Pardon me
In release 5 of the PIX software, you got IPSec VPN compability and dont
need any hardware card at any end. Version 5 was released like a week ago
or something.

The IPSec compability is very good. PIX workes as a branch office
connection to a lot of other (IPSec) VPN boxes. And the client can be used
to connect to other IPSec VPN boxes.

IMHO the PIX beats FW-1 in remote admin to. You can use the VPN client,
tunnel in to the box, telnet to the box and start doing you stuff. FW-1
needs a third party program like PCAnywhere (or something familiar) to get
tunneled, encrypted comunication.

BUT, If you are interested in high end solutions, take a look att RADGuard
( for VPN ) and Gauntlet ( for FW ).

Lars Kronf�lt

( remember, it's my opinion, not to be confused with that of my company )

On Tue, 12 Oct 1999, Roger Marquis wrote:

> Dan Simoes <[EMAIL PROTECTED]> wrote:
> > - - Can you open ipsec tunnels to Checkpoint boxes?  Many of our clients
> > use Checkpoint and management is worried about being incompatible for
> > extranet purposes (hence they want me to buy Checkpoint)
> 
> This is one drawback to the PIX, You'll need to telnet or use a modem
> attached to the console port for access.  They're is no encryption
> option though IPsec is promised in the next release.
> 
> You can always install the PIX VPN option, which requires a hardware
> card on both sides of the link.
> 
> > - - Why did you personally choose Pix over Checkpoint if you looked at
> > both?
> 
> I have recommended FW-1 many times since '95 however PIX has recently
> become the better choice (IMHO) for a number of reasons:
> 
> * logging
> 
>   Checkpoint has been promising syslog support and plaintext logging
>   for 3 versions now but has not delivered.  The Checkpoint log GUI is
>   cumberson at best.  Shops that read their syslogs will get a lot more
>   information from a PIX.
> 
> * licensing
> 
>   This has always been a problem but seems to have become worse in the
>   last few years.  Checkpoint keeps their license database on a
>   computer in Israel.  When you buy the product your vendor needs to
>   notify their supplier regarding the purchase.  The supplier then
>   notifies Checkpoint who then updates their database and website.
>   Only then can you go to Checkpoint's web page and get the perm
>   license keys.  This process can take several weeks.  I've seen it
>   take 2 months.  The Checkpoint license computer is often down or your
>   vendor or VAR may lose your paperwork.  If you change external IP
>   addresses or hostids you'll need to go through this process all over.
>   It can be a _big_ headache.
> 
>   Figuring out which FW-1 license options you need can be another
>   exercise in frustration.  Even pre-sales tech support often gets it
>   wrong.  There are something like 2 dozen license options none of
>   which are well defined.  One example is the motif option.  It's
>   supposed to be free, and it's supposedly required to run under X11,
>   but it's often not included in the base license keys.  There's an
>   (unlinked/undocumented) web page, separate from the regular license
>   page to get the motif license key.
> 
>   The PIX comes licensed out of the box for any IP addresses.  You
>   need telnet to configure it.
> 
> * tech support
> 
>   Cisco tech support is free for 90 days and relatively cheap
>   thereafter.  Their support desk is staffed with excellent engineers.
>   I rarely need to escalate questions to 2nd line (senior) engineers.
> 
>   FW-1 has no free tech support.  You're supposed to rely on your
>   vendor for front-line tech support.  Checkpoint's own front-line
>   support is not as well trained as they should be.  You'll often need
>   to escalate.  What tech support Checkpoint does offer is expensive.
> 
> * documentation
> 
>   PIX ships with excellent documentation.  Cisco's website also has
>   great documentation.
> 
>   FW-1 has never been well documented and no longer ships with any
>   documentation whatsoever.  Checkpoint's website is rarely useful.
> 
>   One example:  If you assign a FW-1 password with more than 8
>   characters it will fail every time.  This is not documented and
>   front-line tech support won't know why it fails either.  2nd line
>   tech support may or may not recognize this bug.  You can imagine
>   the headaches these sorts of bugs can create.
> 
> * pricing
> 
>   FW-1 would appear to cost less up front but once you add the cost
>   of support, a remote GUI client, and annual updates it's actually
>   considerable more expensive than a PIX over time.
> 
> * setup
> 
>   If your admins aren't IOS literate they may be uncomfortable with the
>   PIX command line interface.  The FW-1 GUI is far and away superior to
>   anything else on the market.  Why other firewall vendors haven't
>   cloned the FW-1 interface I don't know.
> 
>   That said the problem with FW-1 is that you have to use the GUI to do
>   anything.
> 
>   The FW-1 initial configuration is often problematic if you're not
>   using a (pre-installed but not pre-licensed) Nokia and not possible
>   from behind a remote NAT gateway.
> 
>   If you use ssh to a remote FW-1 unix host it will be denied by
>   default even if you select "allow all" as the initial rule.  This is
>   because ssh is not defined as a protocol.  You have to first add ssh
>   to the list of protocols before it can be allowed.
> 
>   Under NT FW-1 (V3 at least) NAT doesn't arp correctly.  It fails to
>   read the $WINNTDIR\FW\STATE and you have to write a (startup) batch
>   file to load the arp table manually.
> 
>   FW-1 fwui may not work under Solaris.  You may need to use fwpolicy,
>   which is a separate package.  The remote GUI client works fine under
>   Unix or NT once the initial setup is complete.
> 
>   The PIX has an advantage in that rip and snmp are not allowed in
>   "pre-applied" rules. 
> 
> For these reasons I've become a PIX fan and usually recommend it over FW-1.
> 
> --
> Roger Marquis
> Roble Systems Consulting
> http://www.roble.com/
> 
> -
> [To unsubscribe, send mail to [EMAIL PROTECTED] with
> "unsubscribe firewalls" in the body of the message.]
> 

-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to