Includes 8-port switch, hardware, latest software, and US power cord. As part of the award winning Cisco VPN 3000 concentrator series, the Cisco VPN 3002 Hardware Client combines the ease of use and high scalability features of a software client while providing the reliability and stability of a hardware platform. Simple to deploy and operate, the Cisco VPN 3002 Hardware Client is designed for organizations with many remote office environments as it easily scales to tens of thousands of units. The 3002 hardware client supports the Cisco VPN Client Release 3.0 client protocol allowing it to connect to any Cisco central site VPN concentrator in addition to the VPN 3000 such as the PIX (currently in beta) VPN 5000, and IOS. PIX and VPN 3000 connectivity are available today, while near term releases in VPN 5000 and IOS devices will provide that connectivity shortly. In addition, the VPN 3002 Hardware Client works in conjunction with any operating system including Solaris, Mac and Linux. The Cisco VPN 3002 Hardware Client is a full-featured VPN client that supports 56-bit DES or 168-bit Triple DES (IPsec). Available in 2 modes, client mode and network extension mode, the VPN 3002 can be configured to either emulate the operation of the software client, or to establish a secure site-to-site connection with the central site device. Both modes use push policy and scale to very large numbers. The VPN 3002 is available with or without an 8 port switch and allows hundreds of stations in a single network.
|Description||CISCO CVPN 3002 H/W CLIENT W/8 PORT SWITCH HW SW US PS|
|Network Architecture Supported||Ethernet - 10 Mbps Twisted Pair (10BaseT)|Fast Ethernet - 100 Mbps Two-Pair (100BaseTX)|
Related Firewall & Security Devices
TZ 215 Series features.The TZ 215 provides intelligent protection,...
A key component of the Cisco SecureX Framework, the Cisco ASA 5500 Series...
Your organization faces unprecedented security challenges. The...
Today's organizations face unprecedented security challenges. The...
Organizations of all sizes depend on their networks to access internal and...