Dan Simoes <[EMAIL PROTECTED]> wrote:
> - - Can you open ipsec tunnels to Checkpoint boxes?  Many of our clients
> use Checkpoint and management is worried about being incompatible for
> extranet purposes (hence they want me to buy Checkpoint)

This is one drawback to the PIX, You'll need to telnet or use a modem
attached to the console port for access.  They're is no encryption
option though IPsec is promised in the next release.

You can always install the PIX VPN option, which requires a hardware
card on both sides of the link.

> - - Why did you personally choose Pix over Checkpoint if you looked at
> both?

I have recommended FW-1 many times since '95 however PIX has recently
become the better choice (IMHO) for a number of reasons:

* logging

  Checkpoint has been promising syslog support and plaintext logging
  for 3 versions now but has not delivered.  The Checkpoint log GUI is
  cumberson at best.  Shops that read their syslogs will get a lot more
  information from a PIX.

* licensing

  This has always been a problem but seems to have become worse in the
  last few years.  Checkpoint keeps their license database on a
  computer in Israel.  When you buy the product your vendor needs to
  notify their supplier regarding the purchase.  The supplier then
  notifies Checkpoint who then updates their database and website.
  Only then can you go to Checkpoint's web page and get the perm
  license keys.  This process can take several weeks.  I've seen it
  take 2 months.  The Checkpoint license computer is often down or your
  vendor or VAR may lose your paperwork.  If you change external IP
  addresses or hostids you'll need to go through this process all over.
  It can be a _big_ headache.

  Figuring out which FW-1 license options you need can be another
  exercise in frustration.  Even pre-sales tech support often gets it
  wrong.  There are something like 2 dozen license options none of
  which are well defined.  One example is the motif option.  It's
  supposed to be free, and it's supposedly required to run under X11,
  but it's often not included in the base license keys.  There's an
  (unlinked/undocumented) web page, separate from the regular license
  page to get the motif license key.

  The PIX comes licensed out of the box for any IP addresses.  You
  need telnet to configure it.

* tech support

  Cisco tech support is free for 90 days and relatively cheap
  thereafter.  Their support desk is staffed with excellent engineers.
  I rarely need to escalate questions to 2nd line (senior) engineers.

  FW-1 has no free tech support.  You're supposed to rely on your
  vendor for front-line tech support.  Checkpoint's own front-line
  support is not as well trained as they should be.  You'll often need
  to escalate.  What tech support Checkpoint does offer is expensive.

* documentation

  PIX ships with excellent documentation.  Cisco's website also has
  great documentation.

  FW-1 has never been well documented and no longer ships with any
  documentation whatsoever.  Checkpoint's website is rarely useful.

  One example:  If you assign a FW-1 password with more than 8
  characters it will fail every time.  This is not documented and
  front-line tech support won't know why it fails either.  2nd line
  tech support may or may not recognize this bug.  You can imagine
  the headaches these sorts of bugs can create.

* pricing

  FW-1 would appear to cost less up front but once you add the cost
  of support, a remote GUI client, and annual updates it's actually
  considerable more expensive than a PIX over time.

* setup

  If your admins aren't IOS literate they may be uncomfortable with the
  PIX command line interface.  The FW-1 GUI is far and away superior to
  anything else on the market.  Why other firewall vendors haven't
  cloned the FW-1 interface I don't know.

  That said the problem with FW-1 is that you have to use the GUI to do
  anything.

  The FW-1 initial configuration is often problematic if you're not
  using a (pre-installed but not pre-licensed) Nokia and not possible
  from behind a remote NAT gateway.

  If you use ssh to a remote FW-1 unix host it will be denied by
  default even if you select "allow all" as the initial rule.  This is
  because ssh is not defined as a protocol.  You have to first add ssh
  to the list of protocols before it can be allowed.

  Under NT FW-1 (V3 at least) NAT doesn't arp correctly.  It fails to
  read the $WINNTDIR\FW\STATE and you have to write a (startup) batch
  file to load the arp table manually.

  FW-1 fwui may not work under Solaris.  You may need to use fwpolicy,
  which is a separate package.  The remote GUI client works fine under
  Unix or NT once the initial setup is complete.

  The PIX has an advantage in that rip and snmp are not allowed in
  "pre-applied" rules. 

For these reasons I've become a PIX fan and usually recommend it over FW-1.

--
Roger Marquis
Roble Systems Consulting
http://www.roble.com/

-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to