Cisco VPN HelpCisco's security and VPN technologies for small to medium size businesses (SMBs) offer a comprehensive set of manageable security products and technologies to allow you to secure your entire network environment. Cisco's rich product line of protection and Virtual Private Network technologies includes routers, switches, PIX and ASA firewalls, IDS, and VPN access concentrators. Progent's expert support engineers includes veteran consultants with Cisco's CCIE credentials who can assist your organization to choose and deploy Virtual Private Network and security technologies that work best with your environment.

Virtual Private Networks
Cisco offers several alternatives for configuring a Virtual Private Network system, allowing you to choose the approach that best fits your operational needs. You can install both remote connectivity and site-to-site Virtual Private Networks with IOS Software, with utilities and Advanced Integrated Module hardware encryption boards, or with physical devices, such as a Virtual Private Network concentrator, router, Cisco ASA 5500-X firewalls with Firepower Services, or dedicated Virtual Private Network processor for dial-up functions. All Cisco Virtual Private Network approaches are easy to deploy and manage and offer the versatility to grow along with future business needs.

Components Included in Cisco's Protection Solution
Cisco offers a comprehensive catalog of products designed for preventing data theft, virus and worm infections, Denial of Service (DDoS) attacks, and other dangers to your system. Categories and products include:

Secure Connectivity

  • VPN appliance (Cisco Virtual Private Network access concentrators and clients): Devoted hardware or software mechanism for configuring and managing Virtual Private Networks
  • Cisco Catalyst and Nexus Switch based: Identity-based functions designed into Cisco switches
  • Cisco Router based: VPN features built into Cisco routers
  • Extended perimeter protection
  • PIX or ASA Firewall: Devoted silicon or software mechanism to permit or deny access to the infrastructure or processes
  • Router based: Firewall capability built into routers
Penetration Defense
  • Network-based device (Cisco Security Agent): Devoted physical unit or software for uncovering intrusions internal to the company network
  • Host-based software (Cisco Security Agent): Dedicated hardware or software for detecting, remediating, and reporting penetrations on hosts
  • Cisco Firewall sensor: Detector built into a firewall to find and document penetrations at the system perimeter
  • Cisco Catalyst sensor: Detector incorporated into a Cisco switch to find and report attacks at the switch
  • Cisco Router sensor: Sensing capability incorporated into a switch to sense and document penetrations at the router
Identity Services
  • ACS utilizing RADIUS and TACACS: Central access management mechanism for user validation, permission, and accounting from an graphical Web interface
Safe Management and Policy
  • Cisco Security Manager: Expandable mechanism to provision configuration and security policies for Cisco firewalls, Virtual Private Networks, and Intrusion Prevention Systems (IPS)

How Progent Can Assist Your Business with Cisco Security Technology
Cisco Certified CCIE Network Security SpecialistsProgent can give you access to a Cisco Certified Internetwork Expert or Cisco Certified Network Professional to assist you to choose, deploy, and maintain Cisco security technology. Progent's CISM and CISSP security professionals can advise you about how to design security into your company's processes. Progent can assist you to develop a documented security plan to establish clear policies, deploy monitoring and tracking software, create and install a protected network architecture that incorporates products from diverse vendors, offer MS Internet Security and Acceleration (ISA) 2006 Server support services and Microsoft Forefront TMG configuration help, and advise you about steps to maximize the protection of your infrastructure. Progent's security expertise is available to help you implement a PIX or ASA firewall, design safe remote and mobile access to email and business information, and install or troubleshoot VPNs.

Integration of Cisco and Third-party Security Technology
Progent offers expertise in firewall and VPN products from all major vendors and can help you integrate Cisco technology with additional security solutions to help you build a cost-effective network infrastructure that provides a level of security and flexibility appropriate for your business. Third-party firewall and VPN support services available from Progent include:

To see more information about Progent's engineering assistance for Cisco solutions, choose a subject:

If you wish to contact Progent about technical assistance for Cisco networking, call 1-800-993-9400 or visit Contact Progent.
















© 2002- 2018 Progent Corporation. All rights reserved.


More topics of interest: