||1.72 x 8.50 x 11.80 in.
The Cisco PIX 506 Security Appliance provides delivers a multilayered defense for remote office, branch office, and small-to-medium business network environments through rich, integrated security services including stateful inspection firewall services, advanced application and protocol inspection, site-to-site and remote access VPN, in-line intrusion prevention, and robust multimedia and voice security-all in a single, integrated solution.
Cisco PIX Security Appliances incorporate the state-of-the-art Cisco Adaptive Security Algorithm, which provides stateful inspection firewall services by tracking the state of all authorized network communications and by preventing unauthorized network access. As an additional layer of security, Cisco PIX Security Appliances integrate over two dozen purpose-built inspection engines that perform in-depth Layers 4-7 inspection of network traffic flows for many of today's popular applications and protocols. To defend networks from application-layer attacks and to give businesses more control over applications and protocols in their environments, these inspection engines combine extensive application and protocol knowledge with security enforcement technologies that range from protocol conformance checking, application and protocol state tracking, Network Address Translation (NAT) services, and attack detection and mitigation techniques such as protocol field length checking and URL length checking.
Administrators can easily create custom security policies using the many flexible access control technologies provided by Cisco PIX Security Appliances including network and service object groups, turbo access control lists (ACLs), user- and group-based policies, and more than 100 predefined applications and protocols. By combining these flexible access control technologies with the powerful stateful inspection firewall services and advanced application and protocol inspection services that Cisco PIX Security Appliances provide, businesses can easily enforce their network security policies and protect their networks from attack.