Datasheet
Data Sheet
© 2008 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 5 of 10
Table 2. Cisco 520 Series Secure Router Specifications
Feature Description
Routing protocols and general
router features
●
Routing Information Protocol (RIPv1 and RIPv2)
●
Cisco Express Forwarding
●
Port Address Translation (PAT)
●
RFC 1483/2684
●
Point-to-Point Protocol over ATM (PPPoA) (DSL models only)
●
Point-to-Point Protocol over Ethernet (PPPoE)
●
802.1d Spanning Tree Protocol
●
Dynamic Host Configuration Protocol (DHCP) server/relay/client
●
Dynamic DNS support for Cisco IOS Software
Recommended number of users Up to 50
IPv6 features
●
IPv6 addressing architecture
●
IPv6 name resolution
●
IPv6 statistics
●
IPv6 translation-transport packets between IPv6-only and IPv4-only endpoints
●
Internet Control Message Protocol (ICMP) v6
●
IPv6 DHCP
DSL and ATM features (DSL
models only)
●
ATM Variable Bit Rate/realtime (VBR-rt)
●
ATM Unspecified Bit Rate (UBR), Constant Bit Rate (CBR), and Variable Bit
Rate/non-realtime (VBR-nrt)
●
ATM Operation, Administration, and Maintenance (OAM) support for F5 continuity
check; segment and end-to-end loopback; and Interim Local Management Interface
(ILMI) support
●
10 virtual circuits
Security features
●
Hardware-accelerated 3DES for IPSec
●
Hardware-accelerated AES for IPSec
●
Secure Sockets Layer (SSL) VPN
●
Cisco Easy VPN Client and Server
●
IPSec 3DES termination/initiation
●
IPSec pass-through
●
Point-to-Point Tunneling Protocol (PPTP) pass-through
●
10 VPN tunnels
●
Easy VPN remote web-based activation
●
Application inspection and control
●
Firewall support for SKINNY clients
●
HTTP inspection engine
●
Email inspection engine
●
Intrusion protection system
●
URL filtering
●
NAT transparency
●
802.1
●
Secure HTTP (HTTPS), FTP, and Telnet authentication proxies
●
No service password recovery
●
Access control lists (ACLs)
QoS features
●
Weighted Fair Queuing (WFQ)
●
Class-Based WFQ (CBWFQ)
●
Low-Latency Queuing (LLQ)
●
Class-based QoS MIB
●
Pre-fragment before encryption
●
TX ring adjustment
●
VC bundling
●
Policy-based routing (PBR)
●
Per-VC queuing
●
Per-VC traffic shaping










