Datasheet
Data Sheet 
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.  Page 7 of 12 
Features  Summary 
Logging/Monitoring 
● 
Syslog: External servers, up to 16 servers (4 per context) 
● 
FTP, URL, ACL logging 
● 
SNMP v2c 
● 
Multiplatform real-time monitoring, analysis and reporting with Cisco Security 
Monitoring, Analysis and Response System (MARS) v4.2 for FWSM Software 
2.3 or later 
Note:  Cisco FWSM Software versions 3.2, 3.1, 2.3, and 2.2 incorporate many of the features 
from Cisco PIX Security Appliance Software versions 7.0, 6.3, and 6.2, respectively. 
Example FWSM Deployments 
The Cisco FWSM can be deployed in topologies serving enterprise campuses, data centers, 
or service providers. The FWSM maximizes capital investment by providing the best price-
performance ratio in a firewall. 
Today’s enterprises need more than just perimeter security—they need to connect business 
partners and provide campus security domains that serve multiple groups within these 
organizations. The Cisco FWSM provides a flexible, cost-effective, and performance-based 
solution that allows users and administrators to establish security domains with different policies 
within the organization. Using the Cisco FWSM, users can set appropriate policies for different 
VLANs. Data centers also require stateful firewall security solutions to filter malicious traffic and 
protect data in the Demilitarized zones (DMZ) and extranet server farms. while delivering gigabit 
performance at the lowest possible cost. Figure 2 shows secured LAN deployments using the 
Cisco FWSM in the Enterprise campus and data center. 










