Cisco Firewall PN ASA5505-UL-BUN-K9

Original price was: $995.00.Current price is: $493.00.

Cisco Firewall PN : ASA5505-BUN-K11

Cisco ASA 5505 Adaptive Security Appliance ASA5505-BUN-K9 is easy-to-deploy solutions for small business, branch office, and enterprise teleworker environments by integrating world-class firewall, Unified Communications (voice/video) security, SSL and IPsec VPN, intrusion prevention (IPS), and content security services in a flexible, modular product family.

Product Description

Cisco Firewall PN ASA5505-BUN-K11

Cisco ASA 5505 Adaptive Security Appliance ASA5505-BUN-K9 is easy-to-deploy solutions for small business, branch office, and enterprise teleworker environments by integrating world-class firewall, Unified Communications (voice/video) security, SSL and IPsec VPN, intrusion prevention (IPS), and content security services in a flexible, modular product family. Designed to protect your networks, ASA5505-BUN-K9 features a flexible 8-port 10/100 Fast Ethernet switch with two Power over Ethernet (PoE) ports included, which can be dynamically grouped to create up to three separate VLANs for improved network segmentation and security.

Customers can install Security Plus upgrade license, enabling the Cisco ASA 5505 to scale to support up to 25 IPsec VPN users, add full DMZ support, and integrate into switched network environments through VLAN trunking support. Furthermore, businesses can also extend the Cisco ASA 5505’s VPN service by enabling AnyConnect client and clientless VPN remote access to support various mobile workers and business partners to serve up to 25 AnyConnect and/or clientless VPN concurrent users by installing an Essential or a Premium AnyConnect VPN license.

Important Information

We are not only looking to sell you only one time we look to build long business relation with you.

Warranty & Support

We offer manufacture warranty plus our ICT warranty.

If you need any technical assistant, our expert technicians are always available to help you without any additional cost.

Contact us now and let our team help you.

Data transmission
Firewall throughput150  Mbit/s
VPN throughput100  Mbit/s
Ports & interfaces
Connectivity technologyWired
USB 2.0 ports quantity3
Ethernet LAN (RJ-45) ports8
Protocols
Data link protocolsEthernet, Fast Ethernet
Supported network protocolsIPSec
Security
Security algorithmsDES
Firewall securityYes
VPN supportYes
Management features
LED indicatorsYes
Connectivity LEDsYes
Power
AC input voltage100-240  V
AC input frequency50/60  Hz
Input current1.8  A
Power consumption (typical)20  W
Memory
Internal memory256  MB
Storage
Flash memory64  MB
Performance
CertificationFCC B, CE, VCCI B ITE, CISPR 22 B, EN 60950, EN 61000-3-2, IEC 60950, EN 61000-3-3, UL 60950, CSA 22.2 No. 60950, EN55022 B, AS/NZ 3548 B, FCC 15
Design
Rack mountingYes
Operational conditions
Operating temperature (T-T)0 - 40  °C
Operating relative humidity (H-H)5 - 95  %
Weight & dimensions
Dimensions (WxDxH)200 x 174 x 44  mm
Weight1800  g
Other features
Special featuresDMZ, VLAN
I/O ports8x Ethernet 10Base-T/100Base-TX - RJ-45
Power requirementsAC 120/230 V ( 50/60 Hz )
Expansion slots1
Power supply typeAC
Power LEDYes

The Internet has become a critical business tool for organizations of all sizes. It enables new
opportunities for growth of the business. It provides connectivity with partners and remote workers
via VPN connections. But it is also a conduit for threats to enter a company?s network. And these
threats can have a significant impact on the business:

– Unauthorized access: Can lead to loss of company data, unplanned downtime, and
related liability concerns
– Peer-to-peer file sharing and instant messaging: Distracts employees and reduces
productivity
– Viruses: Can infect systems, bringing them down and resulting in outages and lost revenue
– Spam and phishing: Creates a nuisance and contributes to loss of employee productivity
– Browsing of non-work-related Websites: Leads to loss of employee productivity and
possible company liability issues
– Infected VPN traffic: Creates a vector for threats to enter the network and disrupt
the business