CISCO CATALYST 6500 SERIES FIREWALL SERVICES MODULE FOR CISCO CATALYST 6500 SERIES AND CISCO 7600 SERIES



Similar documents
CISCO SMALL AND MEDIUM BUSINESS CLASS VOICE SOLUTIONS: CISCO CALLMANAGER EXPRESS BUNDLES

Cisco Router and Security Device Manager File Management

CISCO IOS SOFTWARE RELEASES 12.4 MAINLINE AND 12.4T FEATURE SETS FOR THE CISCO 3800 SERIES ROUTERS

Figure 1. The Cisco Aironet Power Injectors Provide Inline Power to Cisco Aironet Access Points and Bridges

CISCO IOS SOFTWARE FEATURE PACKS FOR THE CISCO 1700 SERIES MODULAR ACCESS ROUTERS AND CISCO 1800 SERIES (MODULAR) INTEGRATED SERVICES ROUTERS

CISCO IOS SOFTWARE RELEASES 12.4 MAINLINE AND 12.4T FEATURE SETS FOR THE CISCO 2800 SERIES ROUTERS

Cisco GLBP Load Balancing Options

CISCO SFP OPTICS FOR PACKET-OVER-SONET/SDH AND ATM APPLICATIONS

NETWORK AVAILABILITY IMPROVEMENT SUPPORT OPERATIONAL RISK MANAGEMENT ANALYSIS

CISCO ISDN BRI S/T WIC FOR THE CISCO 1700, 1800, 2600, 2800, 3600, 3700, AND 3800 SERIES

CISCO CATALYST 3750 SERIES SWITCHES

CISCO CATALYST 6500 SUPERVISOR ENGINE 32

Cisco Aironet 1130AG Series

CISCO AIRONET POWER INJECTOR

CISCO 10GBASE X2 MODULES

CISCO MEETINGPLACE FOR OUTLOOK 5.3

Cisco Solution Incentive Program Asia Pacific

CISCO NETWORK CONNECTIVITY CENTER MPLS MANAGER 1.0

CISCO IP PHONE EXPANSION MODULE 7914

CISCO CONTENT SWITCHING MODULE SOFTWARE VERSION 4.1(1) FOR THE CISCO CATALYST 6500 SERIES SWITCH AND CISCO 7600 SERIES ROUTER

CISCO CALLMANAGER EXPRESS 3.2

CISCO CATALYST 6500 SERIES CONTENT SWITCHING MODULE

CISCO PIX SECURITY APPLIANCE LICENSING

SERIAL AND ASYNCHRONOUS HIGH-SPEED WAN INTERFACE CARDS FOR CISCO 1800, 2800, AND 3800 SERIES INTEGRATED SERVICES ROUTERS

Cisco Outbound Option

Enabling High Availability for Voice Services in Cable Networks

CISCO ISDN BRI S/T WIC FOR THE CISCO 1700, 1800, 2600, 2800, 3600, 3700, AND 3800 SERIES

CISCO 7604 ROUTER. Figure 1. Cisco 7604 Router

Cisco IOS Public-Key Infrastructure: Deployment Benefits and Features

END-OF-SALE AND END-OF-LIFE ANNOUNCEMENT FOR SELECTIVE CISCO CATALYST 6503, CATALYST 6506 AND CATALYST 6509 CHASSIS

CISCO NETWORK ANALYSIS SOFTWARE 3.4

6000 WATT AC POWER SUPPLY FOR THE CISCO CATALYST 6500 SERIES CHASSIS

NETFLOW PERFORMANCE ANALYSIS

SURGE PROTECTION CABLES FOR SMART SERIAL INTERFACES

CISCO WAN MANAGER 15.1

Cisco Conference Connection

CISCO NETWORK ASSISTANT

CISCO WAN MANAGER 15 DATA SHEET

City Government Improves Caller Service and Cultivates Economic Vitality

CISCO IP CONTACT CENTER HOSTED EDITION A CROSS-NETWORK (PSTN TO IP), DISTRIBUTED, INTELLIGENT, HOSTED PLATFORM FOR CONTACT CENTERS

CISCO 100BASE-X SFP FOR FAST ETHERNET SFP PORTS

Per-Port, Per-VLAN Quality of Service. Trunk-Port Security x Private VLAN Assignment x Private Guest VLAN

End-of-Sale and End-of-Life Announcement for the Cisco Catalyst 2970 Series Switches

Cisco CNS NetFlow Collection Engine Version 4.0

Cisco 2-Port OC-3/STM-1 Packet-over-SONET Port Adapter

Cisco Router and Security Device Manager USB Storage

New Cisco Catalyst 3750 Series Switches Overview

CISCO IOS IP SERVICE LEVEL AGREEMENT

NTL teams with Cisco Advanced Services to reduce risk and deliver the world s largest Cisco Content Delivery Network deployment in just two months

Cisco Secure Access Control Server Solution Engine

How To Get A New Phone System For Your Business

Cisco Unified IP Phone 7906G

CISCO CATALYST OPERATING SYSTEM SOFTWARE RELEASE 8.4 FOR CISCO CATALYST 6500 SERIES SWITCHES

CISCO METRO ETHERNET SERVICES AND SUPPORT

Cisco Catalyst 6500 Series/Cisco 7600 Series Supervisor Engine 720-3BXL

CISCO NETWORK CONNECTIVITY CENTER

CISCO CATALYST EXPRESS 500 SERIES SWITCHES

Customizing Your Cisco Unified IP Phone on the Web

SERIAL CONNECTIVITY NETWORK MODULES (NM-1HSSI, NM-4T, NM-4A/S, NM-8A/S, NM-16A/S, NM-16A, NM-32A)

Cisco Systems GigaStack Gigabit Interface Converter

Data Center Infrastructure Design Guide 2.1 Readme File

Cisco CNS NetFlow Collection Engine Version 5.0

INTEGRATED COMMUNICATIONS INTEROPERABILITY

DATA COMPRESSION ADVANCED INTEGRATION MODULES (AIM-COMPR2-V2 AND AIM-COMPR4)

NetFlow Feature Acceleration

CISCO MDS 9000 FAMILY PERFORMANCE MANAGEMENT

CISCO IP PHONE SERVICES SOFTWARE DEVELOPMENT KIT (SDK)

CISCO 7304 SERIES ROUTER PORT ADAPTER CARRIER CARD

Cisco IT Data Center and Operations Control Center Tour

State Agency Improves Service Effectiveness by Giving Employees Database Access from Their IP Phones

CISCO WIRELESS SECURITY SUITE

HIGH-DENSITY PACKET VOICE DIGITAL SIGNAL PROCESSOR MODULE FOR CISCO IP COMMUNICATIONS SOLUTION

CISCO IP PHONE 7912G. CISCO IP PHONE 7912G FEATURES The Cisco IP Phone 7912G is designed to be easy to use with conveniently placed features.

Cisco 2-Channel SFP WDM Transponder

Cisco IOS Firewall Intrusion Detection System

It looks like your regular telephone.

Cisco Network Planning Solution Documentation Guide and Supplemental License Agreement

Catalyst 6500 Series Switch and Cisco 7600 Series Router Firewall Services Module Configuration Guide

Cisco IP Phone 7912G (Part Number CP-7912G-A)

THE CISCO CRM COMMUNICATIONS CONNECTOR GIVES EMPLOYEES SECURE, RELIABLE, AND CONVENIENT ACCESS TO CUSTOMER INFORMATION

PUBLIC KEY INFRASTRUCTURE CERTIFICATE REVOCATION LIST VERSUS ONLINE CERTIFICATE STATUS PROTOCOL

CISCO PIX DEVICE MANAGER V3.0

End-of-Sale and End-of-Life Announcement for Select Cisco Catalyst 2950G and Catalyst 2950T Series Switches

CISCO IP PHONE 7905G. Figure 1. Cisco IP Phone 7905G

CISCO RFID SOLUTIONS. Q. How is RFID being applied? A. Cisco Systems sees RFID technology initially affecting three areas:

CISCO 7609 ROUTER ENHANCED 9-SLOT CHASSIS

Optical Service Modules: OC-3/STM-1, OC-12/STM-4 and OC-48/STM-16 POS, OC-12/STM-4 ATM, Gigabit Ethernet WAN, Channelized T3 (CT3) and OC12/STM-4

Cisco Blended Agent: Bringing Call Blending Capability to Your Enterprise

PREVENTING DISTRIBUTED DENIAL OF SERVICE ATTACKS WITH CISCO SELF-DEFENDING NETWORKS

Danish Train Operator Gets Customer Service Back On Track

THE BUSINESS CASE FOR MANAGED SERVICES IN SMALL AND MEDIUM-SIZED BUSINESSES

Cisco Unified IP Phone 7971G-GE

Cisco AVVID Network Enterprise Data Center Solution Overview

IP COMMUNICATIONS FOR THE SMALL OR AUTONOMOUS BRANCH OFFICE

Cisco 7200 Series Enterprise WAN Aggregation Application

CONNECT TO COMPREHENSIVE NETWORK SECURITY SOLUTIONS WITH THE CISCO IP NETWORK DEFENDER PROGRAM.

Serial Connectivity Network Modules for the 2600, 3600, and 3700 Series (NM-1HSSI, NM-4T, NM-4A/S, NM-8A/S, NM-16A/S, NM-16A, NM-32A)

Transcription:

DATA SHEET CISCO CATALYST 6500 SERIES FIREWALL SERVICES MODULE FOR CISCO CATALYST 6500 SERIES AND CISCO 7600 SERIES Figure 1. Cisco Catalyst 6500 Series Firewall Services Module The Cisco Catalyst 6500 Series Firewall Services Module (FWSM), a high-speed, integrated firewall module for Cisco Catalyst 6500 Series switches and Cisco 7600 Series routers, provides 5.5 Gbps throughput, 100,000 connections per second, and 1 million concurrent connections. Up to four FWSMs can be installed in a single chassis, providing scalability to 20 Gbps per chassis. As part of the Cisco PIX family of security appliances, the FWSM provides large enterprises and service providers with superior security, reliability, and performance. The FWSM uses Cisco PIX technology and runs the Cisco PIX OS, a real-time, hardened, embedded system that eliminates security holes and performance-degrading overhead. At the heart of the system, a protection scheme based on the Adaptive Security Algorithm (ASA) offers stateful connection-oriented firewalling. Using ASA, the FWSM creates a connection table entry for a session flow based on the source and destination addresses, randomized TCP sequence numbers, port numbers, and additional TCP flags. The FWSM controls all inbound and outbound traffic by applying the security policy to these connection table entries. The FWSM includes many advanced features like multiple security contexts both at the routed levels and in bridging mode, helping to reduce cost and operational complexity while managing multiple firewalls from the same management platform. The virtualization on the FWSM reinforces the investment protection provided on Cisco Catalyst 6500 Series switches and 7600 Series routers. FWSM virtualization, when combined with other security services within the Cisco Catalyst 6500 Series Switch or Cisco 7600 Series Router, presents a powerful defense in-depth solution. Using features like Resource Manager, organizations can limit the resources allocated to any security context at any time, which helps to ensure that one security context does not interfere with another. With the default software license, up to two security contexts can be run, in addition to a special admin context. For more security contexts, a license must be purchased. Using the transparent firewall feature, which configures the FWSM to act as a Layer 2 bridging firewall, there are minimal changes required to the network topology. The use of a transparent firewall reduces both the configuration and deployment time---a definite plus for any business with limited IT resources. There are no IP addresses except the management interface; no subnetting or configuration updates are required with transparent firewalls. The FWSM Services Management and Enhanced Resource Management and Limiting features more effectively provision and monitor security services, even within and across multiple virtual contexts. This includes class creation, resource limiting, per-user/cisco Access Control Server (ACS)-based access control lists (ACLs), syslogs per ACL, syslog level configuration, Address Resolution Protocol (ARP) inspection, and multicast pass-through support. All contents are Copyright 1992 2005 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement. Page 1 of 11

Enhanced filtering provides extended protection and application support, such as voice applications. It also includes policy-based Network Address Translation (NAT), bidirectional NAT, bidirectional ACLs, voice over IP (VoIP) enhancements, Port Address Translation (PAT) for skinny and Session Initiation Protocol (SIP), Media Gateway Control Protocol (MGCP), H.323 v3 and v4, Multiprotocol Label Switching (MPLS) and firewall integration, URL filtering with WebSense and N2H2, and shunning and blocking attacks. FIREWALL SERVICES MODULE BENEFITS The traditional role of firewalls has changed. Today s firewalls do more than protect a corporate network from unauthorized external access. Besides protecting the perimeter of the corporate network from threats, firewalls can also prevent unauthorized users from accessing a particular subnet, workgroup, or LAN within a corporate network. The cost of not building a layered, defense-in-depth system can be devastating. In the United States alone in 2003, the overall reported corporate loss due to theft and insider abuse totaled 82 million dollars (CSI/FBI Report, 2003). FBI statistics indicate that 70 percent of all security problems originate from inside an organization. According to one in five respondents to the FBI s survey, intruders broke into, or tried to break into, their corporate networks during the preceding 12 months and most experts agree that the majority of network break-ins go undetected. Corporate networks need a reliable, integrated security solution to protect their business assets from these increasing threats. Integrated Module Installed inside a Cisco Catalyst 6500 Series Switch or Cisco 7600 Series Router, the FWSM allows any port on the switch to operate as a firewall port and integrates stateful firewall security inside the network infrastructure. This becomes especially important where rack space is at a premium. Cisco Catalyst 6500 Series switches and Cisco 7600 Series routers truly emerge as the IP services switch of choice for customers requiring intelligent services such as firewall services, intrusion detection, and VPN, along with multilayer LAN, WAN, and MAN switching capabilities. Ready for the Future The FWSM can handle up to 5.5 Gbps of traffic, providing superior performance to meet future requirements without requiring a system overhaul. Up to three additional FWSMs (a total of four modules) can be added to the Cisco Catalyst 6500 Series to meet growing demands. Reliability and High Availability The FWSM is based on Cisco PIX technology and uses the time-tested Cisco PIX OS, a secure, real-time operating system. The FWSM offers a unique combination of performance and security on the same platform, using proven Cisco PIX technology for inspecting packets. For resiliency, the FWSM supports high-speed failover between modules within a single 6500 or 7600 chassis and between modules in separate chassis. This support of both intra-chassis and inter-chassis failover offers customers complete flexibility in their firewall deployments. Lower Cost of Ownership The FWSM offers the best price-performance ratio of any firewall. Because the FWSM is based on the Cisco PIX firewall, the cost of training and management is lower; because the FWSM is integrated in the chassis, there are fewer boxes to manage. Ease of Management The Cisco PIX Device Manager s intuitive GUI can be used to manage and configure the features within the FWSM. The FWSM is supported by the Cisco management framework and for configuration and monitoring by Cisco AVVID (Architecture for Voice, Video and Integrated Data) partners. The Cisco PIX Device Manager allows simplified management and monitoring of the FWSM at the system and device level, as well as at the more detailed security context level. Page 2 of 12

The FWSM is also manageable from a central console using the scalable CiscoWorks VPN/Security Management Solution (VMS). CiscoWorks VMS provides a modular approach to managing and monitoring security solutions throughout a Cisco network. Integrated, extensible management centers are available for several solutions, including VPNs, routers, switches, firewall, and Cisco security agents. In particular, the CiscoWorks Management Center for Firewalls supports centralized, comprehensive firewall administration of FWSMs, Cisco PIX security appliances, and Cisco IOS router-based firewalls throughout the network in a consistent, uniform manner to best expedite large security deployments. FWSM KEY FEATURES Table 1. Features and Details Features Performance Details 5.5 Gbps 1 million concurrent connections 100,000 connection setup and teardowns per second 256,000 PAT and 256,000 NAT translations Routed and Transparent Firewall The firewall can run in one of the following modes: Routed---The FWSM is considered to be a router hop in the network. Transparent---The FWSM acts like a bump in the wire and is not a router hop. The FWSM connects the same network on its inside and outside ports, but each port must be on a different VLAN. No dynamic routing protocols or NAT are required. Multiple Security Contexts Bidirectional NAT and Policy-based NAT Resource Management Same Security Level Communication Cut-Through Proxies URL Filtering In multiple-context mode, you can create up to 100 separate security contexts (depending on your software license). A security context is a virtual firewall that has its own security policy and interfaces. Each context can support 256 VLANs in routed mode. Transparent mode supports only two interfaces per context. Multiple contexts are similar to having multiple standalone firewalls. All security contexts can be run in routed mode or in transparent mode Provides dynamic/static NAT and PAT You can configure NAT on inside and outside addresses. For Policy-based NAT, you can identify addresses to be translated using an extended ACL, which allows you more control in determining which addresses to translate. Allows limiting of resources per context, so one context does not use up all the resources. Allows interfaces which share the same security level to communicate without NAT/STATIC policies. Per-host maximum connection limit can be enforced. Enforces high performance user-authentication policies on a per-vlan basis for TCP, HTTP, FTP, HTTPS, and others. Filter HTTP, HTTPS, and FTP requests using WebSense Enterprise or HTTP filtering by N2H2 (now part of Secure Computing Corporation). Page 3 of 12

Features Configuration Support AAA Support Cisco PIX Device Manager Secure Network Management Access Lists Details Console to command-line interface (CLI) (session from switch) Telnet to the inside interface of the FWSM Telnet over IP Security (IPSec) to the outside interface of the FWSM Secure Shell Protocol (SSH) to CLI Secure Sockets Layer (SSL) to Cisco PIX Device Manager CiscoWorks VMS Management Center for Firewalls Integrates with popular authentication, authorization, and accounting (AAA) services through TACACS+ and RADIUS support Simple, intuitive, Web-based GUI supports remote firewall management Numerous real-time and historical reports providing usage trend, performance baseline, and security event information Cisco PIX Device Manager is also integrated with an overall device management tool for the Cisco Catalyst 6500 Series---CiscoView Device Manager. From CiscoView Device Manager, modules within the Cisco Catalyst 6500 system, such as the FWSM and the supervisor module, can be managed collectively through an easy-to-use GUI. Secure, Triple Data Encryption Standard (3DES)-encrypted network management access Up to 80,000 ACLs The following ACLs types are supported: Extended ACL to control IP traffic on an interface: Inbound Outbound For transparent firewall mode, EtherType ACL to control non-ip traffic on an interface: Inbound Outbound Standard ACL for Open Shortest Path First (OSPF) route redistribution Per-user Cisco Secure ACS-based ACLs Dynamic Routing Protocols In single-context mode, the FWSM supports the following routing protocols. Routing Information Protocol (RIP) v1 and v2 (passive mode) OSPF Transparent mode supports static routing only Command Authorization Object Grouping Allows you to control user access to commands and to create user accounts or logins tied to privilege levels Ability to group network objects (hosts, for example) and services (FTP and HTTP) for ACLs Page 4 of 12

Features Protection from Denial of Service (DoS) ARP Inspection Dynamic Host Control Protocol (DHCP) High Availability Logging Details DNS Guard Flood Defender Flood Guard TCP Intercept with SYN cookies optimization Unicast Reverse Path Forwarding (urpf) Mail Guard FragGuard and Virtual Reassembly Internet Control Message Protocol (ICMP) stateful inspection User Datagram Protocol (UDP) rate control For transparent firewall mode, the FWSM compares the MAC address and IP address in all ARP packets to static entries in the ARP table. The FWSM acts as a DHCP server. The FWSM also supports DHCP relay to forward DHCP requests to an upstream router. Active-standby stateful failover---intra-chassis and inter-chassis Comprehensive syslogging, FTP, URL, and ACL logging Additional Protocols H.323 v3 and 4 NetBios over IP RAS Version 2 Real-Time Streaming Protocol (RTSP) SIP with PAT XDMCP Skinny EXAMPLE FWSM DEPLOYMENTS The FWSM can be deployed in topologies serving enterprise campuses, data centers, or service providers. Today s enterprises need more than just perimeter security---they need to connect business partners and provide campus security domains that serve multiple groups within these organizations. The FWSM provides a flexible, cost-effective, and performance-based solution by allowing users and administrators to establish security domains with different policies within the organization. Figure 2 shows a campus deployment using stateful filtering to establish separate VLAN-based security domains. Page 5 of 12

Figure 2. Campus Deployment Using the FWSM, users can set appropriate policies for different VLANs. Data centers also require stateful firewall security solutions to protect data while delivering gigabit performance at the lowest possible cost. Figure 2 shows a data center with redundant FWSMs protecting server data. Page 6 of 12

Figure 3. e-commerce Data Center Deployment The FWSM maximizes capital investment by providing the best price-performance ratio in a firewall, and allows customers to replace expensive multiple firewalls that require additional firewall load balancer devices. Figure 4. Multiple Context Deployment Page 7 of 12

In multiple context mode, each firewall runs its own policies, its own management domain, and its own syslogging; in essence, providing a completely independent security domain. Virtual firewall security contexts configured with their own policies are functionally similar to a collection of independent physical firewalls, but also provide ease of management. Virtualization makes it easier to add or delete security contexts based on subscriber growth. This helps in costs savings through lower deployment costs, as organizations do not need to deploy multiple devices yet are able to achieve the same capabilities and maintain complete control of configuration, management, and provisioning of security contexts. Service providers can offer security contexts to individual customers, while enterprises can assign a security context to each department or division. ORDERING INFORMATION Table 2. Firewall Services Module Hardware and Software Part Numbers Product Number Description Hardware WS-SVC-FWM-1-K9 WS-SVC-FWM-1-K9= Firewall Services Module for Cisco Catalyst 6500 and 7600 Series Firewall Services Module for Cisco Catalyst 6500 and 7600 Series (spare) Software SC-SVC-FWM-1.1-K9 SC-SVC-FWM-1.1-K9= SC-SVC-FWM-2.2-K9 SC-SVC-FWM-2.2-K9= SC-SVC-FWM-2.3-K9 SC-SVC-FWM-2.3-K9= Firewall Services Module Software Release 1.1 for Cisco Catalyst 6500 and 7600 Series Firewall Services Module Software Release 1.1 for Cisco Catalyst 6500 and 7600 Series (spare) Firewall Services Module Software Release 2.2 for Cisco Catalyst 6500 and 7600 Series Firewall Services Module Software Release 2.2 for Cisco Catalyst 6500 and 7600 Series (spare) Firewall Services Module Software Release 2.3 for Cisco Catalyst 6500 and 7600 Series Firewall Services Module Software Release 2.3 for Cisco Catalyst 6500 and 7600 Series (spare) LICENSING Table 1 lists the part numbers that are needed when ordering security context licenses. Cisco supports three tiers of licenses. To be able to order any of these license tiers, you must be running FWSM Software Release 2.2(1) or later. No changes in hardware are required when upgrading from FWSM Software Release 1.1 to Release 2.2 and 2.3. Table 3. Context License Part Numbers PART NUMBER FR-SVC-FWM-VC-T1 FR-SVC-FWM-VC-T2 FR-SVC-FWM-VC-T3 DESCRIPTION 20 virtual firewalls 50 virtual firewalls 100 virtual firewalls Page 8 of 12

Table 4 lists upgrade part numbers. Table 4. Upgrade Part Numbers PART NUMBER FR-SVC-FWM-UPGR1 FR-SVC-FWM-UPGR2 DESCRIPTION Upgrade from 20 to 50 virtual firewalls Upgrade from 50 to 100 virtual firewalls SYSTEM REQUIREMENTS Cisco Catalyst 6500 Series Supervisor Engine 2 with Multilayer Switch Feature Card 2 (MSFC2) or Cisco Catalyst 6500 Series Supervisor Engine 720 Native Cisco IOS Software Release 12.1(13)E or later. If you are running a Supervisor Engine 720, you will need Cisco IOS Software Release 12.2(14)SX or later Hybrid Cisco Catalyst OS Software Release 7.5(1) or later. If you are using a Supervisor Engine 720, you will need a minimum of Cisco Catalyst OS Software Release 8.2 If you intend to use the multi-svi feature, you will need Cisco IOS Software Release 12.2(20)E or later for native Cisco IOS Software, and for Cisco Catalyst OS software you will need version 7.(6) or later Occupies one slot in a Cisco Catalyst 6500 Series Switch or Cisco 7600 Series Router Up to four firewall modules may be deployed in the same chassis FOR MORE INFORMATION For more information about the Cisco FWSM Software Release 2.3, contact your local account representative or visit: http://www.cisco.com/go/tds To obtain additional information about Cisco security solutions, visit: Cisco Self-Defending Networking Strategy: http://www.cisco.com/go/selfdefend Cisco Threat Defense System: http://www.cisco.com/go/tds Cisco Integrated Security Solutions: http://www.cisco.com/go/security HARDWARE SPECIFICATION Weight: 10 pounds Power Consumption: 171.78 watts REGULATORY COMPLIANCE Safety UL 1950 CSA C22.2 No. 950-95 EN60950 EN60825-1 TS001 CE Marking IEC 60950 AS/NZS3260 Page 9 of 12

EMI FCC Part 15 Class A ICES-003 Class A VCCI Class B EN55022 Class B CISPR22 Class B CE Marking AS/NZS3548 Class B NEBS SR-3580---NEBS: Criteria Levels (Level 3 compliant) GR-63-CORE---NEBS: Physical Protection GR-1089-CORE---NEBS: EMC and Safety ETSI ETS-300386-2 Switching Equipment Telecommunications ITU-T G.610 ITU-T G.703 ITU-T G.707 ITU-T G.783 Sections 9-10 ITU-T G.784 ITU-T G.803 ITU-T G.813 ITU-T G.825 ITU-T G.826 ITU-T G.841 ITU-T G.957 Table 3 ITU-T G.958 ITU-T I.361 ITU-T I.363 ITU I.432 ITU-T Q.2110 ITU-T Q.2130 ITU-T Q.2140 ITU-T Q.2931 ITU-T O.151 ITU-T O.171 ETSI ETS 300 417-1-1 TAS SC BISDN (1998) ACA TS 026 (1997) BABT /TC/139 (Draft 1e) Page 10 of 12

Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 526-4100 European Headquarters Cisco Systems International BV Haarlerbergpark Haarlerbergweg 13-19 1101 CH Amsterdam The Netherlands www-europe.cisco.com Tel: 31 0 20 357 1000 Fax: 31 0 20 357 1100 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA www.cisco.com Tel: 408 526-7660 Fax: 408 527-0883 Asia Pacific Headquarters Cisco Systems, Inc. 168 Robinson Road #28-01 Capital Tower Singapore 068912 www.cisco.com Tel: +65 6317 7777 Fax: +65 6317 7799 Cisco Systems has more than 200 offices in the following countries and regions. Addresses, phone numbers, and fax numbers are listed on the Cisco Website at www.cisco.com/go/offices. Argentina Australia Austria Belgium Brazil Bulgaria Canada Chile China PRC Colombia Costa Rica Croatia Cyprus Czech Republic Denmark Dubai, UAE Finland France Germany Greece Hong Kong SAR Hungary India Indonesia Ireland Israel Italy Japan Korea Luxembourg Malaysia Mexico The Netherlands New Zealand Norway Peru Philippines Poland Portugal Puerto Rico Romania Russia Saudi Arabia Scotland Singapore Slovakia Slovenia South Africa Spain Sweden Switzerland Taiwan Thailand Turkey Ukraine United Kingdom United States Venezuela Vietnam Zimbabwe Copyright 2005 Cisco Systems, Inc. All rights reserved. CCSP, CCVP, the Cisco Square Bridge logo, Follow Me Browsing, and StackWise are trademarks of Cisco Systems, Inc.; Changing the Way We Work, Live, Play, and Learn, and iquick Study are service marks of Cisco Systems, Inc.; and Access Registrar, Aironet, ASIST, BPX, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Empowering the Internet Generation, Enterprise/Solver, EtherChannel, EtherFast, EtherSwitch, Fast Step, FormShare, GigaDrive, GigaStack, HomeLink, Internet Quotient, IOS, IP/TV, iq Expertise, the iq logo, iq Net Readiness Scorecard, LightStream, Linksys, MeetingPlace, MGX, the Networkers logo, Networking Academy, Network Registrar, Packet, PIX, Post- Routing, Pre-Routing, ProConnect, RateMUX, ScriptShare, SlideCast, SMARTnet, StrataView Plus, TeleRouter, The Fastest Way to Increase Your Internet Quotient, and TransPath are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries. All other trademarks mentioned in this document or Website are the 2005 property Cisco of Systems, their respective Inc. owners. All rights The use reserved. of the word partner does not imply a partnership relationship between Cisco and any other company. Important (0502R) notices, privacy statements, and trademarks of Cisco Systems, Inc. can be found on cisco.com. 205226.x_ETMG_KL_4.05 Page 11 of 12 Printed in the USA

Page 12 of 12