Cisco VPN HelpCisco's security and VPN solutions for small to medium size businesses (SMBs) provide a complete range of manageable security devices and utilities to help you to safeguard your entire connectivity environment. Cisco's extensive catalog of protection and Virtual Private Network (VPN) solutions features routers, switches, PIX and ASA firewalls, intrusion detection systems (IDS), and Virtual Private Network access concentrators. Progent's seasoned consulting engineers includes experienced consultants with Cisco's CCIE and CCNP credentials who can help your company to select and deploy VPN and security technologies that align optimally with your environment.

Virtual Private Networks
Cisco provides multiple options for configuring a VPN solution, so you can choose the approach that most closely fits your operational requirements. You can set up both remote connectivity and site-to-site VPNs with Cisco IOS Software, with utilities and Advanced Integrated Module (AIM) hardware encryption cards, or with hardware units, such as a Virtual Private Network access concentrator, router, ASA 5500-X firewalls with Firepower Services, or devoted Virtual Private Network server for dial-up functions. All Cisco Virtual Private Network solutions are simple to integrate and administer and offer the versatility to grow with changing operational needs.

Components Included in Cisco's Protection Technology
Cisco offers a full catalog of products designed for stopping information theft, virus and worm outbreaks, DDoS assaults, and other threats to your network. Categories and security products include:

Protected Connectivity

  • VPN appliance (Cisco VPN access concentrators and clients): Dedicated physical unit or software mechanism for setting up and managing Virtual Private Networks
  • Cisco Catalyst and Nexus Family Switch based: Identity-based functions built into Cisco switches
  • Router based: Virtual Private Network capability incorporated into routers
  • Expanded perimeter protection
  • Cisco PIX or ASA Firewall: Devoted silicon or software device to permit or deny access to the network or applications
  • Router controlled: Firewall capability built into Cisco routers
Intrusion Defense
  • Network-attached device (Cisco Security Agent): Dedicated physical unit or program for uncovering intrusions inside the company network
  • Host-based software (Cisco Security Agent): Dedicated physical unit or program for finding, remediating, and reporting penetrations on hosts
  • Firewall sensor: Sensor incorporated into a firewall to find and document penetrations at the network public/private edge
  • Catalyst Switch sensor: Sensing capability built into a Catalyst switch to detect and document penetrations at the switch
  • Cisco Router sensor: Sensor built into a switch to sense and document penetrations at the router
Identity Services
  • Cisco Access Control Server (ACS) utilizing RADIUS and TACACS: Centralized user access management mechanism for user validation, permission, and accounting from an graphical Web interface
Safe Management and Policy
  • Cisco Security Manager: Scalable solution for device configuration and security policies for Cisco firewalls, Virtual Private Networks, and Intrusion Prevention Systems (IPS)

How Progent's Consultants Can Help You with Cisco Security Products
Cisco Certified CCIE Security ConsultantsProgent can give you access to a Cisco Certified Internetwork Expert or Cisco Certified Network Professional to assist you to choose, deploy, and support Cisco security technology. Progent's CISA and ISSAP security specialists can advise you about how to design security into your business processes. Progent can help you to produce a documented security strategy to define clear policies, install scanning and tracking software, create and install a secure network architecture that incorporates technology from a variety of network companies, provide MS Internet Security and Acceleration (ISA) 2006 Server support and Forefront Threat Management Gateway configuration help, and recommend procedures to optimize the protection of your network. Progent's security consulting can help you configure a firewall, design safe remote and mobile connectivity to email and business information, and implement or repair Virtual Private Networks.

Integration of Cisco and Third-party Security Technology
Progent offers expertise in firewall and VPN products from all major vendors and can help you integrate Cisco technology with additional security solutions to help you build a cost-effective network infrastructure that provides a level of security and flexibility appropriate for your business. Third-party firewall and VPN support services available from Progent include:

To find out additional details concerning Progent's engineering support for Cisco networking products, choose a subject:

In order to get in touch with Progent about consulting expertise for Cisco products, call 1-800-993-9400 or go to Contact Progent.
















© 2002- 2017 Progent Corporation. All rights reserved.

More topics of interest: