Original price was: $595.00.$238.00Current price is: $238.00.
Cisco ASA 5505 Adaptive Security Appliance ASA5505-BUN-K9 is easy-to-deploy solutions for small business, branch office, and enterprise teleworker environments by integrating world-class firewall, Unified Communications (voice/video) security, SSL and IPsec VPN, intrusion prevention (IPS), and content security services in a flexible, modular product family.
Cisco ASA 5505 Adaptive Security Appliance ASA5505-BUN-K9 is easy-to-deploy solutions for small business, branch office, and enterprise teleworker environments by integrating world-class firewall, Unified Communications (voice/video) security, SSL and IPsec VPN, intrusion prevention (IPS), and content security services in a flexible, modular product family. Designed to protect your networks, ASA5505-BUN-K9 features a flexible 8-port 10/100 Fast Ethernet switch with two Power over Ethernet (PoE) ports included, which can be dynamically grouped to create up to three separate VLANs for improved network segmentation and security.
Customers can install Security Plus upgrade license, enabling the Cisco ASA 5505 to scale to support up to 25 IPsec VPN users, add full DMZ support, and integrate into switched network environments through VLAN trunking support. Furthermore, businesses can also extend the Cisco ASA 5505’s VPN service by enabling AnyConnect client and clientless VPN remote access to support various mobile workers and business partners to serve up to 25 AnyConnect and/or clientless VPN concurrent users by installing an Essential or a Premium AnyConnect VPN license.
We are not only looking to sell you only one time we look to build long business relation with you.
We offer manufacture warranty plus our ICT warranty.
If you need any technical assistant, our expert technicians are always available to help you without any additional cost.
Contact us now and let our team help you.
Data transmission | |
Firewall throughput | 150 Mbit/s |
VPN throughput | 100 Mbit/s |
Mobile VPN IPSec | 10 |
Mobile VPN SSL | 2 |
Networking | |
Number of users | 10 user(s) |
Ports & interfaces | |
Connectivity technology | Wired |
USB 2.0 ports quantity | 3 |
Ethernet LAN (RJ-45) ports | 8 |
Protocols | |
Data link protocols | Ethernet, Fast Ethernet |
Supported network protocols | IPSec |
Security | |
Security algorithms | 128-bit AES, 3DES |
Firewall security | DES, SSL |
Management features | |
LED indicators | Link, Power |
Connectivity LEDs | Yes |
Power | |
AC input voltage | 100-240 V |
AC input frequency | 50/60 Hz |
Input current | 1.8 A |
Power consumption (typical) | 20 W |
Memory | |
Internal memory | 512 MB |
Storage | |
Flash memory | 64 MB |
Performance | |
Certification | FCC B, CE, VCCI B ITE, CISPR 22 B, EN 60950, EN 61000-3-2, IEC 60950, EN 61000-3-3, UL 60950, CSA 22.2 No. 60950, EN55022 B, AS/NZ 3548 B, FCC 15 |
Design | |
Rack mounting | Yes |
Operational conditions | |
Operating temperature (T-T) | 0 - 40 °C |
Operating relative humidity (H-H) | 5 - 95 % |
Weight & dimensions | |
Dimensions (WxDxH) | 200 x 174 x 44 mm |
Weight | 2500 g |
Other features | |
I/O ports | |
Power requirements | 120/230 V ( 50/60 Hz ) |
Power LED | Yes |
Expansion slots | 1 |
Power supply type | AC |
The Internet has become a critical business tool for organizations of all sizes. It enables new
opportunities for growth of the business. It provides connectivity with partners and remote workers
via VPN connections. But it is also a conduit for threats to enter a company?s network. And these
threats can have a significant impact on the business:
– Unauthorized access: Can lead to loss of company data, unplanned downtime, and
related liability concerns
– Peer-to-peer file sharing and instant messaging: Distracts employees and reduces
productivity
– Viruses: Can infect systems, bringing them down and resulting in outages and lost revenue
– Spam and phishing: Creates a nuisance and contributes to loss of employee productivity
– Browsing of non-work-related Websites: Leads to loss of employee productivity and
possible company liability issues
– Infected VPN traffic: Creates a vector for threats to enter the network and disrupt
the business