Datasheet

Data Sheet
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 13
Cisco PIX 515E Security Appliance
The Cisco
®
PIX
®
515E Security Appliance delivers a wealth of advanced security and
networking services for small-to-medium business and enterprise networks, in a modular,
purpose-built appliance. Its versatile one-rack unit (1RU) design supports up to six 10/100
Fast Ethernet interfaces, making it an excellent choice for businesses requiring a cost-
effective, resilient security solution with DMZ support.
Part of the market-leading Cisco PIX Security Appliance Series, the Cisco PIX 515E Security
Appliance provides robust user and application policy enforcement, multi-vector attack protection,
and secure connectivity services through a wide range of rich security and networking services,
including:
Advanced Application-Aware Firewall Services
Market-Leading Voice-Over-IP and Multimedia Security
Robust Site-to-Site and Remote Access IPSec VPN Connectivity
Award-Winning Resiliency
Intelligent Networking Services
Flexible Management Solutions
Figure 1. Cisco PIX 515E Security Appliance
Advanced Firewall Services Deliver Strong Business Protection and Rich
Application Control
Robust Stateful Inspection and Application Layer Security
Cisco PIX Security Appliances integrate a broad range of advanced firewall services to protect
businesses from the constant barrage of threats on the Internet and in many business network
environments. As a secure foundation, Cisco PIX Security Appliances provide rich stateful
inspection firewall services, tracking the state of all network communications and preventing
unauthorized network access. Building upon those services, Cisco PIX Security Appliances deliver
strong application layer security through 30 intelligent, application-aware inspection engines that
examine network flows at Layers 4–7. To defend networks from application layer attacks and to
give businesses more control over applications and protocols used in their environment, these
inspection engines incorporate extensive application and protocol knowledge and employ security
enforcement technologies that include protocol anomaly detection, application and protocol state

Summary of content (13 pages)