Professional Documents
Culture Documents
Common Deployment
Scenarios
Presentation_ID
Selected List of
Recognized Protocols
HTTP, HTTPS, and JAVA
E-mail: POP, SMTP, ESMTP,
IMAP
P2P and IM ((AIM,, MSN,, and
Yahoo!)
FTP, TFTP, and Telnet
Resiliency:
R
ili
Hi h availability
High
il bilit ffor users and
d
applications with stateful firewall failover
Presentation_ID
Cisco Confidential
Transparent
p
firewall: large
g to medium sized branch office
Example: branch office with many existing network nodes
IOS Firewall provides network protection without disrupting the existing network scheme
Cisco Confidential
Private WAN
Local LAN
Head Office
Cisco
Integrated
Services
Router
Mobile
devices
Cisco Confidential
POS
Store Router
IPSec Tunnel
Local LAN
Internet
Wi-Fi Users
Payment
Head Office
Cisco
Integrated
Services
Router
Devices
Presentation_ID
Cisco Confidential
Store Router
IPSec Tunnel
VRF B
Internet
Point-of-Sales
VRF C
Pharmacy
Cisco
Integrated
Services
Router
Partner Photo Shop Head
Office
Cisco Confidential
Clients
Cisco
Integrated
Services
Router
Head Office
Cisco Confidential
CUCM
STUN/ICE
message with
crypto token
FW opens pinhole
after verifying
crypto token
IP WAN
Endpoint
Endpoint
Cisco Confidential
Presentation_ID
Cisco Confidential
Presentation_ID
Cisco Confidential
10