Networking
| Supports ISDN connection |
N |
| Switching protocols |
AppleTalk, ATM, Frame Relay, IP, IPX, RSVP |
| Routing protocols |
BGP |
| Management protocols |
HTTP |
Security
| VPN support |
DES, 3DES |
| Firewall |
Y |
Wireless LAN features
| Top Wi-Fi standard |
IEEE 802.11g |
| Wi-Fi standards |
IEEE 802.11a, IEEE 802.11b, IEEE 802.11g |
Ethernet LAN features
| Ethernet LAN interface type |
Fast Ethernet |
| Ethernet LAN data rates |
10, 100 Mbit/s |
Other features
| xDSL connection |
N |
| Internal memory |
128 MB |
| Flash memory |
32 MB |
| Form factor |
1U |
| Rack mounting |
Y |
Certificates
| Safety |
UL 60950, CAN/CSA C22.2 No. 60950, IEC 60950-1, EN 60950-1, AS/NZS 60950 |
Protocols
| Supported network protocols |
IPSec |
Operational conditions
| Operating altitude |
0 - 3000 m |
Additionally
| Ethernet LAN connection |
Y |
Security Router with 802.11a+g FCC Compliant and Analog B/U
Cisco 1800 Fixed-Configuration Integrated Services are the next evolution of the award-winning Cisco 1700 Series modular access routers. The Cisco 1800 Series fixed-configuration routers are designed for secured broadband access, Metro Ethernet, and wireless connectivity. They also help businesses reduce costs by enabling deployment of a single device to provide multiple services typically performed by separate devices.
The Cisco 1811 Integrated Services Router provides:
- Secure broadband access with concurrent services for branch and small offices
- Integrated ISDN Basic Rate Interface (BRI), analog modem, or Ethernet backup port for redundant WAN links and load balancing
- LAN Switching with optional inline POE
- Secure wireless LAN for simultaneous 802.11a and 802.11b/g operation with use of multiple antennas
- Advanced security including:
- Stateful Inspection Firewall
- IP Security (IPSec) VPNs (Triple Data Encryption Standard [3DES] or - Advanced Encryption Standard [AES])
- Dynamic Multipoint VPN (DMVPN) and Easy VPN
- Intrusion Prevention System (IPS)
- Antivirus support through Network Admission Control (NAC) and enforcement of secure access policies