Depth (inches) | 12 |
Width (inches) | 17.25 |
Height (inches) | 3.5 |
Weight (Pounds - lbs) | 21 |
Power-Supply Options | AC, PoE, and DC |
Memory DDR2 ECC DRAM - Default | 512 MB |
Memory (DDR2 ECC DRAM) - Maximum | 2 GB |
RPS Support (External) | Cisco RPS 2300 |
AC Input Voltage | 100 to 240 VAC auto ranging |
AC Input Frequency | 47 to 63 Hz |
AC Input Current Range AC Power Supply (Maximum) | 2.2 to 1.0A |
AC Input Surge Current | <50A |
Maximum Power with AC Power Supply (Watts) | 210 |
DC Input Voltage | 24 to 60 Vdc, autoranging positive or negative |
DC Input Current | (MAX) 8A (24V) 3.5A (60V) |
Traffic Management | QoS, Class-Based Weighted Fair Queuing (CBWFQ), Weighted Random Early Detection (WRED), Hierarchical QoS, Policy-Based Routing (PBR), Performance Routing (PfR), and Network-Based Advanced Routing (NBAR). |
Encapsulation | Ethernet, 802.1q VLAN, Point-to-Point Protocol (PPP), Multilink Point-to-Point Protocol (MLPPP), Frame Relay, Multilink Frame Relay (MLFR) (FR.15 and FR.16), High-Level Data Link Control (HDLC), Serial (RS-232, RS-449, X.21, V.35, and EIA-530), Point-to-Point Protocol over Ethernet (PPPoE), and ATM. |
Protocols | IPv4, IPv6, Static Routes, Open Shortest Path First (OSPF), Enhanced IGRP (EIGRP), Border Gateway Protocol (BGP), BGP Router Reflector, Intermediate System-to-Intermediate System (IS-IS), Multicast Internet Group Management Protocol (IGMPv3) Protocol Independent Multicast sparse mode (PIM SM), PIM Source Specific Multicast (SSM), Distance Vector Multicast Routing Protocol (DVMRP), IPSec, Generic Routing Encapsulation (GRE), Bi-Directional Forwarding Detection (BVD), IPv4-to-IPv6 Multicast, MPLS, L2TPv3, 802.1ag, 802.3ah, L2 and L3 VPN. |
Secure connectivity | Secure collaborative communications with Group Encrypted Transport VPN, Dynamic Multipoint VPN (DMVPN), or Enhanced Easy VPN |
Integrated threat control | Responding to sophisticated network attacks and threats using Cisco IOS Firewall, Cisco IOS Zone-Based Firewall, Cisco IOS IPS, Cisco IOS Content Filtering, and Flexible Packet Matching (FPM) |
Identity management | Intelligently protecting endpoints using technologies such as Authentication, Authorization, and Accounting (AAA) and Public Key Infrastructure (PKI) |