Miles,

  I have had the pleasure / misfortune to have used the Pix 515 Firewalls 
and there are several pro's and con's. There was some discussion on the 
Security Focus mailing lists a few months ago about Cisco Pix firewalls 
which I followed with a keen eye. After much debaiting the general 
concensus of opinion was that the only reason to buy a PIX was for 
throughput only. 

  My opinion is that the Pix is very uninfortative or forgiving 'out of 
the box'. The examples provided in the manuals or on-line did not work 
correctly because there was a config line missing ( I don't have the 
details as a collegue solved this problem while I was on a plane but it 
did take 8 days to pass one ICMP packet !!!! ) The Cisco PIX does it's job 
well but without training or experienced personell the Administrative 
burden can outweigh the cost of purchasing another product with a more 
intuitive user interface. 

  As for advice - take some quality time to read the manual and become 
comfortable with the concept of security levels and conduits. When you 
understand these new concepts (they were new for me at the time) then 
spend some quality time getting comfortable with the command syntax. 

  Lastly do not assume that because it's Cisco it will be as easy to 
configure as a router. The little quirks like the 'TAB' key do not work as 
it is a completely different kettle of fish. Treat it as a product from 
another vendor and this will help a lot in picking up the basics.

Dave Stout
Internet Security Engineer





[EMAIL PROTECTED]
14/11/01 20:34

 
        To:     [EMAIL PROTECTED]
        cc: 
        Subject:        Cisco PIX 515 Firewall


Anyone out there have some experience using the Cisco PIX firewalls for
Corporate/Production networks?  I'd like to try one of these little 
buggers
out, but I'd like to get some do's and dont's from other admins with Cisco
PIX experiences.  As I understand, these things don't just filter packets
based on addresses/ports but actually look at packet content like a proxy 
or
IDS.  Is this true?  I've also heard that it will only scan content of the
first packet when a new connection/session begins, and then it uses
keep-state tables to auto-pass the rest of the packets in the session.  I
remember the ipf package taking that approach as well and having security
problems with that because you can confuse the state table cache.  Any
comments would be helpful.

Miles Stevenson
QuickHire Network Support Specialist






#**********************************************************************
This message is intended solely for the use of the individual
or organisation to whom it is addressed. It may contain
privileged or confidential information.  If you have received
this message in error, please notify the originator immediately.
If you are not the intended recipient, you should not use,
copy, alter, or disclose the contents of this message.  All
information or opinions expressed in this message and/or
any attachments are those of the author and are not
necessarily those of Hughes Network Systems Limited,
including its European subsidiaries and affiliates. Hughes
Network Systems Limited, including its European
subsidiaries and affiliates accepts no responsibility for loss
or damage arising from its use, including damage from virus.
#**********************************************************************

Reply via email to