MANAGED SERVICES: CISCO IOS FIREWALL

Similar documents
ENHANCED INTERIOR GATEWAY ROUTING PROTOCOL STUB ROUTER FUNCTIONALITY

END-OF-SALE AND END-OF-LIFE ANNOUNCEMENT FOR THE CISCO MEDIA CONVERGENCE SERVER 7845H-2400

ANNOUNCING NEW PRODUCT OFFERINGS FOR THE CISCO CATALYST 6500 SERIES

NEW METHOD FOR ORDERING CISCO 1700 SERIES MODULAR ACCESS ROUTERS AND CISCO 1800 SERIES INTEGRATED SERVICES ROUTERS SOFTWARE SPARE IMAGES

Cisco CallManager 4.0-PBX Interoperability: Lucent/Avaya Definity G3 MV1.3 PBX using 6608-T1 PRI NI2 with MGCP

Cisco Voice Services Provisioning Tool 2.6(1)

NEW JERSEY S HIGHER EDUCATION NETWORK (NJEDGE.NET), AN IP-VPN CASE STUDY

Cisco Extensible Provisioning and Operations Manager 4.5

NEW CISCO IOS SOFTWARE RELEASE 12.2(25)EY FOR CISCO CATALYST 3750 METRO SERIES SWITCHES

CONFIGURING EPOLICY ORCHESTRATOR 3.0 AND MCAFEE 8.0i WITH CISCO CALLMANAGER

CISCO IP PHONE 7970G NEW! CISCO IP PHONE 7905G AND 7912G XML

Cisco 2651XM Gateway - PBX Interoperability: Avaya Definity G3 PBX using Analog FXO Interfaces to an H.323 Gateway

CISCO FAX SERVER. Figure 1. Example Deployment Scenario. The Cisco Fax Server solution consists of the following components:

USING MCAFEE VIRUSSCAN ENTERPRISE 8.0I WITH CISCO CALLMANAGER

THE POWER OF A STRONG PARTNERSHIP.

END-OF-SALE AND END-OF-LIFE ANNOUNCEMENT FOR THE CISCO FLEXWAN MODULE FOR USE WITH THE CISCO 7600 SERIES ROUTERS AND CATALYST 6500 SERIES SWITCHES

USING TREND SERVERPROTECT5 WITH CISCO CALLMANAGER

CISCO SFP OPTICS FOR PACKET-OVER-SONET/SDH AND ATM APPLICATIONS

Cisco MDS 9000 Family and EMC ECC Integration

Cisco 3745 Gateway - PBX Interoperability: Avaya Definity G3 PBX using Q.931 PRI Network Side Interfaces to an H.323 Gateway

Cisco ONS SDH 12-Port STM-1 Electrical Interface Card

CISCO 7304 SERIES ROUTER PORT ADAPTER CARRIER CARD

Using TAPS with +E.164 Directory Numbers

Cisco Catalyst 2950 Series Software Feature Comparison Standard Image (SI) and Enhanced Image (EI) Feature Comparison

Cisco Router and Security Device Manager Intrusion Prevention System

Cisco Unified CallConnector for Microsoft Office Quick Reference Guide 1

Cisco CallManager Server Upgrade Program

NETWORK ADMISSION CONTROL

MULTI-VRF AND IP MULTICAST

CISCO NETWORK CONNECTIVITY CENTER BUSINESS DASHBOARD

THE CISCO SUCCESS BUILDER PROGRAM THE CISCO SMALL OFFICE COMMUNICATIONS CENTER: AFFORDABLE, PROVEN COMMUNICATIONS SOLUTIONS FOR SMALL ORGANIZATIONS

Third party information provided to you courtesy of Dell

Cisco EtherChannel Technology

E-Seminar. Voice over IP. Internet Technical Solution Seminar

High-Availability Solutions for SIP Enabled Voice-over-IP Networks

IP Communications for Small Offices Using Cisco CallManager Express and Cisco Unity Express

CISCO CENTRALIZED WIRELESS LAN SOFTWARE RELEASE 3.0

NEW CISCO IOS SOFTWARE RELEASE 12.2(25)FY FOR CISCO CATALYST EXPRESS 500 SERIES SWITCHES

Cisco Systems Intelligent Storage Networking

CISCO WDM SERIES OF CWDM PASSIVE DEVICES

Cisco Value Incentive Program Advanced Technologies: Period 7

Traffic Offload. Cisco 7200/Cisco 7500 APPLICATION NOTE

Cisco Unity 4.0(4) with Cisco Unified CallManager 4.1(2) Configured as Message Center PINX using Cisco WS-X6608-T1 using Q.SIG as MGCP Gateway

END-OF-SALE AND END-OF-LIFE ANNOUNCEMENT FOR THE CISCO CATALYST 6500 SERIES OC-12 ATM MODULE

CISCO CATALYST 6500 SERIES CONTENT SWITCHING MODULE

Cisco Unified CallManager 4.0-PBX Interoperability: Mitel 3300 ICP Release 4.1 PBX to a Cisco 6608 Gateway using T1 QSIG with MGCP

The Cisco Unified Communications Planning and Design Service Bundle

Взято с сайта

CISCO IOS SOFTWARE RELEASE 12.3(11)YK

CiscoWorks Security Information Management Solution 3.1

Cisco Optimization Services

Cisco Unified Wireless Network Software Release 3.1

Cisco AS5300 Gateway - PBX Interoperability: NEC NEAX 2400 PBX using T1 PRI Interfaces to an H.323 Gateway

Strategic IT Plan Improves NYCHA Resident Services While Reducing Costs US$150 Million

Introducing Cisco Catalyst 4500 Series Supervisor Engine II-Plus-10GE and Cisco Catalyst 4500 Series 48-Port 100BASE-X SFP Line Card

Cisco Aironet In-Building Wireless Solutions International Power Compliance Chart

Cisco Router and Security Device Manager Cisco Easy VPN Server

Cisco Unified CallManager Licensing Pricing Model

Cisco Unified Wireless IP Phone 7920 Multi-Charger

CISCO 7304 SERIES ROUTER PORT ADAPTER CARRIER CARD

WLAN Small Business Guide

The information presented in this document was created from devices in a specific lab environment. All of the devices started with a cleared (default)

Cisco AVVID The Architecture for E-Business

Cisco 7304 Shared Port Adapter Modular Services Card

A New Services Aggregation Benchmark for the WAN and MAN The Cisco 7200VXR Series Router

CISCO 7200 SERIES NETWORK PROCESSING ENGINE NPE-G1

E-Seminar. Wireless LAN. Internet Technical Solution Seminar

CISCO TRANSPORT MANAGER 4.7

Quick Start Guide Cisco CTE 1400 and Design Studio

Cisco 2651XM Gateway - PBX Interoperability: Ericsson MD-110 PBX using Q.931 BRI User Side Interfaces to an H.323 Gateway

Cisco StackWise Technology

Innovation in Accessibility

CISCO 10GBASE XENPAK MODULES

Cisco 7600 Multiprocessor WAN Application Module for Broadband Aggregation

Cisco ONS SONET 48-Port DS-3/EC-1 Interface Card

CISCO CATALYST 6500 SERIES WITH CISCO IOS SOFTWARE MODULARITY

CISCO ONS SONET 12-PORT DS-3 TRANSMULTIPLEXER CARD

End-of-Sale and End-of-Life Announcement for Select Cisco Catalyst 2950G and Catalyst 2950T Series Switches

Portable Product Sheets Cat 4500 Supervisors last updated July 22, 2009

Avaya Definity CM 2.0 to a Cisco IAD243X using PRI T1 5ESS ISDN with SIP

CISCO AIRONET 1230AG SERIES ACCESS POINT

Cisco Unified IP Phone 7971G-GE

Cisco MCS 7815-I2-UC1 Media Convergence Server

CISCO AC/DC POWER SOLUTION FOR USE WITH CISCO OPTICAL PLATFORMS

Cisco 7200VXR Series NPE-G2 Network Processing Engine

CISCO GIGABIT INTERFACE CONVERTER

CISCO UNIFIED IP PHONE 7912G

Cisco T3/E3 Network Module for Cisco 2600, 3600, and 3700 Series Routers

Cisco Persistent Storage Device

Multicast Virtual Private Networks

Cisco VPN 3002 Hardware Client

Mitel 3300 ICP Release 4.1 using T1 QSIG to Cisco Unified CallManager 4.0

Cisco ubr7200-npe-g1 Network Processing Engine for the Cisco ubr7246vxr Universal Broadband Router

Cisco Catalyst 4500 Series Power Supplies and External AC Power Shelf

C ISCO INTELLIGENCE ENGINE 2100 SERIES M OUNTING AND CABLING

Announcing the Cisco Wireless IP Phone 7920

CISCO AIRONET 350 SERIES CLIENT ADAPTERS

Cisco ONS MA SONET Multiservice Platform

CISCO IPCC EXPRESS EDITION FEATURES AND PRODUCT SPECIFICATIONS

Cisco 806 Broadband Router

Transcription:

Q&A MANAGED SERVICES: CISCO IOS FIREWALL Cisco IOS Software-Based Technologies for Managed Services The managed network services opportunity is projected to increase significantly in the coming years. A recent Cisco Systems survey of 500 large corporations found substantial interest in managed IP services. At the top of the list were IP VPNs as a foundation for the integration of older networks and the addition of new services. Business customers from the largest global corporations to midsize and smaller firms are focusing on achieving cost efficiencies while adding new services. Recognizing the value of the network as a strategic tool, many companies are turning to service providers to manage their networks so they can focus more resources on their businesses. The IP VPN allows integration of older networks (such as ATM and Frame Relay) and provides a foundation for many new services. Examples include managed core services offerings and managed WAN and LAN services, which have been augmented by improved Web-based, user-friendly tools; service-level agreements (SLAs) and guarantees; and many newer IP-based applications, such as voice over IP (VoIP). Cisco IOS Software technologies make possible a secure, highly available, cost-effective managed services environment within an IP VPN. Partnering with Cisco, service providers can streamline their infrastructures to avoid unnecessary overhead, offer more services more efficiently, and position these service offerings successfully with the established Cisco global enterprise customer base. Features such as Enhanced Interior Gateway Routing Protocol (EIGRP) make routing more efficient and turn IP/Multiprotocol Label Switching (MPLS) VPNs into a simpler, benefitrich addition to customer networks. Cisco IOS Software technologies for managed services environments serve as the foundation for high-speed routing and IP/MPLS, scalable IP VPNs, and robust network security, all integrated through a next-generation network management interface. These operate within several network topologies to fit the needs of different customers. Products in the Cisco IOS Software Family bring customizable networking solutions to headquarters, branch offices, and campuses, and extend full network capability to mobile workers, telecommuters, and remote data centers. Cisco IOS Firewalls in Managed Services More companies are realizing that the network is at the heart of their operations, and are making security a top priority. Small and medium-sized businesses (SMBs) are joining larger organizations to put appropriate safeguards in place. Service providers are taking up the security challenge, dedicating significant resources and personnel to selling managed security services. Cisco network security solutions that are embedded within IP VPNs allow service providers to meet the security requirements of a wide range of business customers. Integral to the Cisco security portfolio, Cisco IOS Firewall and Cisco IOS Intrusion Prevention give service providers comprehensive solutions to address growing security concerns. Cisco IOS Firewall gives providers of managed services the ability to offer router-based advanced firewall capabilities and intrusion detection and authentication. Cisco IOS Firewall is supported on multiple Cisco router platforms. The Per-User Firewall feature of Cisco IOS Firewall allows service providers to offer a managed firewall solution through download of firewall, access control lists (ACLs), and other settings on a per-user basis, using a profile in the authentication, authorization, and accounting (AAA) server. AAA services streamline management of security solutions, for network and cost efficiencies. These and other security features from Cisco offer service providers technologies that can generate ongoing managed services revenue while maintaining securely managed networks for large enterprises and smaller customers. All contents are Copyright 1992 2004 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement. Page 1 of 8

Q. What is a firewall? A. A firewall is one or a group of mechanisms that protect networks by controlling and monitoring access entering and exiting the network. Because all traffic must traverse the firewall, it functions as a gatekeeper. It blocks access to specific protocols and data types, and inspects traffic flow for protocol adherence. This ensures that traffic continues to act in its original function. Although the method by which this process occurs is different in all implementations, the firewall generally performs several functions. Q. A. What are the benefits of integrated Cisco IOS Firewall? Along with other integrated security solutions, Cisco IOS Firewall: Takes advantage of existing network infrastructure, enabling new security features on the router through Cisco IOS Software without deploying additional hardware Provides the flexibility to apply firewall functions anywhere in the network to maximize security benefits Protects the router, defending against attacks targeted directly at the network infrastructure, such as distributeddenial-of-service (DDoS) attacks Allows deployment of best-in-breed security functions at all entry points into the network Reduces the number of devices, lowering training and manageability costs Simplifies network deployment (for example, customers do not have to design around non-eigrp devices) Takes advantage of Cisco PIX Firewall technology, combining robust Cisco IOS Software functions and industryleading LAN and WAN connectivity with world-class stateful firewall functions Q. A. When should I use Cisco IOS Firewall? You can use Cisco IOS Firewall to: Protect the Internet link (most commercial requirements are in this category, for example split tunneling) Protect the spoke from the hub Protect the hub from the spoke (especially when potential threats exist inside the spoke, such as wireless access points) Protect from LAN to LAN Act as a bidirectional firewall for intelligent protection switching [CORRECT?] (IPS) (for example, protecting hub and spoke from each other simultaneously) Q. What platforms support Cisco IOS Firewall? A. Cisco IOS Firewall is currently supported on the Cisco 800, ubr900, 1700, 1800, 2600, 2800, 3600, 3700, 3800, 7100, 7200, and 7500 series routers, the Cisco 7301 Router, and Cisco Catalyst 5000 and Catalyst 6000 series switches. This breadth of supports enables it to deliver important benefits, including multiservice integration (data, voice, video, and dial) and advanced security for dialup connections. Q. Why use Cisco IOS Firewall in the branch? A. Many networks have hub-and-spoke topologies that include branch offices, where the traffic aggregates into a larger corporate office (the hub). Although the hub is a common location to block and inspect traffic for attacks, it is not the only location to consider when deploying security. Branch offices also are an important location in your network to enable both firewall and IPS to address attacks as close to the entry point into the network as possible. By Page 2 of 8

enabling Cisco IOS Software-based VPNs site to site (IP Security [IPSec]) or IPSec with generic routing encapsulation (GRE) or Dynamic Multipoint VPNs (DMVPNs), with or without split tunneling; Cisco IOS IPS; and Cisco IOS Firewall a Cisco router can perform encryption and decryption, tunnel termination, firewalling, and traffic inspection at the first point of entry into the network, an industry first. This reduces the number of additional devices needed to support the system and reduces operating and capital expenditure costs while enhancing security. Because it is an integrated solution, such a deployment does not require a separate device, thereby reducing network complexity and management. The net result is that Cisco IOS Firewall helps to stop attacking traffic at the point of origination, removing the unwanted traffic from the network as quickly as possible. Q. Can I use an integrated services router as a firewall? A. Yes. All Cisco 1800, 2800, and 3800 series integrated services routers can enable the Cisco IOS Firewall when purchased with the Cisco IOS Software Advanced Security or higher feature sets. The primary features of Cisco IOS Firewall include: Industrywide security-certified, stateful firewall Advanced protocol inspection for voice, video, and other applications Per-user, interface, or subinterface security policies Tightly integrated identity services to provide per-user authentication and authorization The Cisco IOS Firewall not only helps enable a single point of protection at the perimeter of a network, it also makes security policy enforcement an inherent component of the network itself. The flexibility and cost-effectiveness of both dedicated and integrated policy enforcement provides security solutions for extranet and intranet perimeters and Internet connectivity for a branch or remote office. Integrated into the network through Cisco IOS Software, the Cisco IOS Firewall also allows customers to use advanced quality-of-service (QoS) features in the same router. Q. Can Cisco integrated services routers support transparent firewalling? What are the benefits? A. In addition to Layer 3 stateful firewalling, Cisco IOS Software routers can support transparent firewalling, which is the ability to provide Layer 3 firewalling for Layer 2 connectivity. The benefits of a transparent firewall follow: Easy addition of firewall to existing networks No IP subnet renumbering required Support for subinterfaces and VLAN trunks Spanning Tree Protocol support Handles bridge-protocol-data-unit (BPDU) packets correctly per 802.1d, not just pass or drop Support for mixing Layer 2 and Layer 3 firewalling on the same router No need for IP addresses on the interfaces Support for all standard management tools Support for Dynamic Host Configuration Protocol (DHCP) pass-through to assign DHCP addresses on opposite interfaces (bidirectional) Figure 1 shows an application of a transparent firewall. Figure 1. Segment Existing Network Deployments into Security Trust Zones Without Making Address Changes: Cisco IOS Firewall Provides Transparent Layer 2 Segmentation [EDITS: cap s: Store; Cisco IOS ; Layer 2 (not L2)] Page 3 of 8

Q. Is Cisco IOS Firewall a stateful firewall? A. Yes, it is a stateful firewall that uses the inherent stateful inspection engine of Cisco IOS Software for maintaining the detailed sessions database. Q. What protocols or predefined services does Cisco IOS Firewall support? A. Cisco IOS Firewall supports generic TCP regardless of the application layer protocol (sometimes called "singlechannel" or "generic" TCP inspection), all User Datagram Protocol (UDP) features [CORRECT?] regardless of the application layer protocol (sometimes called single-channel or generic TCP [SHOULD THIS BE UDP?] inspection),cu-seeme, FTP, H.323v2, Session Initiation Protocol (SIP), Skinny Client Control Protocol (Skinny), HTTP (Java blocking), Internet Control Message Protocol (ICMP), Microsoft NetShow, UNIX R-commands (such as rlogin, rexec, and rsh), RealAudio, Real Time Streaming Protocol (RTSP), remote-procedure call (RPC), Simple Mail Transport Protocol (SMTP), SQL*Net, StreamWorks, Trivial File Transfer Protocol (TFTP), and VDOLive. Q. What certifications are available for Cisco IOS Firewall? A. On August 20, 2004, ICSA Labs announced that Cisco IOS Firewall was a certified product in its labs using the Cisco 2651XM Multiservice Router and the Cisco 3725 Multiservice Access Router. The Cisco 1841, 2811, and 3825 integrated services routers were certified in October, 2004. Recognizing that these validations are a critical component of its integrated security strategy, Cisco is dedicated to the ongoing pursuit of Federal Information Processing Standards (FIPS), Internet Computer Security Association (ICSA), and Common Criteria certifications. Q. What kind of performance can I expect from an integrated Cisco IOS Firewall? Page 4 of 8

A. In an independent test performed by Miercom, Cisco IOS Firewall performance was validated at up to 1.1 Gbps on the new Cisco 3800 Integrated Services Router. Q. What tools are available to manage the Cisco IOS Firewall? A. CiscoWorks VPN/Security Management Solution (VMS) and Cisco Router and Security Device Manager (SDM) are available to manage Cisco IOS Firewall. Cisco SDM offers both easy-to-use wizards for deployment and a graphical view to see how the firewall policies applied affect the traffic flow. Q. What system management tools are available for configuration and monitoring of security on Cisco routers? A. For management of firewall and VPN features, the CiscoWorks VMS management bundle is available (Figure 2). For more information about the CiscoWorks VMS, visit: http://www.cisco.com/go/vms. Figure 2. CiscoWorks VMS Screenshot Q. What device management tools are available for deploying security on Cisco routers? A. The new Cisco 1800, 2800, and 3800 series routers come with factory-installed Cisco SDM. Cisco SDM is an intuitive, Web-based device manager (GUI) for deployment and management of Cisco IOS Software-based routers (Figure 3). Cisco SDM helps enable easy router configuration and monitoring through the use of a startup wizard for quick deployment and lock-down, smart wizards to help enable security and routing features, Cisco Technical Assistance Center (TAC)-approved router configurations, and subject-related educational content (Figure 3). Page 5 of 8

Figure 3. Cisco SDM 2.0 Cisco SDM 2.0 combines routing and security services management with ease of use, smart wizards, and in-depth troubleshooting capabilities to provide a tool that supports the benefits of integrating services onto the router. Customers can now synchronize the routing and security policies throughout the network, have a more comprehensive view of their router status, and reduce their operational costs. Cisco SDM 2.0 includes support for the following new features: Inline IPS with dynamic signature update and signature customization Role-based router access support Easy VPN server and AAA Digital certificates for IPSec VPNs VPN and WAN connection troubleshooting QoS policy configuration and network-based application recognition (NBAR)-based application traffic monitoring For more information about the Cisco SDM, visit: http://www.cisco.com/go/sdm. Q. A. Can the switching interfaces on the integrated services routers be used with Transparent Cisco IOS Firewall? Yes. This is easily done by creating VLAN interfaces and then applying the firewall to these interfaces. Q. Do the integrated services routers support URL filtering? A. URL filtering has become increasingly important within companies because of increased liability from inappropriate material in the workplace; it also is a tool to increase productivity while using corporate assets. URL Page 6 of 8

filtering is offered two ways for integrated services routers either within Cisco IOS Firewall or through the contentengine network module. Cisco IOS Firewall as a URL filter supports Websense and N2H2 Web filtering clients and works with external Websense and N2H2 servers. As a user requests a URL, the traffic is sent to the Websense or N2H2 server to check the link. If the link is appropriate, the page is loaded. The content-engine network module is available for Cisco 2800 (excluding the Cisco 2801) and Cisco 3800 integrated services routers, which act as an Internet proxy cache and an on-box URL filtering application server. On-box filtering preserves WAN bandwidth because the traffic does not traverse over the network to a remote server. Preloaded filtering applications from original equipment manufacturers (OEMs) Websense and Smartfilter provide features such as Application Use Policy, Traffic Logging and Reporting, and Anti-Virus Gateway (Internet Content Adaption Protocol (ICAP) to scan, clean, and cache Web content. Q. What are the benefits of integrated security? A. Integrated security solutions take advantage of Cisco PIX Firewall and IDS sensor technologies, combining robust Cisco IOS Software functions and industry-leading LAN and WAN connectivity with world-class security functions. Integrating Cisco IOS Software security into the router offers many benefits: Use what you have Takes advantage of existing network infrastructure, helping enable new security features on the router through Cisco IOS Software without deploying additional hardware Deploy security where you need it most Provides the flexibility to apply security functions, such as firewall, IPS, and VPN, anywhere in the network to maximize security benefits Protect your gateways Allows best-in-breed security functions to be deployed at all entry points into the network Save time and money Reduces the number of devices, lowering training and manageability costs Protect your infrastructure Protects the router, defending against attacks targeted directly at the network infrastructure, such as DDoS attacks Page 7 of 8

Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 526-4100 European Headquarters Cisco Systems International BV Haarlerbergpark Haarlerbergweg 13-19 1101 CH Amsterdam The Netherlands www-europe.cisco.com Tel: 31 0 20 357 1000 Fax: 31 0 20 357 1100 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA www.cisco.com Tel: 408 526-7660 Fax: 408 527-0883 Asia Pacific Headquarters Cisco Systems, Inc. 168 Robinson Road #28-01 Capital Tower Singapore 068912 www.cisco.com Tel: +65 6317 7777 Fax: +65 6317 7799 Cisco Systems has more than 200 offices in the following countries and regions. Addresses, phone numbers, and fax numbers are listed on the Cisco Web site at www.cisco.com/go/offices. Argentina Australia Austria Belgium Brazil Bulgaria Canada Chile China PRC Colombia Costa Rica Croatia Cyprus Czech Republic Denmark Dubai, UAE Finland France Germany Greece Hong Kong SAR Hungary India Indonesia Ireland Israel Italy Japan Korea Luxembourg Malaysia Mexico The Netherlands New Zealand Norway Peru Philippines Poland Portugal Puerto Rico Romania Russia Saudi Arabia Scotland Singapore Slovakia Slovenia South Africa Spain Sweden Switzerland Taiwan Thailand Turkey Ukraine United Kingdom United States Venezuela Vietnam Zimbabwe Copyright 2004 Cisco Systems, Inc. All 2004 rights Cisco reserved. Systems, CCSP, Inc. All right the reserved. Cisco Square Bridge logo, Cisco Unity, Follow Me Browsing, Important FormShare, notices, privacy and statements, StackWise and are trademarks trademarks of Cisco of Systems, Cisco Inc. Systems, can be found Inc.; on Changing cisco.com the Way We Work, Live, Play, and Learn, and iquick Study are Page service 8 of 8 marks of Cisco Systems, Inc.; and Aironet,