Skip to main content

Cisco Systems

Level 24, 177 Pacific Highway
North Sydney, NSW 2060

Senior Systems Engineering Manager
Tony Hall
Sales / Channels
Phone: +61 2 6216 0647
Mobile: +61 401 890577
Email: anthhall@cisco.com

Cisco IPSec Crypto System

The Cisco IOS/IPSecIPSec Crypto System is the implementation of IPSec within Cisco's Internetwork Operating System (IOS). IPSec is a proposed Internet standard (RFCs 2401-2410 and 2451) which provides confidentiality, authenticity and integrity for IP data transmitted over untrusted links or networks. A common application of IOS/IPSec is the construction of Virtual Private Networks (VPNs).

Cisco IOS IPSec

Cisco IOS/IPSec is the implementation of IPSec within Cisco's Internetwork Operating System (IOS). IPSec is a proposed Internet standard (RFCs 2401-2410 and 2451) which provides confidentiality, authentication and integrity for IP data transmitted over untrusted links or networks. A common application of IOS/IPSec is the construction of Virtual Private Networks (VPNs).

Cisco IOS IPSec

Cisco IOS/IPSec is the implementation of IPSec within Cisco\'s Internetwork Operating System (IOS). IPSec is a proposed Internet standard (RFCs 2401-2410 and 2451) which provides confidentiality, authenticity and integrity for IP data transmitted over untrusted links or networks. A common application of IOS/IPSec is the construction of Virtual Private Networks (VPNs). 

Cisco Secure PIX Firewall

The Cisco Secure PIX Firewall family are dedicated firewall appliances which control the flow of Internet Protocol (IP) traffic (datagrams) between network interfaces. They provide a single point of defence as well as controlled and audited access to services between networks by permitting or denying the flow of information traversing the firewall. 

Cisco Secure PIX Firewall

The Cisco Secure PIX Firewall family are dedicated firewall appliances which control the flow of Internet Protocol (IP) traffic (datagrams) between network interfaces. They provide a single point of defence as well as controlled and audited access to services between networks by permitting or denying the flow of information traversing the firewall.

Cisco IOS Firewall

The Target of Evaluation (TOE) is the implementation of the Firewall functionality of Cisco IOS running on Cisco Systems routers. Routers are used to construct IP networks by interconnecting multiple smaller networks or network segments. The Cisco IOS Firewall functionality controls the flow of internet protocol (IP) traffic between network interfaces. Cisco routers are dedicated hardware devices with purpose written software, which performs many networking functions. The TOE addresses the following: - The Firewall function (access control lists and stateful inspection) 

Cisco IOS IPSec on the Integrated Services Routers,VPN Services Module (VPNSM) and IPSec VPN Shared Port Adapter(SPA), including VLAN Separation

The TOE consists of hardware and software used to construct Virtual Private Networks (VPNs) between networks or a remote access client. The TOE is made up of a Cisco router or Catalyst 6500 switch, inclusive of IOS software and hardware modules used to accelerate the performance of the IPSec protocol. The included Cisco hardware provides options for deploying VPNs from the small office to the large Enterprise. IPSec provides confidentiality, authenticity and integrity for IP data transmitted between trusted (private) networks or remote clients over untrusted (public) links or networks.

CISCO Packet Level Encryption with Remote Management

Network data encryption and router authentication together provide a means to safeguard network data that travels from one Cisco router to another, across unsecured networks. Network data encryption is provided at the IP packet level. IP packet encryption prevents eavesdroppers from reading the data that is being transmitted. When IP packet encapsulation is used, IP packets can be seen during transmissions, but the IP packet contents (payload) cannot be read.

Cisco PIX Firewall

Cisco Private Internet Exchange (PIX) is a network security system which provides both firewall services and network translation services (dynamic address translation). It may be used to protect internal private networks from external networks, or to protect an internal sub-network from the enterprise network. It uses a process called Cut-Through Proxies and Adaptive Security.
Network Admission Control

Cisco Network Admission Control (NAC)

Cisco Network Admission Control (NAC) is a solution that enables the network infrastructure to enforce security policies on all devices seeking to access network computing resources. NAC helps ensure that all hosts comply with the latest corporate security policies, such as antivirus, security software, and operating system patches, prior to obtaining normal network access. Vulnerable and non-compliant hosts will be isolated (quarantined) or given limited access until they reach compliance.

Cisco VPN 3000 Concentrator

The Cisco Remote Access VPN enables trusted end systems such as desktop computers and notebooks, handheld computers and PDAs, and small trusted LANs, to establish secure connections to a trusted network over anuntrusted network. The evaluated solution includes VPN concentrators, VPN clients (software and hardware), and an (optional) authentication server.

Cisco IOS/IPSec Routers

Cisco IOS/IPSec is the implementation of IPSec within Cisco's Internetwork Operating System (IOS). IPSec is a proposed Internet standard (RFCs 2401-2410 and 2451) which provides confidentiality, authentication and integrity for IP data transmitted over untrusted links or networks. A common application of IOS/IPSec is the construction of Virtual Private Networks (VPNs).The scope of the evaluation included the components of the IOS software that implement the IPSec function, and functions that are relevant to the secure configuration and operation of IPSec.

Cisco VoIP Telephony Solution

Product Description: The Cisco VoIP system is composed of Cisco IP phones, a Cisco Call Manager, a Cisco Unity voicemail server and a Cisco voice gateway router to connect the VoIP system to the public switched telephone network (PSTN). The goal of the VoIP system is to provide telephony services over an IP network which is also used to interconnect the distinct elements of the VoIP system. The major security features that are provided by the Cisco VoIP system are:

Cisco Unified Wireless Network & Wireless Intrusion Prevention System

The Cisco Unified Wireless Network & Wireless Intrusion Prevention System is a high performance WLAN system that supports enterprise class voice, video and data networking with end-to-end security and information assurance.

Cisco Integrated Services Router (ISR) 800 Series

The Security Target (ST) defines the Information Technology (IT) security requirements for the Cisco Integrated Services Router (ISR) 800 Series. The Cisco ISR-800s are fixed configuration routers that provide business solutions for secure voice and data communications to enterprise small branch offices. They are designed to deliver secure broadband, Metro Ethernet (MAN Ethernet) and wireless LAN (WLAN) connectivity.

Cisco Integrated Service Routers (ISR) Generation 2 (G2) 1900, 2900, 3900 Series

The TOE is Cisco Integrated Service Routers Generation 2 (ISR G2). The Cisco ISR G2 is a router platform that provides connectivity and security services onto a single, secure device.  These routers offer broadband speeds and simplified management to small businesses, and enterprise small branch, and teleworkers.  The Cisco ISR G2 provides single-device security and routing solutions for protecting the network.

Cisco Aggregation Services Router (ASR) 1000 Series

The Security Target (ST) defines the Information Technology (IT) security requirements for the Cisco Aggregation Services Router (ASR) 1000 Series. A Cisco ASR 1000 Series product has two or more network interfaces and is connected to at least one internal and one external network. The Cisco ASR 1000 Series product’s configuration determines how packets are handled to and from its network interfaces. The router configuration will determine how traffic flows received on an interface will be handled.

Cisco Adaptive Security Appliances, version 9.1(2)

The Target of Evaluation (TOE) is the Cisco Adaptive Security Appliances 9.1(2). The Cisco Adaptive Security Appliances (Cisco ASA) consists of both hardware and software solutions to provide application-aware stateful packet filtering firewalls. A stateful packet filtering firewall controls the flow of IP traffic by matching information contained in the headers of connection-oriented or connection-less IP packets against a set of rules specified by the authorised administrator for firewalls.