Wednesday, October 10, 2007

Cisco Catalyst 6500 and 6500-E Series Switch


Product Overview
The Cisco® Catalyst® 6500 and 6500-E Series sets the new standard for IP Communications and application delivery in enterprise campus and service provider networks by maximizing user productivity and enhancing operational control. As the premier intelligent, multilayer modular Cisco switch, the Catalyst 6500 Series delivers secure, converged, end-to-end services, from the wiring closet to the core network, the data center, and the WAN edge. The 6500-E series switches offer enhancements to scale beyond the 4000W power supply. Today's 6500 series switch cannot scale beyond 4000W of total system capacity except for 6513. The 6513 can support up to 6000W of power.


Ideal for enterprises and service providers seeking to reduce total cost of ownership (TCO), the Cisco Catalyst 6500 Series provides unprecedented investment protection and delivers scalable performance and port density across several chassis configurations and LAN, WAN, and metropolitan-area network (MAN) interfaces. Available in 3-, 6-, 9-, and 13-slot chassis, Catalyst 6500 Series switches feature an unparalleled range of integrated services modules, including multigigabit network security, content switching, telephony, and network analysis modules.


Through a forward-thinking architecture that uses a common set of modules and OS software across all Cisco Catalyst 6500 Series chassis (Figure 1), the Catalyst 6500 Series delivers a high level of operational consistency that optimizes IT infrastructure usage and enhances return on investment (ROI). From 48-port to 576-port 10/100/1000 or from 1152-port 10/100 Ethernet wiring closets to 400 million packets per second (mpps) network cores supporting up to 192 1-Gbps or 32 10-Gbps trunks, the Catalyst 6500 Series provides an optimal platform that maximizes network uptime with stateful failover capability between redundant routing and forwarding engines.


With numerous industry-leading features, the Cisco Catalyst 6500 Series supports three generations of modules that continue to demonstrate the value of the Catalyst 6500 Series and the commitment of Cisco Systems® to innovation. The new generation of Catalyst 6500 Series modules and Catalyst 6500 Series Supervisor Engine 720 devices incorporate 11 new application-specific integrated circuits (ASICs)-extending Cisco's leadership in networking while providing unparalleled investment protection.


Configurations Include:


Used Cisco WS-C6509

Used Cisco WS-C6509-1300AC

Used Cisco WS-CAC-1300W

Used Cisco WS-CAC-2500W

Used Cisco WS-SUP720

Used Cisco WS-X6148-RJ45V

Used Cisco WS-X6182-2PA

Used Cisco WS-X6248-RJ45

Used Cisco WS-X6316-GE-TX

Used Cisco WS-X6348-RJ45

Used Cisco WS-X6348-RJ45V

Used Cisco WS-X6381-IDS

Used Cisco WS-X6408A-GBIC

Used Cisco WS-X6416-GBIC

Used Cisco WS-X6416-GE-MT

Used Cisco WS-X6516-GBIC

Used Cisco WS-X6K-S2-MSFC2

Used Cisco WS-X6K-SUP1-2GE

Used Cisco WS-X6K-SUP1A-2GE

Tuesday, October 02, 2007

Advanced Firewall Services Deliver Strong Business Protection and Rich Application Control


Robust Stateful Inspection and Application Layer Security

Cisco PIX Security Appliances integrate a broad range of advanced firewall services to protect businesses from the constant barrage of threats on the Internet and in many business network environments. As a secure foundation, Cisco PIX Security Appliances provide rich stateful inspection firewall services, tracking the state of all network communications and preventing unauthorized network access. Building upon those services, Cisco PIX Security Appliances deliver strong application layer security through 30 intelligent, application-aware inspection engines that examine network flows at Layers 4-7. To defend networks from application layer attacks and to give businesses more control over applications and protocols used in their environment, these inspection engines incorporate extensive application and protocol knowledge and employ security enforcement technologies that include protocol anomaly detection, application and protocol state tracking, Network Address Translation (NAT) services, and attack detection and mitigation techniques such as application/protocol command filtering, content verification, and URL deobfuscation. These inspection engines also give businesses control over instant messaging, peer-to-peer file sharing, and tunneling applications, enabling businesses to enforce usage policies and protect network bandwidth for legitimate business applications.


Multi-Vector Attack Protection

Cisco PIX Security Appliances incorporate multi-vector attack protection services to further defend businesses from many popular forms of attacks, including denial-of-service (DoS) attacks, fragmented attacks, replay attacks, and malformed packet attacks. Using a wealth of advanced attack protection features, including TCP stream reassembly, traffic normalization, DNSGuard, FloodGuard, FragGuard, MailGuard, IPVerify, and TCP intercept, Cisco PIX Security Appliances identify and stop a wide range of attacks, and can provide real-time alerts to administrators.


Flexible Access Control and Powerful Flow-Based Policies

Administrators can also easily create custom security policies using the flexible access control technologies provided by Cisco PIX Security Appliances, including network and service object groups, user and group-based policies, and more than 100 predefined applications and protocols. Using the powerful Modular Policy Framework introduced in Cisco PIX Security Appliance Software v7.0, administrators can define granular flow-based and class map-based policies, which apply a set of customizable security services, such as inspection engine policies, Quality of Service (QoS) policies, connection timers, and more, to each administrator-specified traffic flow/class. By combining these flexible access control and per-flow/class security services, the powerful stateful inspection and application-aware firewall services, and the multi-vector attack protection services that Cisco PIX Security Appliances deliver, businesses can enforce comprehensive security policies to protect themselves from attack.


Configurations Include:


used cisco PIX-501-BUN-K9

used cisco PIX-506

used cisco PIX-506E

used cisco PIX-515E-R-BUN

used cisco PIX-515-R-BUN

used cisco PIX-515-UR-BUN

used cisco PIX-1FE

used Cisco PIX-1GE

used Cisco PIX-4FE