Information Technology Reference
In-Depth Information
PIX Firewall Models (Continued)
Table 12-5
Number of Sessions
Supported
Model
Description
PIX 525
Processor: 600 MHz Intel Pentium III
RAM: Up to 256 MB
Flash Memory: 16 MB
Interfaces: Dual integrated 10/100 Base-T
Fast Ethernet (FE), RJ-45
PCI Slots: 3
280,000
PIX 515
(515-R and 515-UR)
Processor: 200-MHz processor
RAM: 32 MB (515-R), 64 MB (515-UR)
Interfaces: Dual integrated 10/100 Base-T
FE, RJ-45
50,000 (515-R)
100,000 (515-UR)
PIX 506E
Processor: 300 MHz Intel Celeron
RAM: 32 MB
Flash Memory: 8 MB
Interfaces: Dual integrated 10 Base-T
ports, RJ-45
Simultaneous VPN peers: up to 25
PIX 501
For small office or teleworkers
For broadband (DSL and cable modem)
environments
Processor: 133 MHz AMD SC520
Processor
RAM: 16 MB of SDRAM
Flash memory: 8 MB
System bus: Single 32-bit, 33-MHz PCI
Concurrent connections: 3500
Simultaneous VPN Peers: up to 5
Encryption
Encryption is the process of taking cleartext data and encoding it in such a way that only the
system with a certain key can decode it. The data is encoded by the sender, transmitted over
unsecured lines, and decoded by the receiver. Data is encrypted for various reasons, such as to
protect data privacy and provide data integrity.
Public/Private Key Encryption
Keys are a sequence of digits that encrypt and decrypt data. The longer the key length, the less
likely an unauthorized person or system can decrypt the data.
 
Search WWH ::




Custom Search