CISCO

CISCO ASA5555-FPWR-K9 ASA 5555-X - Security appliance - 8 ports - 1GbE - 1U - rack-mountable - with FirePOWER Services

0 review Write a Review
Granular application, user, and device control. Cisco ASA CX blocks port- and protocol-hopping applications such as Skype and other peer-to-peer applications, p…
SKU:
ASA5555-FPWR-K9
UPC:
882658738630
Condition:
New
Weight:
29.70 LBS
Minimum Purchase:
1 unit
Unit of Measure:
EA
QPU:
1
Country of Origin:
CN
UNSPSC Code:
43222501
UNSPSC Commodity:
Firewall network security equipment
Model No:
5555-X
DEPT:
PC ACCESSORIES
CLASS:
INPUT DEVICES / INPUT ACC
number of ports:
8
depth:
19-1/10 in.
height:
1-7/10 in.
width:
16-9/10 in.
model:
5555-X
quantity:
1
Request a Quote
Granular application, user, and device control. Cisco ASA CX blocks port- and protocol-hopping applications such as Skype and other peer-to-peer applications, providing more effective security while requiring fewer policies. It enables policies to be written based on a wide range of contextual elements, including application, user, device, and location. Unprecedented network visibility. Cisco ASA CX context-aware security gives security administrators an unprecedented level of visibility into the traffic flowing through the network, including the users connecting to the network, the devices used, and the applications and websites that are accessed. ASA CX uses Cisco security technologies to provide actionable intelligence to security administrators. For example, Cisco AnyConnect provides information on the type and location of a mobile device before it can access the network. ASA CX also uses global threat intelligence from Cisco Security Intelligence Operations (SIO) to provide zero-day threat protection. Comprehensive security architecture. ASA CX extends the ASA platform to provide unprecedented visibility and control. Support for Layer 3 and Layer 4 stateful firewall features, including access control, network address translation, and stateful inspection, enables organizations to keep existing stateful inspection firewall policies that are essential for a host of compliance regulations, while adding Layer 7 context-aware rules that can act intelligently on contextual information.

Customers Also Viewed