Cisco ASA 5510 Adaptive Security Appliance ASA5510-BUN-K9 is designed to protect networks for small and medium-sized businesses and enterprise remote/branch offices in an easy-to-deploy, cost-effective way. The Cisco ASA 5510 has high-performance firewall, VPN services and five 10/100 integrated Fast Ethernet ports. It also supports high-performance intrusion prevention and worm mitigation services through the AIP SSM, or comprehensive malware protection services through the CSC SSM, from which modules make ASA5510-BUN-K9 an excellent choice for different businesses requiring.
Security Plus license can upgrade two of the Cisco ASA 5510 interfaces to Gigabit Ethernet and enable integration into switches through VLAN support. Simultaneously this upgrade license enables Active/Active and Active/Standby high-availability services. Moreover, up to 250 IPsec VPN peers supported on the base platform, up to 250 AnyConnect and/or clientless VPN peers supported on an Essential or a Premium AnyConnect VPN license makes the Cisco ASA 5510 a perfect choice for businesses want to extend their number of mobile workers, remote sites, and business partners.
Cisco ASA 5500 Series Adaptive Security Appliance
- Market-proven security capabilities
- Extensible integrated services architecture
- Reduced deployment and operations costs
- Comprehensive management interfaces
The system has power
The power-up diagnostics are running or the system is booting
The system has passed power-up diagnostics
The power-up diagnostics have failed
This unit is the Active unit in the failover pair
This unit is the Standby unit
A VPN tunnel has been established
The CompactFlash is being accessed
Security Services Processors, Modules and Cards:The Cisco ASA 5500 Series brings a new level of integrated security performance to networks with its highly effective IPS services and multiprocessor hardware architecture. This architecture allows businesses to adapt and extend the high-performance security services profile of the Cisco ASA 5500 Series. Customers can add additional high-performance services using security services modules with dedicated security co-processors, and can custom-tailor flow-specific policies using a highly flexible policy framework. This adaptable architecture enables businesses to deploy new security services when and where they are needed, such as adding the broad range of intrusion prevention and advanced anti-worm services delivered by the IPS modules via IPS SSP, AIP SSM and AIP SSC, or the comprehensive malware protection and content security services enabled by the CSC SSM. Further, the architecture allows Cisco to introduce new services to address new threats, giving businesses outstanding investment protection for the Cisco ASA 5500 Series.Characteristics of Cisco AIP SSM and SSC Models for ASA5510:
Cisco ASA 5500 Series AIP SSM-10
Concurrent Threat Mitigation Throughput (Firewall + IPS Services)
150 Mbps with Cisco ASA 5510
Cisco ASA 5500 Series AIP SSM-20
300 Mbps with Cisco ASA 5510
Cisco ASA 5500 Series CSC-SSM-10
Optional User license (Total Users)
• 50 users
• 500 users
Cisco ASA 5500 Series CSC-SSM-20
• 500 users
• 750 users
• 1000 users
Cisco ASA 5500 Series 4-Port GE SSM
Five Fast Ethernet and four Gigabit Ethernet ports
Firewall ASA5510-BUN-K9 Firewall Users Unlimited Maximum firewall throughput (Mbps) 300 Maximum connections 50,000 Maximum connections/second 6,000 Packets per second (64 byte) 190,000 Application-layer security Yes Layer 2 transparent firewalling Yes Security contexts (included/maximum)3 0/0 GTP/GPRS inspection3 Not available VPN Maximum 3DES/AES VPN throughput (Mbps) 170 Maximum site-to-site and remote access
IPsec VPN user sessions
250 SSL user session license included 2 Maximum SSL VPN user sessions1 250 VPN clustering and load balancing Not available UTM Features Included Intrusion Prevention Included (Performance) No Content Security [anti-virus, anti-spyware,
file blocking, anti-spam, anti-phishing,
and URL filtering] (Max users)
No Other Features Integrated ports2 5-10/100 Maximum virtual interfaces (VLANs) 50 (trunking enabled) High availability support4 Not supported
Please confirm if the ASA5510-BUN-K9 will assist me in the following: 1. Act as a firewall, were I can configure access control on at port level, 2. I can also control protocol control at application level 3. Extract audit logs on who has access denials and allowance. 4. Securely provide web and remote access to application. 5. Support VPN implementation.
YES, they are all the basic features of ASA device.
Kindly advice on which ASA i will find below features: Content Security [anti-virus, anti-spyware, file blocking, anti-spam, anti-phishing, and URL filtering] (Max users).
ASA5510-CSC20-K9 ASA 5510 Appl w/ CSC20, SW, 500 Usr AV/Spy, 1 YR Subscript.
Can ASA5510-BUN-K9setup SITE TO SITE VPN without SEC license?
YSE, Cisco ASA 5510 Firewall Edition includes 5 Fast Ethernet interfaces, 250 IPsec VPN peers, 2 Premium VPN peers, 3DES/AES license.
250 IPsec VPN peers is SITE TO SITE VPN.
How can configure my ASA 5510 to Router 3925 via vpn (if its is possible dmvpn)?
The ASA soes not support DMVPN so you'll just have to configure a regular S to S.
I've recently taken over a new role from a co-worker and could really use some expert advice. I'm attempting to setup Outlook Web Access and a secondary MX record over at my failover datacenter. There I have a 5510 which already has an IP assigned by our ISP bound to the WAN interface. I purchased a new block of addresses on a different subnet that I'd like to use for OWA and a secondary MX record at my datacenter. I can't seem to bind more than one public address in a different subnet to the WAN interface which is how I thought this would work. I further read that the work-around is to use Proxy ARP and NAT. Being new to this I could really use some step-by-step help in configuring the ASA so the new addresses I have are properly forwarded to Exchange (OWA) and Websense (secondary MX). I can have Cisco support do it but I want to understand how this works so I can be more useful in the future. Many thanks in advance for any assistance!
You do not need to assign the public IP to an interface to use it for NAT. You simply configure NAT and allow the traffic in your acl (if you have one). What version of code are you running on your ASA because NAT is very different from 8.3 onwards. "sh run" will show the version right at the top.
- Shipping & Payment
Cargo will be delivered within 1 day after payment arrived. Tracking Number will be offered once delivery done.
Delivery Options Estimated Delivery Time DHL 2-4 business days Fedex 2-4 business days Hong Kong EMS 5-10 business days Hong Kong Air Parcel 10-20 business days By Sea 10-20 business days
Above mentioned information are just for your reference only,we will keep you posted for the tracking delivery schedule.There are two delivery options available for by air and by sea:
Deliver to port:
Router-switch.com is responsible for transporting goods to port. All subsequent customs and transportation fees are the
responsibility of the buyer. Router-switch will recommend trustworthy local freight forwarders to you.Router-switch.com can facilitate the progress under buyer's permission and at buyer's expense.
Deliver to door:
Router-switch.com will quote all destination charge prior once we have confirmed order.
Router-switch.com is responsible for transporting goods to door after you have made the payment.
Paypal Master Card Visa Discover American
JCB Wire Transfer eCheck WestUnion
100% Low Price Guarantee:
Router-switch.com provides high-quality products at low wholesale prices
100% Quality Assurance:
All items are ORIGINAL and GENUINE only.
Item conditions are "New Sealed" or "Used / Refurbished".
Used & refurbished items are fully tested with good conditions by Cisco-certified Engineers.
Free CCIE Technical Support:
Our FREE Cisco CCIE Expert Consultancy Support is over the phone, by chat, by email or by login remotely.
100% Money Back Guarantee:
You can contact our customer service team to exchange or return any product that you bought from us.
Flexible Secure Payment & Shipment:
Verified authorization: Mcafee Secure, VeriSign Secured
Return Material Authorization (RMA) Process
Standard Hardware Warranty Policy:
Original new sealed Cisco product: 1 Year
Used Cisco product: 3 Month
The Support Contacts:
If your Cisco products failed, you must contact your sales representative to verify product failure. If the problem still can't correct by remote support methods i.e. email or phone support, the RMA procedure will issue.