You know the only problem with the FrankenPIX is that the bolts on the side keep you from putting it into a standard rack...
Frank Jimenez [EMAIL PROTECTED] -----Original Message----- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] On Behalf Of Gabriel Ruiz Sent: Friday, August 09, 2002 2:36 PM To: Scott Polano; [EMAIL PROTECTED]; [EMAIL PROTECTED]; [EMAIL PROTECTED]; [EMAIL PROTECTED]; [EMAIL PROTECTED]; [EMAIL PROTECTED] Subject: Re: Cisco "Franken" Pix Firewall Making a Fraken-IDS shouldn't be something difficult either. It's an Intel PC running Solaris Intel and the Sensor Software... :-@ ----- Original Message ----- From: "Scott Polano" To: ; ; ; ; ; Sent: Friday, August 09, 2002 3:23 PM Subject: RE: Cisco "Franken" Pix Firewall > Hey, I just found out how to make a "Franken-Concentrator". Does > anyone want > the instructions ! > > -Scott > > > >From: "Joseph Ezerski" > >Reply-To: "Joseph Ezerski" > >To: "'Sabertech Networks'" , [EMAIL PROTECTED], > >"'patrick ramsey'" , [EMAIL PROTECTED], > > [EMAIL PROTECTED] > >Subject: RE: Cisco "Franken" Pix Firewall > >Date: Fri, 9 Aug 2002 12:06:02 -0700 > > > >Just the word "Franken-Pix" made me laugh. Thanks for that! > > > >-Joe > > > >-----Original Message----- > >From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf > >Of Sabertech Networks > >Sent: Friday, August 09, 2002 9:22 AM > >To: [EMAIL PROTECTED]; 'patrick ramsey'; [EMAIL PROTECTED]; > >[EMAIL PROTECTED] > >Subject: RE: Cisco "Franken" Pix Firewall > > > > > >Scott, > >Thanks for setting me straight, I forgot about the legal concept of > >"intention and design". When I buy a hamburger at McDonalds, they > >intended that I eat it, it was designed for that purpose, if use it > >as a paper weight, I'm according to you, committing a crime. > > > >That part about the prison really scared me though, I guess I'd > >better stop all this independent thinking and rejoin the herd. > > > >Party on...............Richard > > > > > >-----Original Message----- > >From: Scott Morris [mailto:[EMAIL PROTECTED]] > >Sent: Friday, August 09, 2002 9:05 AM > >To: 'Sabertech Networks'; 'patrick ramsey'; [EMAIL PROTECTED]; > >[EMAIL PROTECTED] > >Subject: RE: Cisco "Franken" Pix Firewall > > > > > >And you believe it's smart to box with Cisco's lawyers why? > > > >If you tried to sell your Franken Benz as something that "performs > >exactly like a Mercedes Benz and runs the same software and commands > >and everything else but the outer shell", then I'd be willing to bet > >Mercedes would kick you around the courtroom too. > > > >Intel's NICs are a commodity designed to go with computers of any > >variety. PIX Flash cards are not. PIX Flash cards are designed to > >go in Cisco's PIX boxes. Period. No grey area. > > > >Knock yourself out, study how you will and quit arguing about the > >stupid point. Sell your franken-pix as such if you want, and write > >me from your prison's AOL account telling me that I was right. :) > > > >Get back to studying useful things. > > > >-----Original Message----- > >From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] On Behalf > >Of Sabertech Networks > >Sent: Friday, August 09, 2002 11:45 AM > >To: patrick ramsey; [EMAIL PROTECTED]; [EMAIL PROTECTED] > >Subject: RE: Cisco "Franken" Pix Firewall > > > > > >In spite of all the urban legends to the contrary, there is no law > >against buying a computer, buying a card, putting the card in the > >computer and selling it. You own both parts, do whatever you want, > >it's a free country. > > > >Last week I bought a Pentium 3 machine, added an Intel > >NIC and I will sell it next week. I'm serious, so > >now is the time to report this crime to Intel. > > > >The herd will say it's illegal and make lots of scary references to > >past legal action by Cisco in such cases, but NO ONE AS EVER PROVED > >that it has happened. > > > >Ghost stories. > > > >First off, a 501 costs $400 and will teach you everything except DMZ > >interfaces and Fail Over, each subject can be mastered in about five > >minutes. > > > >Secondly, a Franken Pix has no commercial value, I really don't think > >that I'm going to give my customers the choice of securing their > >networks with a cool "Franken PIX" that I assembled with various junk > >parts. That's silly. > > > >Here's a good analogy, say I start buying old junk cars, then I pay > >$20,000 each for factory built Mercedes Benz engines, I put them in > >my junk cars and sell them. Is Mercedes Benz going to worry about my > >"Franken Benz"? > > > >Party on........................Richard > > > > > > > > > > > >-----Original Message----- > >From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf > >Of patrick ramsey > >Sent: Friday, August 09, 2002 6:19 AM > >To: [EMAIL PROTECTED]; [EMAIL PROTECTED] > >Subject: OT: Cisco "Franken" Pix Firewall > > > > > >Hopefully someone in this group can help me answer it. > > > >I purchased a couple of ISA Pix Flash card on the Internet last year > >to build > > > >a couple of "clone" pix firewalls so that I can get "hand-on" > >experience with > > > >the platforms. I built two pix firewalls out of two Dell PII 233MHz > >box and > > > >they work great just like a regular Pix 520. Twelve months later, I > >have to say > > > >I've become an expert with Pix firewalls that I otherwise would not > >have been > > > >able to achieve had it not been for these two Pix clones. These two > >"clone" > > > >pix firewalls are running version 6.2(2) with PDM 2.0(2). > > > >Here is my question. I am pretty sure that it is illegal for me to > >sell these > > > >"clone" pix firewall (please confirm); however, can I sell just the > >Pix Flash card > > > >without the dell machine? > > > >Personally, I think this could be a great resource for > > > >someone who would like to learn Pix firewall. I just don't think the > >Pix 501 and 506 > > > >is adequate for someone to learn everything there is to learn about > >Pix because > > > >two interfaces are just not enough. You need to have "at least" > >three interfaces so > > > >that you can mimic a real production environment and frankly these > >"clone" pix520 > > > >firewall can provide up to six interfaces which work just great. I > >don't care what > > > >anybody say, after playing these clones for the past 12 months, 7 > >days a week, I > > > >can definitely say with confidence that you can learn a hell lot more > >with more than > > > >just "inside" and "outside" interfaces. > > > > > > > > > > > >--------------------------------- > >Do You Yahoo!? > >HotJobs, a Yahoo! service - Search Thousands of New Jobs > >__________________________________________________________________ > >To unsubscribe from the SECURITY list, send a message to > >[EMAIL PROTECTED] with the body containing: unsubscribe > >SECURITY > >__________________________________________________________________ > >To unsubscribe from the SECURITY list, send a message to > >[EMAIL PROTECTED] with the body containing: unsubscribe SECURITY > >__________________________________________________________________ > >To unsubscribe from the SECURITY list, send a message to > >[EMAIL PROTECTED] with the body containing: > >unsubscribe SECURITY > >__________________________________________________________________ > >To unsubscribe from the SECURITY list, send a message to > >[EMAIL PROTECTED] with the body containing: > >unsubscribe SECURITY > > > > > -Scott > > > _________________________________________________________________ > Send and receive Hotmail on your mobile device: http://mobile.msn.com > __________________________________________________________________ > To unsubscribe from the SECURITY list, send a message to > [EMAIL PROTECTED] with the body containing: unsubscribe > SECURITY __________________________________________________________________ To unsubscribe from the SECURITY list, send a message to [EMAIL PROTECTED] with the body containing: unsubscribe SECURITY Message Posted at: http://www.groupstudy.com/form/read.php?f=7&i=51119&t=51119 -------------------------------------------------- FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

