Produktbeskrivelse
|
Cisco NAC Appliance 3355 Failover Bundle - sikkerhedsudstyr
|
Enhedstype
|
Sikkerhedsudstyr
|
Antal licenser
|
1500 brugere
|
Formfaktor
|
Rackmonterbar - 1U
|
Processor
|
1 x Intel Xeon
|
RAM
|
6 GB
|
Harddisk
|
300 GB x 2 - SAS
|
Optisk lagring
|
CD-R / DVD-ROM combo
|
Dataforbindelsesprotokol
|
Ethernet, Fast Ethernet, Gigabit Ethernet
|
Kapacitet
|
Samtidige brugere: 1500
|
Dimensioner (B x D x H)
|
70.5 cm x 42.6 cm x 4.3 cm
|
Vægt
|
15.9 kg
|
Produktdatablad |
|
Enhedstype |
Sikkerhedsudstyr |
Højde (rackenheder) |
1U |
Bredde |
70.5 cm |
Dybde |
42.6 cm |
Højde |
4.3 cm |
Vægt |
15.9 kg |
Antal installerede processorer |
1 x Intel Xeon |
RAM |
6 GB |
Harddisk |
300 GB x 2 - SAS |
RAID-niveau |
RAID 0, RAID 1 |
Optisk lagring |
CD-R / DVD-ROM combo |
Model |
Rackmonterbar |
Forbindelsesteknologi |
Kabling |
Dataoverførselshastighed |
1 Gbps |
Dataforbindelsesprotokol |
Ethernet, Fast Ethernet, Gigabit Ethernet |
Netværks/overføselsprotokol |
IPSec |
Protokol til fjernadministration |
SNMP, HTTP |
Kapacitet |
Samtidige brugere: 1500 |
Statusindikatorer |
Strøm, tilslutning OK, status, link/aktivitet |
Egenskaber |
NAT-understøtning, VPN support, SSL acceleration |
Krypterings algoritme |
SSL |
Autentificeringsmetode |
Kerberos, RADIUS, LDAP, Active Directory |
Interface |
4 x 1000Base-T - RJ-45 ¦ 1 x PS/2 tastatur ¦ 1 x PS/2 mus ¦ 1 x video ¦ 1 x serial - DB-9 ¦ 4 x USB 2.0 |
Overensstemmelsesstandarder |
FIPS 140-2 Niveau 2 |
Strømenhed |
Intern strømforsyning |
Maks. antal understøttet |
2 |
Strømforsyning |
675 Watt |
Cisco Network Admission Control (NAC) solutions allow network administrators to authenticate, authorize, evaluate, and remediate wired, wireless, and remote users and their machines prior to allowing users onto the network. It identifies whether networked devices such as laptops, desktops, and other corporate assets are compliant with an organization's security policies, and it repairs vulnerabilities before permitting access to the network.
Cisco NAC offers the broadest array of deployment modes to fit into any customer network. Customers can deploy the product as a virtual or real IP gateway, at the edge or centrally, with Layer 2 or Layer 3 client access, and in-band or out-of-band with network traffic.