Datasheet

Cisco Systems, Inc.
All contents are Copyright © 1992–2002 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement.
Page 3 of 12
Low Cost of Ownership
With Cisco IOS Software, customers using the Cisco 800 Series can reduce operational costs for training,
management, installation, anddeployment. The Cisco 800 Seriesprovides key wide-area network (WAN) and ISDN
optimization features, including bandwidth on demand (BoD), dial-on-demand routing (DDR), time of day/access
control lists (ACLs), and always-on/dynamic ISDN (AO/DI). The Cisco 803 and 804 routers also offer an all-in-one
solution that combines telephone, fax, and data communication on a single access line.
Product Features
ISDN Features
The Cisco 800 Series supports ISDN switched, leased-line connections, AO/DI, X.25 over ISDN D channel,
Bandwidth Allocation Control Protocol (BACP), Multilink PPP (MLP), Compression Control Protocol (CCP)
compression (up to 4:1), and BoD with load balancing for links up to 128 kbps for effective throughput up to
512 kbps. For ISDN cost control, the Cisco 800 Series supports advice of change and dynamic short hold mode. Also
new in Cisco Fast Step Release 2.3 is the point-and-click ability to limit connections to one B channel.
Security
To take advantage of the unprecedented opportunities offered by communications and commerce over the Internet,
private information must remain secure. Cisco Secure Integrated Software provides many technologies to build a
custom security solution. The elements of security services include perimeter security, identity, monitoring, privacy,
firewalls, IPSec encryption, and VPNs.
Standard Security
Perimeter security refers to the control of traffic entry and exit between network boundaries, such as between private
networks, intranets, extranets, or the Internet. Cisco IOS perimeter security technologies provide a highly flexible,
superior solution with features such as:
Standard and extended ACLs
Lock and Key (dynamic ACLs)
Router/route authentication, authorization, and accounting (such as Password Authentication Protocol/
Challenge Handshake Authentication Protocol [PAP/CHAP]), Microsoft CHAP (MSCHAP)
Network Address Translation (NAT) (including multi-NAT)
Token card authentication with Cisco Secure authentication
NAT eliminates the need to readdress all hosts with existing private network addresses and hides internal addresses
from public view. For businesses that want to allow selected access to the network, NAT can be configured to allow
only certain types of data requests such as Web browsing, e-mail, or file transfers.