forwarding URPF Mail Guard FragGuard and Virtual Reassembly Internet Control Message Protocol ICMP stateful inspection User Datagram Protocol UDP rate control TCP stream re assembly and deobfuscation engine TCP traffic normalization services for attack detection Address Resolution Protocol ARP inspection in transparent firewall mode DHCP server DHCP relay to upstream router with per interface configuration All contents are Copyright 1992 2007 Cisco Systems Inc All rights reserved This document is Cisco Public Information Page 5 of 12 Data Sheet a Features Summary Service Virtualization Transparent Multiple S
6. ability to gain visibility into encrypted policy violations to which traditional firewalls have no visibility Intelligent Network Services Layer 2 Firewall transparent mode with NAT and PAT support Layer 2 Firewall transparent mode with NAT and PAT support Layer 3 Firewall route and or NAT mode Mixed Layer 2 and Lyer 3 firewall per FWSM Dynamic static NAT and PAT Policy based NAT VRF aware NAT Destination NAT for Multicast Static routing support in signle and multiple security content mode Dynamic routing in single security context mode Open Shortest Path First OSPF Routing Initiation Protocol RIP v1 and v2 PIM Sparse Mode v2 multicast routing Internet Group Management Protocol IGMP v2 Dynamic routing in single and virtual security context mode using stub iBGP Licensed feature Transparent mode supports static routing only Private VLAN for L2 and L3 firewall enables firewall security policies between isolated ports Asymmetric routing supporting without redundancy by using asymmetric routing groups IPv6 networking and management access using IPv6 HTTPS Secure Shell Protocol SSH v1 and v2 and Telnet Core Stateful Firewall NAT Translate bypass enhances scalability by not creating NAT translate entries when no NAT control or NAT except is used Selective TCP State Bypass on a per flow basis Timeout on a per flow for TCP and non TCP flows ACLs Extended ACL for IP traffic Ethertype ACL for non
7. in depth IP services solution High Performance High Scalability and Low Latency Ready for the Future The FWSM is based on high speed network processors that provide high performance but retain the flexibility of general purpose CPUs The Cisco FWSM provides industry leading performance of upto 100 000 new connections per second 5 5 Gbps of throughput and one million concurrent connections per service module This superior performance helps organizations meet future growing requirements without requiring a system overhaul Multiple FWSMs can be clustered using static VLAN configurations or the Catalyst 6500 IOS Policy based Routing PBR for directing traffic to these FWSMs Up to four FWSMs can be deployed in the same chassis for a total of 20 Gbps throughput A single FWSM can support up to 1000 virtual interfaces 256 per context and a single chassis can scale up to a maximum of 4000 VLANs In addition two Cisco Application Control Engines ACE can be used within the Catalyst 6500 chassis to load balance three FWSMs for over 15Gbps of firewall throughput over 150 000 connections per second and two million concurrent connections Full firewall protection is applied across the switch backplane giving the lowest latency figures 30 microseconds for small frames possible This is important to secure latency sensitive applications such as financial market data and voice over IP VoIP All contents are Copyright 1992 2007 Cisco Systems
8. interchassis Active Standby stateful failover Active Active stateful failover support in multiple context mode Asymmetric routing support with Active Active redundancy Application Inspection Control Advanced HTTP inspection services RFC compliance checking for protocol anomaly detection HTTP command filtering MIME type filtering content validation Uniform Resource Identifier URI length enforcement and more Tunneling application control AOL Instant Messenger Microsoft Messenger Yahoo Messenger peer to peer applications such as KaZaA and Gnutella and other applications such as GoToMyPC System Management Console to command line interface CLI Session from switch Cisco IOS Software like CLI parser Telnet to the inside interface of FWSM Telnet over IPSec to the outside interface of FWSM SSH v1 and v2 to CLI Web GUl based single device manager HTTP HTTPS Cisco ASDM v5 2F for FWSM 3 2 Cisco ASDM v5 0F for FWSM Software 3 1 Cisco PIX Device Manager 4 1 for FWSM Software 2 3 Web GUI based multiple device manager Cisco Security Manager v3 0 or above for FWSM Software 2 3 or later CiscoWorks VMS Management Center v1 3 for FWSM Software 2 3 or earlier Web GUI based CiscoView Device Manager v1 0 for Cisco Catalyst 6500 to configure FWSM Software 2 3 or earlier and launch Cisco PIX Device Manager Web GUI based multiple device manager CiscoWorks VMS Management Center v1 3 for FWSM Software 2 3 or earlier Cis
9. modules into one chassis allows for ease of use and support for network administrators Role based remote access controls fosters collaboration for IT managers With this modular approach customers can use their existing switching and routing infrastructures for cost effective deployment and can do so while obtaining the highest performance available in the industry and providing secured IP services along with multilayer LAN and WAN switching and routing capabilities Firewall Services Module Benefits Integrated Module Enhances Security and Lowers Cost of Ownership Besides protecting the perimeter of the corporate network from threats the Cisco FWSM is installed inside a Cisco Catalyst 6500 Series switch or Cisco 7600 Series router inspects traffic flows and prevents unauthorized users from accessing a particular subnet workgroup or LAN within a corporate network This intelligent network integration allows the FWSM to provide greater investment protection a lower total cost of ownership and a reduced footprint where power and rack space are at a premium Any physical port on the switch can be configured to operate with firewall policy and protection allowing for easy deployment without additional configuration and cabling and providing firewall security inside the network infrastructure The FWSM can be deployed together with other Cisco Catalyst 6500 Series and Cisco 7600 Series security services modules for a secure multilayer defense
10. Afiafi CISCO Data Sheet Cisco Firewall Services Module for Cisco Catalyst 6500 Series and Cisco 7600 Series Figure 1 Cisco Catalyst 6500 Series and 7600 Series Firewall Services Module The Cisco Firewall Services Module FWSM for Cisco Catalyst 6500 Series switches and Cisco 7600 Series routers is a high performance integrated stateful inspection firewall with application and protocol inspection engines It provides upto 5 5 Gbps of throughput 100 000 new connections per second one million concurrent connections or 256 000 NAT translations and upto 80 000 Access Control Lists Up to four FWSMs can be installed in a single chassis providing scalability up to 20 Gbps per chassis As an extension to the Cisco PIX ASA family of security appliances the FWSM provides large enterprises and service providers with superior security performance and reliability Based on Cisco PIX ASA firewall technology the FWSM is a hardened embedded system that eliminates security holes and performance degrading overhead The Cisco FWSM tracks the state of all network communications and prevents unauthorized network access It delivers strong application layer security through intelligent application aware inspection engines that examine network flows at Layers 4 7 including market leading protection for voice over IP VoIP multimedia instant messaging and peer to peer applications Flexible Management Options The Cisco FWSM is managed
11. Inc All rights reserved This document is Cisco Public Information Page 2 of 12 Data Sheet Service Virtualization Reduces Cost and Complexity of Management The Cisco FWSM provides service virtualization which allows service providers and large enterprises to implement separate policies for different customers or functional areas such as multiple demilitarized zones DMZs over the same physical infrastructure Virtualization helps reduce the cost and complexity of managing multiple devices and makes it easier to add or delete security contexts as subscribers grow A single FWSM can be partitioned into a maximum of 250 virtual firewalls security contexts in Cisco FWSM Software v3 1 or above FWSM virtualization includes support for Transparent Mode Layer 2 and Routed Mode Layer 3 All policies monitoring and logging are supported in FWSM virtualization which includes Network Address Translation NAT access control lists ACLs inspection engines Simple Network Management Protocol SNMP syslog and Dynamic Host Control Protocol DHCP and more The FWSM Resource Manager helps ensure high availability by limiting resource usage allocated to each security context at any time This can prevent certain contexts from consuming all resources and denying those resources to other contexts These resources include number of connections local hosts NATs ACLs bandwidth inspection rates and syslog rates Role based management allows m
12. alyst 6500 and 7600 Series spare Note Cisco Firewall Services Module Software 1 1 has reached end of sale status Customers are encouraged to upgrade or purchase FWSM Software 2 3 or 3 1 3 2 All contents are Copyright 1992 2007 Cisco Systems Inc All rights reserved This document is Cisco Public Information Page 9 of 12 Data Sheet a Licensing Table 4 lists the part numbers that are needed when ordering virtual firewall security context licenses To be able to order any of these license tiers you must be running FWSM Software 2 2 1 or higher No changes in hardware are required when upgrading from FWSM Software 1 1 to versions 2 2 2 3 and 3 1 3 2 Table 4 Context License Part Numbers Part Number Description FR SVC FWM VC T1 20 virtual firewall licenses for Cisco FWSM Software 2 2 or above FR SVC FWM VC T2 50 virtual firewall licenses for Cisco FWSM Software 2 2 or above FR SVC FWM VC T3 100 virtual firewall licenses for Cisco FWSM Software 2 2 or above FR SVC FWM VC T4 250 virtual firewall licenses for Cisco FWSM Software 3 1 or above FR SVC FWM UPGR1 Upgrade from 20 to 50 virtual firewalls for Cisco FWSM Software 2 2 or above FR SVC FWM UPGR2 Upgrade from 50 to 100 virtual firewalls for Cisco FWSM Software 2 2 or above FR SVC FWM UPGR3 Upgrade from 100 to 250 virtual firewalls for Cisco FWSM Software 3 1 3 2 Table 5 GTP GPRS Mobile Wireless Inspection Licenses
13. and one Firewall Service Module WS 6509 EXL FWM K9 Cisco Catalyst 6506 Firewall Security System with Enhanced Chassis Supervisor 720 3BXL and one Firewall Service Module WS C6513 XL FWM K9 Cisco Catalyst 6513 Firewall Security System with Enhanced Chassis Supervisor 720 3BXL and one Firewall Service Module Software SC SVC FWM 1 1 K9 Firewall Services Module Software Release 1 1 for Cisco Catalyst 6500 and 7600 Series SC SVC FWM 1 1 K9 Firewall Services Module Software Release 1 1 for Cisco Catalyst 6500 and 7600 Series spare SC SVC FWM 2 2 K9 Firewall Services Module Software Release 2 2 for Cisco Catalyst 6500 and 7600 Series SC SVC FWM 2 2 K9 Firewall Services Module Software Release 2 2 for Cisco Catalyst 6500 and 7600 Series spare SC SVC FWM 2 3 K9 Firewall Services Module Software Release 2 3 for Cisco Catalyst 6500 and 7600 Series SC SVC FWM 2 3 K9 Firewall Services Module Software Release 2 3 for Cisco Catalyst 6500 and 7600 Series spare SC SVC FWM 3 1 K9 Firewall Services Module Software Release 3 1 for Cisco Catalyst 6500 and 7600 Series SC SVC FWM 3 1 K9 Firewall Services Module Software Release 3 1 for Cisco Catalyst 6500 and 7600 Series spare SC SVC FWM 3 2 K9 Firewall Services Module Software Release 3 2 for Cisco Catalyst 6500 and 7600 Series SC SVC FWM 3 2 K9 Firewall Services Module Software Release 3 2 for Cisco Cat
14. by the integrated Cisco PIX Device Manager PDM for the Cisco FWSM Software v2 3 or earlier or by the Cisco Adaptive Security Device Manager ASDM for Cisco FWSM Software v3 1 or later for device and policy configuration monitoring and troubleshooting of a single FWSM Cisco PDM can be launched from the CiscoWorks CiscoView Device Manager CVDM for device provisioning of Cisco Catalyst switches and other services modules The Cisco FWSM can also be managed from centralized scalable multidevice policy based management tools including CiscoWorks VPN Security Management Solution VMS the Cisco Security Manager and the Cisco Security Monitoring Analysis and Response System MARS Together with other security devices these central management tools manage the FWSM throughout the network in a consistent manner to best expedite large security deployments All contents are Copyright 1992 2007 Cisco Systems Inc All rights reserved This document is Cisco Public Information Page 1 of 13 Data Sheet Security Services Integration The Cisco FWSM can be combined with other Cisco security services modules such as the Intrusion Detection Services Module IDSM 2 IP Security IPSec VPN Shared Port Adapter SPA Traffic Anomaly Detection Module ADM Anomaly Guard Module AGM and the Network Analysis Module NAM 1 and NAM 2 Together these services modules provide a complete self defending network solution Integration of service
15. co Security Manager for FWSM Software 2 3 SNMP v2c MIBs and traps Authenticaiton authorization and accounting AAA TACACS and RADIUS support Role based administrative access Online upgrade Dedicated out of band management interface All contents are Copyright 1992 2007 Cisco Systems Inc All rights reserved This document is Cisco Public Information Page 6 of 12 Data Sheet aT Features Summary Logging Monitoring Syslog External servers up to 16 servers 4 per context e FTP URL ACL logging SNMP v2c Multiplatform real time monitoring analysis and reporting with Cisco Security Monitoring Analysis and Response System MARS v4 2 for FWSM Software 2 3 or later Note Cisco FWSM Software versions 3 2 3 1 2 3 and 2 2 incorporate many of the features from Cisco PIX Security Appliance Software versions 7 0 6 3 and 6 2 respectively Example FWSM Deployments The Cisco FWSM can be deployed in topologies serving enterprise campuses data centers or service providers The FWSM maximizes capital investment by providing the best price performance ratio in a firewall Today s enterprises need more than just perimeter security they need to connect business partners and provide campus security domains that serve multiple groups within these organizations The Cisco FWSM provides a flexible cost effective and performance based solution that allows users and administrators to
16. ecurity Context Mode Routed Mode NAT PAT e ACL Protocol Inspection e SNMP Syslog e DHCP Resource management controls resource usage per security context Inspection Engines Application policy enforcement Protocol conformance checking Protocol state tracking Security checks NAT PAT support Dynamic port allocation Core internet protocols HTTP FTP Trivial File Transfer Protocol TFTP Simple Mail Transfer Protocol SMTP Extended SMTP ESMTP DNS Extended DNS EDNS ICMP TCP UDP Database OS services Internet Locator Services Lightweight Directory Access Protocol ISL LDAP Oracle SQL Net v1 and v2 NetBIOS over IP NFS Remote Shell Protocol RSH sSUNrpc nis XWindows SDMCP Registration Admission and Status RAS v2 Multimedia VoIP H 323 v1 4 H 323 Gatekeeper Cluster GUP message support Session Initiation Protocol SIP SCCP Skinny Skinny Video GPRS Tunneling Protocol GTP vO and v1 3G Mobile Wireless Media Gateway Control Protocol MGCP v0 1 and v1 0 Real Time Streaming Protocol RTSP Telephony Application Programming Interface TAPI and Java TAPI JTAPI T 38 Fax over IP Gatekeeper Routed Control Signaling GKRCS fragmented and segmented multimedia stream inspection Specific applications Microsoft Windows Messenger Microsoft NetMeeting Real Player Cisco IP phones Cisco SoftPhone Security services Point to Point Tuneling Protocol PPTP High Availability Intrachassis and
17. es 12 2 17d SXB and higher 2 720 Yes Yes Catalyst OS 7 5 x 2 No No 7 6 1 through 7 6 4 2 Yes No 7 6 5 and higher 2 Yes Yes 8 2 x and higher 2 720 Yes Yes 8 3 x 2 720 Yes Yes Table 7 Product Specifications Product Specifications Hardware Specification e Weight 10 Ib e Power Consumption 171 78W Regulatory Compliance Safety e UL 1950 e CSA C22 2 No 950 95 e EN60950 e EN60825 1 e TS001 e CE Marking e IEC 60950 AS NZS3260 Telecommunications ITU T G 610 ITU T G 703 ITU T G 707 ITU T G 783 Sections 9 10 ITU T G 784 ITU T G 803 ITU T G 813 ITU T G 825 ITU T G 826 ITU T G 841 ITU T G 957 Table 3 ITU T G 958 ITU T 1 361 ITU T 1 363 ITU 1 432 ITU T Q 2110 ITU T Q 2130 ITU T Q 2140 ITU T Q 2931 ITU T 0 151 ITU T 0 171 ETSI ETS 300 417 1 1 TAS SC BISDN 1998 ACA TS 026 1997 BABT TC 139 Draft 1e EMI e FCC Part 15 Class A When you use Catalyst OS on the supervisor you can use any of the supported Cisco IOS releases above on the MSFC The supervisor software determines the FWSM feature support Autostate feature for rapid link failure detection is supported with Cisco Catalyst OS Release 8 4 1 or later and Cisco IOS 12 2 18 SXF 5 and higher All contents are Copyright 1992 2007 Cisco Systems Inc All rights reserved This document is Cisco Public Information Page 11 of 12 Data Sheet o CE Product Specifications e ICES 003 Class A e VCCI Clas
18. establish security domains with different policies within the organization Using the Cisco FWSM users can set appropriate policies for different VLANs Data centers also require stateful firewall security solutions to filter malicious traffic and protect data in the Demilitarized zones DMZ and extranet server farms while delivering gigabit performance at the lowest possible cost Figure 2 shows secured LAN deployments using the Cisco FWSM in the Enterprise campus and data center All contents are Copyright 1992 2007 Cisco Systems Inc All rights reserved This document is Cisco Public Information Page 7 of 12 Data Sheet Figure 2 Secure LAN Deployments in the Enterprise Campus and Data Center Data Center Campus Firewalls for filtering malicious traffic E Sy Internal firewalls for critical area protection Internet DMZ and Extranet Server Farm Protection At the Enterprise or Service Provider WAN edge the FWSM can also be combined with the Cisco IPSEC VPN SPA to enforce firewall policies per VPN tunnel defined by VRF Figure 3 Secure WAN Deployments in the WAN Edge IPSec VPN MPLS VPN VPNA a 7200 with VAM2 d 5 Branch wi A M Office and Cisco IOS FW ae Ne aaa F Cisco Client SmallPE PE ff a I Di t y gt Dai isp J Internet or MPLS IP or 5 _ Partner a L2 ATM FR 3 Renwork Network Mobile Worker 4 Va Cable DSL y o ISDNISP J Large PE ses hn
19. ital Tower Haarlerbergweg 13 19 USA Singapore 068912 1101 CH Amsterdam C l S C Oo www cisco com www cisco com The Netherlands Tel 408 526 4000 Tel 65 6317 7777 www europe cisco com 800 553 NETS 6387 Fax 65 6317 7799 Tel 31 0 800 020 0791 Fax 408 527 0883 Fax 31 0 20 357 1100 Cisco has more than 200 offices worldwide Addresses phone numbers and fax numbers are listed on the Cisco Website at www cisco com go offices 2007 Cisco Systems Inc All rights reserved CCVP the Cisco logo and the Cisco Square Bridge logo are trademarks of Cisco Systems Inc Changing the Way We Work Live Play and Learn is a service mark of Cisco Systems Inc and Access Registrar Aironet BPX Catalyst CCDA CCDP CCIE CCIP CCNA CCNP CCSP Cisco the Cisco Certified Internetwork Expert logo Cisco IOS Cisco Press Cisco Systems Cisco Systems Capital the Cisco Systems logo Cisco Unity Enterprise Solver EtherChannel EtherFast EtherSwitch Fast Step Follow Me Browsing FormShare GigaDrive HomeLink Internet Quotient IOS iPhone IP TV iQ Expertise the iQ logo iQ Net Readiness Scorecard iQuick Study LightStream Linksys MeetingPlace MGX Networking Academy Network Registrar Packet PIX ProConnect ScriptShare SMARTnet StackWise The Fastest Way to Increase Your Internet Quotient and TransPath are registered trademarks of Cisco Systems Inc and or its affiliates in the United States and certain other countries All other trademarks men
20. s B e EN55022 Class B e CISPR22 Class B e CE Marking e AS NZS3548 Class B Common Criteria e EAL4 NEBS e SR 3580 NEBS Criteria Levels Level 3 compliant e GR 63 CORE NEBS Physical Protection e GR 1089 CORE NEBS EMC and Safety ETSI ETS 300386 2 Switching Equipment For More Information For more information contact your local account representative or visit e Detailed Cisco FWSM Specifications http www cisco com en US docs security fwsm fwsm31 configuration quide specs_f html e Cisco security solutions http www cisco com en US products hw vpndeve index html e Cisco PIX Security Appliance Software http www cisco com go pix e Cisco Adaptive Security Device Manager http www cisco com go asdm e Cisco Catalyst 6500 Series http www cisco com en US products hw switches ps708 index html e Cisco 7600 Series http www cisco com en US products hw routers ps368 index html e CiscoWorks VMS Management Center for Firewalls http Awww cisco com en US products sw cscowork ps2330 e Cisco Security MARS http www cisco com en US products ps624 1 index html e Cisco Security Manager http www cisco com en US products ps6498 index html Americas Headquarters Asia Pacific Headquarters Europe Headquarters Cisco Systems Inc Cisco Systems Inc Cisco Systems International BV 170 West Tasman Drive 168 Robinson Road Haarlerbergpark a a San Jose CA 95134 1706 28 01 Cap
21. t firewall is also supported for multiple virtual firewalls With the release of Cisco FWSM Software v3 1 a mixture of transparent firewall and routed firewall can also be implemented on the same FWSM providing the most flexible network deployment options All Layer 3 firewall features are supported with transparent firewall including NAT and PAT in Cisco FWSM Software v3 2 High Availability For network resilience the Cisco FWSM supports high speed failover between modules within a single Cisco Catalyst 6500 or Cisco 7600 chassis intrachassis and between modules in separate chassis interchassis offering customers complete flexibility in their firewall deployments Cisco FWSM Software v3 1 adds Active Active stateful failover support in multiple context mode in addition to Active Standby stateful failover All contents are Copyright 1992 2007 Cisco Systems Inc All rights reserved This document is Cisco Public Information Page 3 of 12 Data Sheet a Robust Stateful Inspection and Application Layer Security The Cisco FWSM is based on the Cisco PIX firewall technology also known as the Adaptive Security Algorithm ASA The FWSM offers rich stateful inspection firewall services tracking the state of all network communications applying security policy and preventing Denial of Service attacks and unauthorized network access The FWSM creates a connection table entry for a session flow based on the source and destination addresses
22. tioned in this document or Website are the property of their respective owners The use of the word partner does not imply a partnership relationship between Cisco and any other company 0705R Printed in USA C78 383290 02 08 07 All contents are Copyright 1992 2007 Cisco Systems Inc All rights reserved This document is Cisco Public Information Page 12 of 12
23. ultiple IT owners to configure and manage network and application layer security policies Used at the Internet edge the FWSM can be configured to map virtual firewalls to virtual routing and forwarding instances VRFs to provide complete traffic separation and security on the campus network With the default FWSM software up to two security contexts and an additional special administrative context are provided For more security contexts a license must be purchased Ease of Deployment with Transparent Layer 2 Firewall The transparent firewall feature configures the FWSM to act as a Layer 2 bridging firewall and requires minimal changes to the network topology The use of a transparent firewall reduces both the configuration and deployment time There are no IP addresses except for the management interface no subnetting or configuration updates are required with transparent firewalls The transparent firewall feature greatly simplifies deployment in the data center for protecting hosts The transparent firewalls also fit into existing networks with no Layer 3 changes and transparently pass Layer 3 traffic from routers allowing interoperability with IP services such as Hot Standby Router Protocol HSRP Virtual Router Redundancy Protocol VRRP Gateway Load Balancing Protocol GLBP Multicast and non IP traffic such as Internetwork Packet Exchange IPX Multiprotocol Label Switching MPLS and bridge protocol data units BPDUs The transparen
Download Pdf Manuals
Related Search
Related Contents
Harmony Dell E207WFP User's Manual Zebra ZQ510 Philips HD8841 EASY CRONO HR - Anselmo Cola Basic VnmrJ Manual for version 2.x - TAMU NMR Facility Copyright © All rights reserved.
Failed to retrieve file