Network Router User Manual

Product Models
Cisco 800 IDSL Features and Benefits
Model Ethernet LAN WAN Analog Telephone Ports Console Port
Cisco 802 IDSL One 10BaseT (RJ-45) One IDSL U,
integrated NT1 (RJ-45)
None RJ-45
Cisco 804 IDSL 10BaseT (RJ-45) 4-port hub One IDSL U,
integrated NT1 (RJ-45)
2(RJ-11) RJ-45
Feature Benefit
High-Speed Access
Compression up to 4:1 ratio Effective throughput of up to 512 kbps
Selectable speed settings (64 kbps, 128 kbps, 144 kbps) Allows service providers to offer differentiated service levels
WAN Interface
Compatible with Adtran, Alcatel, Cisco, Copper Mountain,
Lucent, Nokia, Paradyne, Pulsecom, and all standards-based
IDSL DSLAMs
Easy to deploy into existing network infrastructure
Works through Digital Loop Carriers with distances up to 36,000 feet Extend reach to increase subscriber base
WAN Performance
Constant Internet connection Allows multiple users to connect to the Internet simultaneously, saving time and money for
businesses with numerous heavy users who need instant access
Choice of Encapsulation (PPP, Frame Relay) Ensures compatibility with existing network
LAN Interface
One Ethernet 10BaseT port (802-IDSL) Connect to a single PC or Ethernet hub
Integrated 4-port Ethernet hub (804-IDSL) Integrated solution for small office
Security
Standard Security
PAP, CHAP, and Extended Access Control Lists Protects network resources from unauthorized access
Network address translation Keeps local IP addresses hidden from the outside world
Enhanced Security
Cisco IOS Firewall
Context Based Access Control Lists (CBAC)
Java Blocking
Real Time Audit and Alerts
Denial of Service
Offers internal users secure, per-application-based, stateful access control. CBAC differentiates
Cisco IOS Firewall from other non-stateful, basic firewalls
Defends and protects router resources against denial-of-service attacks
Checks packet headers, dropping suspicious packets
Protects against unidentified, malicious Java applets
Details transactions for reporting on a per-application, per-feature basis
IPSec Encryption 56 bit DES, L2TP Tunneling Ensures confidential data integrity and data origin authenticity while traversing the Internet by
using standards-based encryption
Provides encryption for all users on the LAN without configuring individual PCs