Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

Can I install an AIP-SSM-20 Module in a ASA5510?

Posted on 2012-04-04
4
Medium Priority
?
607 Views
Last Modified: 2012-04-06
I am curious if I can use a AIP-SSM-20 Module in a ASA5510?  I can't really find any documentation from Cisco Stating this.  Any help would be greatly appreciated.  Thanks.
0
Comment
Question by:denver218
  • 2
  • 2
4 Comments
 
LVL 25

Accepted Solution

by:
Ken Boone earned 2000 total points
ID: 37808339
Yes the 5510 can use the SSM-10 or the SSM-20 module.
0
 
LVL 4

Author Comment

by:denver218
ID: 37808368
Can you please provide documentation stating this.  Thanks.
0
 
LVL 25

Expert Comment

by:Ken Boone
ID: 37808435
Well here is a quick link:
http://www.cisco.com/en/US/prod/collateral/vpndevc/ps6032/ps6094/ps6120/ps6825/product_data_sheet0900aecd80404916_ps6120_Products_Data_Sheet.html

If you scroll down you will see that there are 3 different ASA 5510 bundles that they offer with the module built in.  The first two have the ssm-10 and the last has the ssm-20 bundled with the 5510.
0
 
LVL 4

Author Closing Comment

by:denver218
ID: 37815880
Thanks
0

Featured Post

Managing Security & Risk at the Speed of Business

Gartner Research VP, Neil McDonald & AlgoSec CTO, Prof. Avishai Wool, discuss the business-driven approach to automated security policy management, its benefits and how to align security policy management with business processes to address today's security challenges.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Considering today’s continual security threats, which affect Information technology networks and systems worldwide, it is very important to practice basic security awareness. A normal system user can secure himself or herself by following these simp…
Phishing emails are a popular malware delivery vehicle for attack.  While there are many ways for an attacker to increase the chances of success for their phishing emails, one of the most effective methods involves spoofing the message to appear to …
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
In a question here at Experts Exchange (https://www.experts-exchange.com/questions/29062564/Adobe-acrobat-reader-DC.html), a member asked how to create a signature in Adobe Acrobat Reader DC (the free Reader product, not the paid, full Acrobat produ…

571 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question