|
This data sheet provides an overview of the network security features available on the Cisco® 7301 Router and Cisco 7200 Series routers.
Executive Summary
• Aggregate site-to-site and remote-access VPNs in a single network platform, simplifying operations and reducing training costs
• Provide advanced security, including detection of and response to distributed denial-of-service (DDoS) attacks on corporate servers and other resources
• Build a high degree of resiliency into the network edge, keeping edge routers available if they are themselves targeted
Product Overview
Cisco Self-Defending Network
• Integration of security throughout existing infrastructure-built in, not bolted on
• Collaboration between security and network so they leverage each other and work in harmony together
• Adaptability: the ability of the network to intelligently evolve and adapt to emerging threats
Security Features and Benefits of Cisco 7301 and Cisco 7200 Series Routers
Table 1. Hardware Security Features of Cisco 7301 and Cisco 7200 Series Security Bundles
Table 2. Primary Integrated Security Features and Benefits of Cisco 7301 and Cisco 7200 Series Routers
Features |
Benefits |
Cisco VPN |
|
GET VPN |
Revolutionary technology that provides IPsec encryption over private WAN connections without the use of tunnels. |
Provides a scalable and flexible way to establish virtual full-meshed IPSec tunnels from branch to branch. Zero configuration at hub when adding new spokes. |
|
This feature eases administration and management of point-to-point VPNs by actively pushing new security policies from a single headend to remote sites. |
|
MPLS VPN |
Customer-edge (CE) and Provider-edge (PE) functionality plus a mechanism to extend customers MPLS-VPN networks out to the CE with Multi-VRF-aware firewall, and IPSec. |
Multi-VRF and MPLS secure contexts |
Supports multiple independent contexts (addressing, routing and interfaces) for separation of departments, subsidiaries, or customers. All contexts can share a single uplink connection to the core, (for example, IPSec VPN, or Frame Relay/ATM), while still maintaining secure separation between them. |
Secure Provisioning/Digital Certificates |
A simple, powerful mechanism for enrolling new remote-site devices in a secure network infrastructure |
V3PN |
Delivers cost-effective integrated voice, video, and data over VPN to any location. |
Virtual Tunnel Interface (VTI) |
Simplifies VPN configuration and design |
SSL VPN |
VPN remote-access connectivity from almost any Internet-enabled location using only a Web browser and its native SSL VPN encryption |
Cisco IOS Firewall |
An ideal single-device security and routing solution for protecting the WAN entry point into the network. Now with IPv6 support and Zone-based policy mapping for easier administration. |
Advanced Application Inspection and Control (Application Firewall) |
Uses inspection engines to enforce protocol conformance and prevent malicious or unauthorized behavior such as port 80 tunneling or misuse of email connectivity |
Transparent Firewall |
Segment existing network deployments into security trust zones without making address changes! Support for subinterfaces and VLAN trunks. Simultaneous transparent and Layer 3 firewall support. |
VRF-Aware Firewall |
Firewall now included in the list of services available at the individual context level for VRF deployments |
Inline Intrusion prevention (IPS) |
An in-line, deep-packet-inspection-based solution that works with Cisco IOS Software to effectively mitigate network attacks. IPS can drop traffic, send an alarm, locally shun, or reset the connection, enabling the router to respond immediately to security threats to protect the network. |
Transparent IPS |
Provides Layer 3 IPS for Layer 2 connectivity |
Flexible Packet Matching |
Cisco IOS Flexible Packet Matching (FPM) is the next-generation Access Control List (ACL) technology that provides rapid first line of defense against malicious traffic at the entry point into the network. It features powerful custom pattern matching deep within packet header or payload, minimizing inadvertent blocking of legitimate business traffic. |
AutoSecure |
Simplifies router security configuration and enables rapid implementation of security policies with a "one touch" device lockdown process . |
Control Plane Policing |
Reduces the success of a DoS attack by policing the incoming rate of traffic to the control plane, helping to maintain network availability even when under attack. |
CPU/memory thresholding |
By reserving CPU and memory, this feature allows the router to stay operational under high loads, such as those created by attacks. |
NBAR |
This classification engine in Cisco IOS Software can recognize a wide variety of applications. When the application is recognized, the network can invoke specific services for that particular application, providing the proper level of control they need. |
Netflow |
NetFlow technology efficiently provides the metering base for a key set of applications including network traffic accounting, usage-based network billing, network planning, as well as Denial Services monitoring, and network monitoring capabilities. Cisco NetFlow applications collect NetFlow export data, perform data volume reduction, post-processing, and provide to end-user applications easy access to NetFlow data. |
Role-Based CLI Access |
Provides view-based access to CLI commands, allowing highly secure, logical separation of router between NetOps, SecOps, and end users. |
Source-based Remotely Triggered Blackholes (RTBH) Filtering |
This feature provides wire-rate, real-time defense against DDoS attacks using a combination of IP routing features. |
SSHv2 |
Provides powerful new authentication and encryption capabilities with options for tunneling additional types of traffic over the encrypted connection, including file-copy and e-mail protocols |
SNMPv3 |
An interoperable standards-based protocol for network management that provides secure access to devices by a combination of authenticating and encrypting packets over the network |
Network Admission Control (NAC) |
Stems the spread of viruses and worms in the network by providing access only to trusted devices that match established access and security policies. |
Additional Security Features |
|
AAA |
Allows administrators to dynamically configure the type of authentication and authorization they want on a per-line (per-user) or per-service (for example, IP, IPX, or VPDN) basis. |
Cisco IOS Certificate Server and Client |
Allows the router to act as a certificate authority on the network. |
Standard 802.1x support on integrated switching |
Standard 802.1x applications require valid access credentials that make unauthorized access to protected information resources and deployment of unsecured wireless access points more difficult. |
URL filtering (off-device) |
Helps enable the Cisco IOS Firewall to interact with the Websense or N2H2 URL filtering software, thereby preventing users from accessing specified Websites on the basis of company security policies. |
Management |
|
Single device secure management |
Cisco Router and Security Device Manager (SDM) is an intuitive, easy-to-use, Web-based device management tool embedded within the Cisco IOS Software of Cisco routers that can be accessed remotely using HTTPS and SSH. |
Enterprise security management |
Three tools are available for enterprise security deployments: • Cisco Security Management Suite (CSMS), an integrated security-event manager that includes the new Cisco Security Manager, and Cisco Security Monitoring, Analysis, and Response System (MARS).
• Cisco IP Solution Center (ISC) 3.0 is a service provider MPLS IPSec management tool.
|
Additional Features
High Availability and Load Balancing for the Headquarters
• IPSec Stateful Failover-IPSec Stateful Failover allows customers to employ a backup IPSec server to continue processing and forwarding IPSec packets after a planned or unplanned outage occurs. The backup (secondary) IPSec server automatically takes over the tasks of the active (primary) router, without losing secure connections with its peers if the active router loses connectivity for any reason. This process is transparent to the end user and does not require adjustment or reconfiguration of any remote peer. IPSec Stateful Failover is designed to work in conjunction with stateful switchover (SSO) and HSRP. HSRP provides network redundancy for IP networks, helping ensure that user traffic immediately and transparently recovers from failures in network edge devices or access circuits. IPSec Stateful Failover provides protection for IPSec tunnels, IPSec with GRE, and Cisco IOS Easy VPN traffic.
• HSRP and RRI-RRI works with both dynamic and static cryptography maps to simplify network designs for VPNs requiring either high availability or load balancing. Routes are created for each remote network or host on the headend device to allow for dynamic route propagation. HSRP and IPSec dynamically reroute traffic to provide maximum availability of services. For hosts that do not have the ability to switch to another router if a primary router failure occurs, HSRP provides continuous network access. In this case, the HSRP virtual IP address is used as the VPN tunnel endpoint to provide continuous availability for stateless failover of IPSec.
• SLB-Virtual servers can be defined to represent a group of physical servers in a cluster of network servers (a server farm). When a client initiates a connection to the virtual server, the Cisco IOS Software chooses a physical server for the connection based on a configured load-balancing algorithm. In case of a failure of a physical server, SLB dynamically reroutes all the incoming new IPSec sessions to the other server, thus providing redundancy.
Security Management
Embedded Services Management: Cisco Router and Security Device Manager (SDM)
• In-line IPS with updatable signatures and customizable dynamic signature update and signature customization (see IPS)
• Role-based router access
• Integrated Cisco IOS SSLVPN Management
• Easy VPN server and AAA
• Digital certificates for IPSec VPNs
• VPN and WAN connection troubleshooting
• QoS policy configuration and NBAR-based application traffic monitoring
Cisco Security Management Suite (CSMS)
Certifications
FIPS
ICSA
Common Criteria
Ordering Information
Table 3. Ordering information for Cisco 7301 and Cisco 7200 Series Routers
Service and Support
For More Information