RE: Performance Comparision between Linux OS Firewall and Cisco PIX 525

2001-03-26 Thread Rik Guyler

But that just proves my point - you *can't* setup DNS server on a PIX, so it
becomes a non-issue with a PIX.  Besides, I think everybody I know has done
something that they know not to be the best thing but do it because it is a
quick and easy solution.

Don't get me wrong - I like Linux.  The real problem I see with network
security is not so much technology, but with human nature.  The PIX by
design removes many of the holes that human nature can drag us into.  A
simple case of less is more.

Rik

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]
Sent: Saturday, March 24, 2001 11:02 PM
To: [EMAIL PROTECTED]; Rik
Subject: Re: Performance Comparision between Linux OS Firewall and Cisco
PIX 525


While I agree that for an enterprise I would choose PIX over Linux 
for firewall purposes, if your friends configured a Linux firewall and 
ran other services on it, they may be good Linux admins but they 
don't know much about security. 

There is _no_ good reason to run unnecessary services on a 
firewall. Period.  Wintel hardware is too inexpensive to use any 
argument that a box serving as a firewall needs to run DNS, FTP, 
SMTP, etc.

The only service other than ipchains that a Linux firewall should run 
is SSH.  This gives you all the remote administration of the box 
you need and makes the box very secure.  

-Kent


On 23 Mar 2001, at 9:24, Rik wrote:

 I have seen way too many Linux firewalls hacked as a result of
 mis-administration.  Now, I'm not assuming anything about your
 abilities as the last confirmed hack that I was notified about was a
 Linux FW setup by 2 guys that I know to be excellent Linux admins. 
 The problem is the inherent nature of the beast.  A PIX is totally
 secure right out of the box.  The last Linux hack I speak of was
 hacked based on an exploit within BIND and had nothing to do with the
 FW policy.
 
 I also find the PIX to be MUCH easier to configure and setup.  I can
 do in only a few lines of code what could possibly take pages and
 pages of code in Linux.  When talking about firewalls, simplicity is a
 critically important concern.  One compromise could easily remove any
 upfront cost advantage Linux has over Cisco.  Also, you don't have to
 be concerned with shutting down unused services on a PIX as you would
 on Linux.
 
 Go with the PIX.  It was designed from the ground up to do just what
 it does: protect your network.  Cisco claims that a properly
 configured PIX has never been compromised.  I believe them.
 
 Rik
 
 
 ""Sean Young"" [EMAIL PROTECTED] wrote in message
 [EMAIL PROTECTED]">news:[EMAIL PROTECTED]...
  Hi Everyone,
 
  My company is putting me in charge in implementing a Firewall for
  our company.  One guy in my networking group is recommending PIX
  Firewall. Furthermore, he also recommends a Cisco Web-caching
  engine.  His reason is that not only Cisco is good Firewall but it
  also provides VPN connectivity to our remote sites.  Myself, on the
  other hand, would like to implement Linux-based OS firewall along
  with FreeS/WAN VPN features set.  My reason is that a linux firewall
  can provide everything a Cisco PIX does and even more.  In term of
  hardware, the linux Firewall/ VPN/IPSec box will be running a
  dual-processor (800MHz) with 1GB of RAM. I just feel that I can get
  a lot more for the amount that we are going to spend with linux than
  with Cisco PIX.  I also feel that I tweak the source code on the
  LINUX kernel to increase the performance and security. Also, instead
  of purchasing the Cisco web-caching engine, I am thinking of
  building another linux box that will be running squid (web-caching)
  server.  Don't get me wrong, I think Cisco has a lot of good
  products in the area of routing; however, I just don't think it is
  necessary to throw away money at Cisco when I know that Linux or BSD
  can do the same job that PIX and Cisco web-caching engine do but for
  much less and also I can control the source code.  Has anyone has
  experiences with both the Linux/BSD, Squid and Cisco PIX, Cisco
  web-caching engine so that you can give advice on what I should do. 
  I am open to your suggestions.
 
  Many thanks.
  Sean
  _
  Get your FREE download of MSN Explorer at http://explorer.msn.com
 
  _
  FAQ, list archives, and subscription info:
 http://www.groupstudy.com/list/cisco.html
  Report misconduct and Nondisclosure violations to
  [EMAIL PROTECTED]
 
 
 
 _
 FAQ, list archives, and subscription info:
 http://www.groupstudy.com/list/cisco.html Report misconduct and
 Nondisclosure violations to [EMAIL PROTECTED]




This mail was processed by Mail essentials for Exchange/SMTP, 
the email security  management gateway. Mail essentials adds 
content checking, email encryption, anti spam, anti virus, 
attachment compression, personalised auto res

Re: Performance Comparision between Linux OS Firewall and Cisco PIX 525

2001-03-26 Thread Allen May

Is the outside interface still open to SSH connections?  If so  it's
compromised, Linux is a full blown operating system that, when compromised,
can have ANY program designed for Linux installed.  Can you imagine
something like a packet analyzer grabbing all your passwords and sending
them out over the net to someone else?  Ewww.  That's my #1 reason for going
with something like a PIX.  Just make sure you're IDS is set to notify even
in the event of a SUCCESSFUL connection.  I've seen people who set it up for
unsuccessful attempts only.

I hope that guy wasn't fired BECAUSE he recommended the Cisco solution.
That's totally a matter of point of view on that decision  his wasn't
wrong..neither was the Linux choice.  Some situations call for one while
others call for the other.

Oh and keep a copy of the correctly configured drive with all settings on
hand.  A hard drive is much more prone to failure than RAM/ROM just due to
the moving parts involved.

Allen
- Original Message -
From: "Sean Young" [EMAIL PROTECTED]
To: [EMAIL PROTECTED]; [EMAIL PROTECTED];
[EMAIL PROTECTED]
Sent: Sunday, March 25, 2001 3:05 PM
Subject: Re: Performance Comparision between Linux OS Firewall and Cisco PIX
525


 Ken,
 Thank you very much for the advice.  This past Friday, my company has
 decided to use Linux as our company Firewall.  Furthermore, we've decided
 that this Firewall will be running kernel 2.4.2 with only two services
 running on it, SSH and netfilter (aka iptables).  I've tested kernel
 2.4.2 in the lab and notice it performs better than kernel 2.2.x.  I've
also
 performed various intrusion detection tests on the box using
 Cisco NetSonar, Cybercop, ISS, Axent Netrecon but is unable to break
 it.  The linux box is rock-solid.  I am also running portsentry (IDS)
 on the Firewall itself.

 Also, we decide to running our squid proxy server on another linux box
 to provide transparent caching for our internal users.  As far as VPN is
 concerns, we are going to implement FreeS/WAN on another box.  I think
 in the long run, it is going to save the company a lot of money.  We
 end up not buying the PIX and web-caching engine from Cisco.  Oh, the
 networking guy in our group who recommends Cisco PIX and Cisco web-
 caching engine as a solution, he has been fired.  Go figure.

 Regards,
 Sean
 P.S.  Priscilla, why not implementing TRANSPARENT caching by using squid
 to speed up internet connection for your users?  Squid is free and very
 secure and easy to use.

 From: [EMAIL PROTECTED]
 Reply-To: [EMAIL PROTECTED]
 To: [EMAIL PROTECTED], "Stuart Brockwell" [EMAIL PROTECTED]
 Subject: Re: Performance Comparision between Linux OS Firewall and Cisco
 PIX 525
 Date: Sat, 24 Mar 2001 20:02:26 -0800
 
 Sean,
 
 Comments imbedded:
 
 On 23 Mar 2001, at 16:12, Stuart Brockwell wrote:
 
   Hi Sean,
 I am a Linux head my self, and one of our firewalls is in fact
 running
   on a Linux box.  The only problem with this type of firewall is that
   you inherit all of the known bugs that the software has.  Given that
   the source code to Linux is widely available, you have a lot of very
   talented people out there who know these holes and are able to exploit
   them very easily.
 
 It also means that there are a lot of talented people who are looking
 at the code to make sure that any holes are patched.  In fact, when
 new exploits are found, Linux is usually the fastest platform to have
 a patch available.  Compare this to having to wait weeks for vendor
 patches or having to prove to a vendor that a problem exists.
 
 Also, a service can only be exploited if it is running.  A properly
 configured firewall doesn't run unecessary services, this makes it
 very difficult to exploit.  Essentially, it would come down to trying to
 DoS it or running a password guessing program against it to get
 remote access.
 
 
 If you
   maintain your own Linux firewall, you will need to continuously look
   for the latest bug fixes to install on your Linux box to address the
   latest round of holes that have been released.
 
 If the Linux firewall is properly setup, the only services running on it
 are ipchains and SSH.  This means that you have to be aware of 2
 services.  While there could always be a local exploit, if only
 trusted admins have access, the trouble with keeping up patches
 is minimal.  It is certainly no more trouble than keeping up with
 bugs on a vendor platform.
 
  
   Cisco and companies such as Watch Guard closely guard their source
   code, often you can elect to take on a maintenance contract with the
   firewall where you recieve all the latest fixes for a 12 month period
   (this is what we did).  As this is their bread and butter, they spend
   a lot of time looking for holes and fixes to known bugs.
  
 
 While true, this doesn't mean that their code will have fewer bugs
 or that the bugs will be patched quicker.  There is a very large
 support community for Linux th

Re: Performance Comparision between Linux OS Firewall and Cisco PIX 525

2001-03-26 Thread Sean Young

Allen,
If SSH service is not open on the outside interface, how do you expect
to troubleshoot the problem when there is problem with the Firewall?
Tell me this, how can you troubleshoot a PIX remotely when there is
problem? My employer is certainly not going to fly me out-of-state to fix a 
minor problem.  Furthermore, can you absolutely guarantee me, in writing, 
that the Cisco PIX
can never be compromised?  Another thing, what makes you think that I am
also running other services besides Firewall features on Linux.  If you
read my email carefully, you also notice that I only SSH and netfilter
(aka iptables) on the Firewall.  Your reason is based purely on FUD
(Fear, Uncertainty and Doubt).

Sean


From: "Allen May" [EMAIL PROTECTED]
To: "Sean Young" [EMAIL PROTECTED], [EMAIL PROTECTED], 
[EMAIL PROTECTED], [EMAIL PROTECTED]
Subject: Re: Performance Comparision between Linux OS Firewall and Cisco 
PIX 525
Date: Mon, 26 Mar 2001 14:29:34 -0600

Is the outside interface still open to SSH connections?  If so  it's
compromised, Linux is a full blown operating system that, when compromised,
can have ANY program designed for Linux installed.  Can you imagine
something like a packet analyzer grabbing all your passwords and sending
them out over the net to someone else?  Ewww.  That's my #1 reason for 
going
with something like a PIX.  Just make sure you're IDS is set to notify even
in the event of a SUCCESSFUL connection.  I've seen people who set it up 
for
unsuccessful attempts only.

I hope that guy wasn't fired BECAUSE he recommended the Cisco solution.
That's totally a matter of point of view on that decision  his wasn't
wrong..neither was the Linux choice.  Some situations call for one while
others call for the other.

Oh and keep a copy of the correctly configured drive with all settings on
hand.  A hard drive is much more prone to failure than RAM/ROM just due to
the moving parts involved.

Allen
- Original Message -
From: "Sean Young" [EMAIL PROTECTED]
To: [EMAIL PROTECTED]; [EMAIL PROTECTED];
[EMAIL PROTECTED]
Sent: Sunday, March 25, 2001 3:05 PM
Subject: Re: Performance Comparision between Linux OS Firewall and Cisco 
PIX
525


  Ken,
  Thank you very much for the advice.  This past Friday, my company has
  decided to use Linux as our company Firewall.  Furthermore, we've 
decided
  that this Firewall will be running kernel 2.4.2 with only two services
  running on it, SSH and netfilter (aka iptables).  I've tested kernel
  2.4.2 in the lab and notice it performs better than kernel 2.2.x.  I've
also
  performed various intrusion detection tests on the box using
  Cisco NetSonar, Cybercop, ISS, Axent Netrecon but is unable to break
  it.  The linux box is rock-solid.  I am also running portsentry (IDS)
  on the Firewall itself.
 
  Also, we decide to running our squid proxy server on another linux box
  to provide transparent caching for our internal users.  As far as VPN is
  concerns, we are going to implement FreeS/WAN on another box.  I think
  in the long run, it is going to save the company a lot of money.  We
  end up not buying the PIX and web-caching engine from Cisco.  Oh, the
  networking guy in our group who recommends Cisco PIX and Cisco web-
  caching engine as a solution, he has been fired.  Go figure.
 
  Regards,
  Sean
  P.S.  Priscilla, why not implementing TRANSPARENT caching by using squid
  to speed up internet connection for your users?  Squid is free and very
  secure and easy to use.
 
  From: [EMAIL PROTECTED]
  Reply-To: [EMAIL PROTECTED]
  To: [EMAIL PROTECTED], "Stuart Brockwell" 
[EMAIL PROTECTED]
  Subject: Re: Performance Comparision between Linux OS Firewall and 
Cisco
  PIX 525
  Date: Sat, 24 Mar 2001 20:02:26 -0800
  
  Sean,
  
  Comments imbedded:
  
  On 23 Mar 2001, at 16:12, Stuart Brockwell wrote:
  
Hi Sean,
  I am a Linux head my self, and one of our firewalls is in fact
  running
on a Linux box.  The only problem with this type of firewall is that
you inherit all of the known bugs that the software has.  Given that
the source code to Linux is widely available, you have a lot of very
talented people out there who know these holes and are able to 
exploit
them very easily.
  
  It also means that there are a lot of talented people who are looking
  at the code to make sure that any holes are patched.  In fact, when
  new exploits are found, Linux is usually the fastest platform to have
  a patch available.  Compare this to having to wait weeks for vendor
  patches or having to prove to a vendor that a problem exists.
  
  Also, a service can only be exploited if it is running.  A properly
  configured firewall doesn't run unecessary services, this makes it
  very difficult to exploit.  Essentially, it would come down to trying 
to
  DoS it or running a password guessing program against it to get
  remote access.
  
  
  If you
maintain your own Linux fire

Re: Performance Comparision between Linux OS Firewall and Cisco PIX 525

2001-03-26 Thread Allen May

Sigh...inline comments:

- Original Message -
From: "Sean Young" [EMAIL PROTECTED]
To: [EMAIL PROTECTED]; [EMAIL PROTECTED]; [EMAIL PROTECTED];
[EMAIL PROTECTED]
Sent: Monday, March 26, 2001 2:42 PM
Subject: Re: Performance Comparision between Linux OS Firewall and Cisco PIX
525


 Allen,
 If SSH service is not open on the outside interface, how do you expect
 to troubleshoot the problem when there is problem with the Firewall?
VPN, dial-up modem, terminal server, ACLs, etc.  If they find your password
or someone knows it  get in, does IDS tell you?

 Tell me this, how can you troubleshoot a PIX remotely when there is
 problem? My employer is certainly not going to fly me out-of-state to fix
a
 minor problem.
See above answer.

Furthermore, can you absolutely guarantee me, in writing,
 that the Cisco PIX
 can never be compromised?
No guarantee but it's claimed to have never been compromised unless the
attacker had inside access (physical, vpn, etc) and knew the password and
the user was careless enough to not implement ACL.  On the other hand, read
up on security on Linux for yourself.  Redhat was the #1 hacked operating
system (even surpassed Windows last I read).

Another thing, what makes you think that I am
 also running other services besides Firewall features on Linux.  If you
 read my email carefully, you also notice that I only SSH and netfilter
 (aka iptables) on the Firewall.
I read that part.  Thats why I said root or sudo access allows a user to
install other services.  A Cisco IOS does not.  It's easy to add a new
service if you have access to do it.  You can even install via ftp.

Your reason is based purely on FUD
 (Fear, Uncertainty and Doubt).
It's based on 12 years experience and working as security administrator at
an ISP where we've had many DSL users complain about their Linux boxes being
hacked.  Some find out they've been hacked after someone on the internet had
reports of porn sites running on their compromised system.  Users who
purchased a PIX and allowed us to manage it have not been hacked even one
time so far.

I ain't skeered ;)  I was trying to let you know the vulnerabilities you
might have and allow you to take precautions.  If you're going to be that
way about it, you can learn on your own the hard way when you have to fly
out there to fix a compromised system or failed hard drive.  From your reply
you either didn't read my reply carefully or didn't even understand it.


 Sean


 From: "Allen May" [EMAIL PROTECTED]
 To: "Sean Young" [EMAIL PROTECTED], [EMAIL PROTECTED],
 [EMAIL PROTECTED], [EMAIL PROTECTED]
 Subject: Re: Performance Comparision between Linux OS Firewall and Cisco
 PIX 525
 Date: Mon, 26 Mar 2001 14:29:34 -0600
 
 Is the outside interface still open to SSH connections?  If so  it's
 compromised, Linux is a full blown operating system that, when
compromised,
 can have ANY program designed for Linux installed.  Can you imagine
 something like a packet analyzer grabbing all your passwords and sending
 them out over the net to someone else?  Ewww.  That's my #1 reason for
 going
 with something like a PIX.  Just make sure you're IDS is set to notify
even
 in the event of a SUCCESSFUL connection.  I've seen people who set it up
 for
 unsuccessful attempts only.
 
 I hope that guy wasn't fired BECAUSE he recommended the Cisco solution.
 That's totally a matter of point of view on that decision  his wasn't
 wrong..neither was the Linux choice.  Some situations call for one while
 others call for the other.
 
 Oh and keep a copy of the correctly configured drive with all settings on
 hand.  A hard drive is much more prone to failure than RAM/ROM just due
to
 the moving parts involved.
 
 Allen
 - Original Message -
 From: "Sean Young" [EMAIL PROTECTED]
 To: [EMAIL PROTECTED]; [EMAIL PROTECTED];
 [EMAIL PROTECTED]
 Sent: Sunday, March 25, 2001 3:05 PM
 Subject: Re: Performance Comparision between Linux OS Firewall and Cisco
 PIX
 525
 
 
   Ken,
   Thank you very much for the advice.  This past Friday, my company has
   decided to use Linux as our company Firewall.  Furthermore, we've
 decided
   that this Firewall will be running kernel 2.4.2 with only two services
   running on it, SSH and netfilter (aka iptables).  I've tested kernel
   2.4.2 in the lab and notice it performs better than kernel 2.2.x.
I've
 also
   performed various intrusion detection tests on the box using
   Cisco NetSonar, Cybercop, ISS, Axent Netrecon but is unable to break
   it.  The linux box is rock-solid.  I am also running portsentry (IDS)
   on the Firewall itself.
  
   Also, we decide to running our squid proxy server on another linux box
   to provide transparent caching for our internal users.  As far as VPN
is
   concerns, we are going to implement FreeS/WAN on another box.  I think
   in the long run, it is going to save the company a lot of money.  We
   end up not buying the PIX and web-caching engine from Cisco.

Re: Performance Comparision between Linux OS Firewall and Cisco PIX 525

2001-03-26 Thread Allen May

One more thing I forgot to mention.  If compromised ( it has to be from
inside because outside interface cannot be used to connect), all they can do
to a PIX is mess up your config or add some lines.  However, with TACACS+ 
AAA authentication you can even limit what commands they can execute.  If
the config is messed up, just dial in and copy the config from the tftp
server again.


- Original Message -
From: "Sean Young" [EMAIL PROTECTED]
To: [EMAIL PROTECTED]; [EMAIL PROTECTED]; [EMAIL PROTECTED];
[EMAIL PROTECTED]
Sent: Monday, March 26, 2001 2:42 PM
Subject: Re: Performance Comparision between Linux OS Firewall and Cisco PIX
525


 Allen,
 If SSH service is not open on the outside interface, how do you expect
 to troubleshoot the problem when there is problem with the Firewall?
 Tell me this, how can you troubleshoot a PIX remotely when there is
 problem? My employer is certainly not going to fly me out-of-state to fix
a
 minor problem.  Furthermore, can you absolutely guarantee me, in writing,
 that the Cisco PIX
 can never be compromised?  Another thing, what makes you think that I am
 also running other services besides Firewall features on Linux.  If you
 read my email carefully, you also notice that I only SSH and netfilter
 (aka iptables) on the Firewall.  Your reason is based purely on FUD
 (Fear, Uncertainty and Doubt).

 Sean


 From: "Allen May" [EMAIL PROTECTED]
 To: "Sean Young" [EMAIL PROTECTED], [EMAIL PROTECTED],
 [EMAIL PROTECTED], [EMAIL PROTECTED]
 Subject: Re: Performance Comparision between Linux OS Firewall and Cisco
 PIX 525
 Date: Mon, 26 Mar 2001 14:29:34 -0600
 
 Is the outside interface still open to SSH connections?  If so  it's
 compromised, Linux is a full blown operating system that, when
compromised,
 can have ANY program designed for Linux installed.  Can you imagine
 something like a packet analyzer grabbing all your passwords and sending
 them out over the net to someone else?  Ewww.  That's my #1 reason for
 going
 with something like a PIX.  Just make sure you're IDS is set to notify
even
 in the event of a SUCCESSFUL connection.  I've seen people who set it up
 for
 unsuccessful attempts only.
 
 I hope that guy wasn't fired BECAUSE he recommended the Cisco solution.
 That's totally a matter of point of view on that decision  his wasn't
 wrong..neither was the Linux choice.  Some situations call for one while
 others call for the other.
 
 Oh and keep a copy of the correctly configured drive with all settings on
 hand.  A hard drive is much more prone to failure than RAM/ROM just due
to
 the moving parts involved.
 
 Allen
 - Original Message -
 From: "Sean Young" [EMAIL PROTECTED]
 To: [EMAIL PROTECTED]; [EMAIL PROTECTED];
 [EMAIL PROTECTED]
 Sent: Sunday, March 25, 2001 3:05 PM
 Subject: Re: Performance Comparision between Linux OS Firewall and Cisco
 PIX
 525
 
 
   Ken,
   Thank you very much for the advice.  This past Friday, my company has
   decided to use Linux as our company Firewall.  Furthermore, we've
 decided
   that this Firewall will be running kernel 2.4.2 with only two services
   running on it, SSH and netfilter (aka iptables).  I've tested kernel
   2.4.2 in the lab and notice it performs better than kernel 2.2.x.
I've
 also
   performed various intrusion detection tests on the box using
   Cisco NetSonar, Cybercop, ISS, Axent Netrecon but is unable to break
   it.  The linux box is rock-solid.  I am also running portsentry (IDS)
   on the Firewall itself.
  
   Also, we decide to running our squid proxy server on another linux box
   to provide transparent caching for our internal users.  As far as VPN
is
   concerns, we are going to implement FreeS/WAN on another box.  I think
   in the long run, it is going to save the company a lot of money.  We
   end up not buying the PIX and web-caching engine from Cisco.  Oh, the
   networking guy in our group who recommends Cisco PIX and Cisco web-
   caching engine as a solution, he has been fired.  Go figure.
  
   Regards,
   Sean
   P.S.  Priscilla, why not implementing TRANSPARENT caching by using
squid
   to speed up internet connection for your users?  Squid is free and
very
   secure and easy to use.
  
   From: [EMAIL PROTECTED]
   Reply-To: [EMAIL PROTECTED]
   To: [EMAIL PROTECTED], "Stuart Brockwell"
 [EMAIL PROTECTED]
   Subject: Re: Performance Comparision between Linux OS Firewall and
 Cisco
   PIX 525
   Date: Sat, 24 Mar 2001 20:02:26 -0800
   
   Sean,
   
   Comments imbedded:
   
   On 23 Mar 2001, at 16:12, Stuart Brockwell wrote:
   
 Hi Sean,
   I am a Linux head my self, and one of our firewalls is in
fact
   running
 on a Linux box.  The only problem with this type of firewall is
that
 you inherit all of the known bugs that the software has.  Given
that
 the source code to Linux is widely available, you have a lot of
very
 talented people out there who know these ho

Re: Performance Comparision between Linux OS Firewall and Cisco PIX 525

2001-03-26 Thread Allen May

Yeah after reading all the reviews I found that FreeBSD, OpenBSD, and
Slackware were among the most secure  least hacked.

- Original Message -
From: "Brian" [EMAIL PROTECTED]
To: "Allen May" [EMAIL PROTECTED]
Cc: "Sean Young" [EMAIL PROTECTED]; [EMAIL PROTECTED];
[EMAIL PROTECTED]; [EMAIL PROTECTED]
Sent: Monday, March 26, 2001 3:08 PM
Subject: Re: Performance Comparision between Linux OS Firewall and Cisco PIX
525


 If you at all consider the computer based firewall solution, openbsd is
 worth at least a look.

 Bri

 On Mon, 26 Mar 2001, Allen May wrote:

  Is the outside interface still open to SSH connections?  If so  it's
  compromised, Linux is a full blown operating system that, when
compromised,
  can have ANY program designed for Linux installed.  Can you imagine
  something like a packet analyzer grabbing all your passwords and sending
  them out over the net to someone else?  Ewww.  That's my #1 reason for
going
  with something like a PIX.  Just make sure you're IDS is set to notify
even
  in the event of a SUCCESSFUL connection.  I've seen people who set it up
for
  unsuccessful attempts only.
 
  I hope that guy wasn't fired BECAUSE he recommended the Cisco solution.
  That's totally a matter of point of view on that decision  his wasn't
  wrong..neither was the Linux choice.  Some situations call for one while
  others call for the other.
 
  Oh and keep a copy of the correctly configured drive with all settings
on
  hand.  A hard drive is much more prone to failure than RAM/ROM just due
to
  the moving parts involved.
 
  Allen
  - Original Message -
  From: "Sean Young" [EMAIL PROTECTED]
  To: [EMAIL PROTECTED]; [EMAIL PROTECTED];
  [EMAIL PROTECTED]
  Sent: Sunday, March 25, 2001 3:05 PM
  Subject: Re: Performance Comparision between Linux OS Firewall and Cisco
PIX
  525
 
 
   Ken,
   Thank you very much for the advice.  This past Friday, my company has
   decided to use Linux as our company Firewall.  Furthermore, we've
decided
   that this Firewall will be running kernel 2.4.2 with only two services
   running on it, SSH and netfilter (aka iptables).  I've tested kernel
   2.4.2 in the lab and notice it performs better than kernel 2.2.x.
I've
  also
   performed various intrusion detection tests on the box using
   Cisco NetSonar, Cybercop, ISS, Axent Netrecon but is unable to break
   it.  The linux box is rock-solid.  I am also running portsentry (IDS)
   on the Firewall itself.
  
   Also, we decide to running our squid proxy server on another linux box
   to provide transparent caching for our internal users.  As far as VPN
is
   concerns, we are going to implement FreeS/WAN on another box.  I think
   in the long run, it is going to save the company a lot of money.  We
   end up not buying the PIX and web-caching engine from Cisco.  Oh, the
   networking guy in our group who recommends Cisco PIX and Cisco web-
   caching engine as a solution, he has been fired.  Go figure.
  
   Regards,
   Sean
   P.S.  Priscilla, why not implementing TRANSPARENT caching by using
squid
   to speed up internet connection for your users?  Squid is free and
very
   secure and easy to use.
  
   From: [EMAIL PROTECTED]
   Reply-To: [EMAIL PROTECTED]
   To: [EMAIL PROTECTED], "Stuart Brockwell"
[EMAIL PROTECTED]
   Subject: Re: Performance Comparision between Linux OS Firewall and
Cisco
   PIX 525
   Date: Sat, 24 Mar 2001 20:02:26 -0800
   
   Sean,
   
   Comments imbedded:
   
   On 23 Mar 2001, at 16:12, Stuart Brockwell wrote:
   
 Hi Sean,
   I am a Linux head my self, and one of our firewalls is in
fact
   running
 on a Linux box.  The only problem with this type of firewall is
that
 you inherit all of the known bugs that the software has.  Given
that
 the source code to Linux is widely available, you have a lot of
very
 talented people out there who know these holes and are able to
exploit
 them very easily.
   
   It also means that there are a lot of talented people who are looking
   at the code to make sure that any holes are patched.  In fact, when
   new exploits are found, Linux is usually the fastest platform to have
   a patch available.  Compare this to having to wait weeks for vendor
   patches or having to prove to a vendor that a problem exists.
   
   Also, a service can only be exploited if it is running.  A properly
   configured firewall doesn't run unecessary services, this makes it
   very difficult to exploit.  Essentially, it would come down to trying
to
   DoS it or running a password guessing program against it to get
   remote access.
   
   
   If you
 maintain your own Linux firewall, you will need to continuously
look
 for the latest bug fixes to install on your Linux box to address
the
 latest round of holes that have been released.
   
   If the Linux firewall is properly setup, the only services running on
it
   are ipchains and SSH.  Thi

Re: Performance Comparision between Linux OS Firewall and Cisco PIX 525

2001-03-26 Thread Sean Young

Sigh...inline comments


From: "Allen May" [EMAIL PROTECTED]
To: "Sean Young" [EMAIL PROTECTED], [EMAIL PROTECTED], 
[EMAIL PROTECTED], [EMAIL PROTECTED]
Subject: Re: Performance Comparision between Linux OS Firewall and Cisco 
PIX 525
Date: Mon, 26 Mar 2001 14:55:57 -0600

Sigh...inline comments:

- Original Message -
From: "Sean Young" [EMAIL PROTECTED]
To: [EMAIL PROTECTED]; [EMAIL PROTECTED]; [EMAIL PROTECTED];
[EMAIL PROTECTED]
Sent: Monday, March 26, 2001 2:42 PM
Subject: Re: Performance Comparision between Linux OS Firewall and Cisco 
PIX
525


  Allen,
  If SSH service is not open on the outside interface, how do you expect
  to troubleshoot the problem when there is problem with the Firewall?
VPN, dial-up modem, terminal server, ACLs, etc.  If they find your password
or someone knows it  get in, does IDS tell you?

Dial-up modem.  Istn't there a war-dialer that can hack your system.
Another thing, isn't the VPN also has a public interface as well? what
about if your VPN has been compromised?  Ever thought about that?


  Tell me this, how can you troubleshoot a PIX remotely when there is
  problem? My employer is certainly not going to fly me out-of-state to 
fix
a
  minor problem.
See above answer.

 Furthermore, can you absolutely guarantee me, in writing,
  that the Cisco PIX
  can never be compromised?
No guarantee but it's claimed to have never been compromised unless the
attacker had inside access (physical, vpn, etc) and knew the password and
the user was careless enough to not implement ACL.  On the other hand, read
up on security on Linux for yourself.  Redhat was the #1 hacked operating
system (even surpassed Windows last I read).

Ever heard of Linux Router Project.  What make you think that I am running 
RedHat?  Ever heard of NetBSD?  It is even more secure than
PIX


 Another thing, what makes you think that I am
  also running other services besides Firewall features on Linux.  If you
  read my email carefully, you also notice that I only SSH and netfilter
  (aka iptables) on the Firewall
I read that part.  Thats why I said root or sudo access allows a user to
install other services.  A Cisco IOS does not.  It's easy to add a new
service if you have access to do it.  You can even install via ftp.

Now how do you plan getting my root password?

 Your reason is based purely on FUD
  (Fear, Uncertainty and Doubt).
It's based on 12 years experience and working as security administrator at
an ISP where we've had many DSL users complain about their Linux boxes 
being
hacked.  Some find out they've been hacked after someone on the internet 
had
reports of porn sites running on their compromised system.  Users who
purchased a PIX and allowed us to manage it have not been hacked even one
time so far.

That is because they don't know what they are doing.  How do you know
that Cisco PIX doesn't have any security holes.  Did you read about Cisco
IOS devices having security regarding ISN security hole in it?  What
make you think that PIX doesn't have this problem?  Based on what the
vendors tell you?  I would take their word with a grain of salt.

I ain't skeered ;)  I was trying to let you know the vulnerabilities you
might have and allow you to take precautions.  If you're going to be that
way about it, you can learn on your own the hard way when you have to fly
out there to fix a compromised system or failed hard drive.  From your 
reply
you either didn't read my reply carefully or didn't even understand it.

Every systems has it good and bad.  It is up to us to decide.  If I am
educated about Linux and its capabilities and limitation, I think the
system can be a very effective Firewall.

Just my 2 cents.
Sean
 
  Sean
 
 
  From: "Allen May" [EMAIL PROTECTED]
  To: "Sean Young" [EMAIL PROTECTED], [EMAIL PROTECTED],
  [EMAIL PROTECTED], [EMAIL PROTECTED]
  Subject: Re: Performance Comparision between Linux OS Firewall and 
Cisco
  PIX 525
  Date: Mon, 26 Mar 2001 14:29:34 -0600
  
  Is the outside interface still open to SSH connections?  If so  it's
  compromised, Linux is a full blown operating system that, when
compromised,
  can have ANY program designed for Linux installed.  Can you imagine
  something like a packet analyzer grabbing all your passwords and 
sending
  them out over the net to someone else?  Ewww.  That's my #1 reason for
  going
  with something like a PIX.  Just make sure you're IDS is set to notify
even
  in the event of a SUCCESSFUL connection.  I've seen people who set it 
up
  for
  unsuccessful attempts only.
  
  I hope that guy wasn't fired BECAUSE he recommended the Cisco solution.
  That's totally a matter of point of view on that decision  his wasn't
  wrong..neither was the Linux choice.  Some situations call for one 
while
  others call for the other.
  
  Oh and keep a copy of the correctly configured drive with all settings 
on
  hand.  A hard drive is much more prone to failure th

Re: Performance Comparision between Linux OS Firewall and Cisco PIX 525

2001-03-26 Thread Roger Sohn

There are a few ways to go about this.

1)You can run a stripped down (running minimal and only required services)
Linux box serving only SSH connections and you can use that machine to login
into your PIX (allowing your PIX to only accept connections from this SSH
server) and perform administration.
2) Or...you can just run the PIX and I think you can also run a TACACS+
server with it to authenticate encrypted passwords and logins, or run
encryption on the PIX itself.  I could be mistaken, but I know something
like that would probably work best.

But the thing that people have to understand is, that *no one* can
absolutely guarantee that anything can't be compromised.  It will always be
a 99.999% chance that it will be secure.  It all depends on how the
firewall you choose is set up.  Anything is breakable.

But in my opinion, I would recommend running a hardware firewall solution
such as the PIX or equivalent because the device is specifically made to run
the firewalling processes.  Unlike a Linux/Unix/NT box with a software-based
firewall system such as Checkpoint, etc. a hardware solution does not have
the OS overhead with services that firewalling does not require and also
exploits and patches that you need to constantly be up to date about, issues
that others have already mentioned.  It just comes down to how much money
you want to spend and also what you prefer.  I may prefer the Cisco PIX, but
I have friends that recommend a home-grown Unix box solution.

Just trying to help,
Roger

- Original Message -
From: "Sean Young" [EMAIL PROTECTED]
To: [EMAIL PROTECTED]; [EMAIL PROTECTED]; [EMAIL PROTECTED];
[EMAIL PROTECTED]
Sent: Monday, March 26, 2001 12:42 PM
Subject: Re: Performance Comparision between Linux OS Firewall and Cisco PIX
525


 Allen,
 If SSH service is not open on the outside interface, how do you expect
 to troubleshoot the problem when there is problem with the Firewall?
 Tell me this, how can you troubleshoot a PIX remotely when there is
 problem? My employer is certainly not going to fly me out-of-state to fix
a
 minor problem.  Furthermore, can you absolutely guarantee me, in writing,
 that the Cisco PIX
 can never be compromised?  Another thing, what makes you think that I am
 also running other services besides Firewall features on Linux.  If you
 read my email carefully, you also notice that I only SSH and netfilter
 (aka iptables) on the Firewall.  Your reason is based purely on FUD
 (Fear, Uncertainty and Doubt).

 Sean


 From: "Allen May" [EMAIL PROTECTED]
 To: "Sean Young" [EMAIL PROTECTED], [EMAIL PROTECTED],
 [EMAIL PROTECTED], [EMAIL PROTECTED]
 Subject: Re: Performance Comparision between Linux OS Firewall and Cisco
 PIX 525
 Date: Mon, 26 Mar 2001 14:29:34 -0600
 
 Is the outside interface still open to SSH connections?  If so  it's
 compromised, Linux is a full blown operating system that, when
compromised,
 can have ANY program designed for Linux installed.  Can you imagine
 something like a packet analyzer grabbing all your passwords and sending
 them out over the net to someone else?  Ewww.  That's my #1 reason for
 going
 with something like a PIX.  Just make sure you're IDS is set to notify
even
 in the event of a SUCCESSFUL connection.  I've seen people who set it up
 for
 unsuccessful attempts only.
 
 I hope that guy wasn't fired BECAUSE he recommended the Cisco solution.
 That's totally a matter of point of view on that decision  his wasn't
 wrong..neither was the Linux choice.  Some situations call for one while
 others call for the other.
 
 Oh and keep a copy of the correctly configured drive with all settings on
 hand.  A hard drive is much more prone to failure than RAM/ROM just due
to
 the moving parts involved.
 
 Allen
 - Original Message -
 From: "Sean Young" [EMAIL PROTECTED]
 To: [EMAIL PROTECTED]; [EMAIL PROTECTED];
 [EMAIL PROTECTED]
 Sent: Sunday, March 25, 2001 3:05 PM
 Subject: Re: Performance Comparision between Linux OS Firewall and Cisco
 PIX
 525
 
 
   Ken,
   Thank you very much for the advice.  This past Friday, my company has
   decided to use Linux as our company Firewall.  Furthermore, we've
 decided
   that this Firewall will be running kernel 2.4.2 with only two services
   running on it, SSH and netfilter (aka iptables).  I've tested kernel
   2.4.2 in the lab and notice it performs better than kernel 2.2.x.
I've
 also
   performed various intrusion detection tests on the box using
   Cisco NetSonar, Cybercop, ISS, Axent Netrecon but is unable to break
   it.  The linux box is rock-solid.  I am also running portsentry (IDS)
   on the Firewall itself.
  
   Also, we decide to running our squid proxy server on another linux box
   to provide transparent caching for our internal users.  As far as VPN
is
   concerns, we are going to implement FreeS/WAN on another box.  I think
   in the long run, it is going to save the company a lot of money.  We
   end up not buying t

Re: Performance Comparision between Linux OS Firewall and Cisco PIX 525

2001-03-26 Thread Allen May

OK this is messed up.  I sent you a list of possible things that could
happen and you're still going off on me.  I was trying to allow you to make
precautions against this stuff but you're going nuts here.  I don't want an
argument, I'm trying to help.  I LIKE Linux.

More inline comments (hopefully the last).


- Original Message -
From: "Sean Young" [EMAIL PROTECTED]
To: [EMAIL PROTECTED]; [EMAIL PROTECTED]; [EMAIL PROTECTED];
[EMAIL PROTECTED]
Sent: Monday, March 26, 2001 3:19 PM
Subject: Re: Performance Comparision between Linux OS Firewall and Cisco PIX
525


 Sigh...inline comments


 From: "Allen May" [EMAIL PROTECTED]
 To: "Sean Young" [EMAIL PROTECTED], [EMAIL PROTECTED],
 [EMAIL PROTECTED], [EMAIL PROTECTED]
 Subject: Re: Performance Comparision between Linux OS Firewall and Cisco
 PIX 525
 Date: Mon, 26 Mar 2001 14:55:57 -0600
 
 Sigh...inline comments:
 
 - Original Message -
 From: "Sean Young" [EMAIL PROTECTED]
 To: [EMAIL PROTECTED]; [EMAIL PROTECTED];
[EMAIL PROTECTED];
 [EMAIL PROTECTED]
 Sent: Monday, March 26, 2001 2:42 PM
 Subject: Re: Performance Comparision between Linux OS Firewall and Cisco
 PIX
 525
 
 
   Allen,
   If SSH service is not open on the outside interface, how do you expect
   to troubleshoot the problem when there is problem with the Firewall?
 VPN, dial-up modem, terminal server, ACLs, etc.  If they find your
password
 or someone knows it  get in, does IDS tell you?

 Dial-up modem.  Istn't there a war-dialer that can hack your system.
 Another thing, isn't the VPN also has a public interface as well? what
 about if your VPN has been compromised?  Ever thought about that?

I'm a security administrator.  Of course I've thought of that.
1)  No it does not have a public interface.  It has a virtual IP with only
vpn ports opened to it.  ACL only allows certain source IP's to even access
it.  You have to have username/password just to get into VPN and even then,
TACACS+ or RADIUS limits the commands you can type from that point.  It's an
added layer of security that they have to get passed before even being able
to SSH or telnet to the firewall.  This forces them to have 3
username/password combinations and get through ACL without disabling the
account they're trying to use.  This is simply another layer of security you
would have.

2)  War dialers don't do any good when it's AAA-authentication with TACACS+.
The account is disabled after X attempts.  See following comment about IDS
as well.  Besides, why use that argument when you've got SSH wide open to
the entire internet?  Also how are they going to get your phone #?  Same way
they would have to get the password.  Again, another layer of security I
simply suggested.

3)  IDS tells me when a VPN user establishes a connection with the firewall
when configured.  That's what I said in the first email.  If you have it,
set it up to notify you even of successful attempts.  It's another layer of
security you could possibly use instead of just SSH enabled to the world.

 
   Tell me this, how can you troubleshoot a PIX remotely when there is
   problem? My employer is certainly not going to fly me out-of-state to
 fix
 a
   minor problem.
 See above answer.
 
  Furthermore, can you absolutely guarantee me, in writing,
   that the Cisco PIX
   can never be compromised?
 No guarantee but it's claimed to have never been compromised unless the
 attacker had inside access (physical, vpn, etc) and knew the password and
 the user was careless enough to not implement ACL.  On the other hand,
read
 up on security on Linux for yourself.  Redhat was the #1 hacked operating
 system (even surpassed Windows last I read).

 Ever heard of Linux Router Project.  What make you think that I am running
 RedHat?  Ever heard of NetBSD?  It is even more secure than
 PIX

I mentioned vulnerabilites in Redhat as an example not knowing what you were
using.  Regardless, it's a full blown OS that when compromised, someone can
install any service they like.  Please send the link stating it's more
secure than PIX.  I want to see how someone can install a packet sniffer on
a PIX when they know my  password.


 
  Another thing, what makes you think that I am
   also running other services besides Firewall features on Linux.  If
you
   read my email carefully, you also notice that I only SSH and netfilter
   (aka iptables) on the Firewall
 I read that part.  Thats why I said root or sudo access allows a user to
 install other services.  A Cisco IOS does not.  It's easy to add a new
 service if you have access to do it.  You can even install via ftp.
 
 Now how do you plan getting my root password?

I'm not.  But it's easy.  You the only one that knows it?  Is it written
down somewhere?  It's amazing what disgruntled employees would do for a nice
little check from an outside source.  That's a risk involved with any
operating system or piece of hardware.  However, with ACL allowing certa

RE: Performance Comparision between Linux OS Firewall and Cisco PIX 525

2001-03-26 Thread Simmons, Chad

Inline comment


-Original Message-
From: Sean Young [mailto:[EMAIL PROTECTED]]
Sent: Monday, March 26, 2001 4:20 PM
To: [EMAIL PROTECTED]; [EMAIL PROTECTED]; [EMAIL PROTECTED];
[EMAIL PROTECTED]
Subject: Re: Performance Comparision between Linux OS Firewall and Cisco
PIX 525

That is because they don't know what they are doing.  How do you know
that Cisco PIX doesn't have any security holes.  Did you read about Cisco
IOS devices having security regarding ISN security hole in it?  What
make you think that PIX doesn't have this problem?  Based on what the
vendors tell you?  I would take their word with a grain of salt.

The PIX is based on a completely different codebase than Cisco's IOS.

_
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



Re: Performance Comparision between Linux OS Firewall and Cisco PIX 525

2001-03-26 Thread Moe Tavakoli

Sean,

Do you also allow telnet (or SSH) to your edge
routers?  If not then how do you do remote admin.  If
so.. well, never mind.
In the case of not being able to connect to the PIX
from the outside, well I have been doing remote
admin on networks with a PIX, which by the way did not
allow any connections to it from the outside till SSH
came along, for many years.  There are things like
VPNs and remote access dial-ups to the private side.

You guys are going over some stupid and none valid
points to prove your point...

Bottom line, if you know how to properly set up a
Linux firewall, great.  You have a very powerfull tool
at a very low price (almost free!)
If you are an enterprise, which makes money (and I
mean real money, and not your typical mom and pop)
with their infrastructure, one would be a fool to
implement a Linux firewall.  Something that is
standards based and you can call many firms for
support and is backed by a company with it's balls on
the line for their products is the way to go.  Lets
forget the technical is this better or taht and look
at the business logic (technical issues seem to never
be solved!)
I would rather implement Cisco because, I know when
the person who set it up leaves there are MANY people
out there, a phone call away, that can hop in and make
the needed changes.  They don't have to ask what ver
of Linux I'm running, they don't have to look and see
which of many firewall (and router) apps are being
used... There is one common language which the PIX is
configured in.
Also, your Linux box is only as good as the hardware
you run it on... There aren't many cheap boxes with
the same MTBF as teh PIXs (or Nokia's or any
enterprise class FW.)

Moe.

--- Allen May [EMAIL PROTECTED] wrote:
 One more thing I forgot to mention.  If compromised
 ( it has to be from
 inside because outside interface cannot be used to
 connect), all they can do
 to a PIX is mess up your config or add some lines. 
 However, with TACACS+ 
 AAA authentication you can even limit what commands
 they can execute.  If
 the config is messed up, just dial in and copy the
 config from the tftp
 server again.
 
 
 - Original Message -
 From: "Sean Young" [EMAIL PROTECTED]
 To: [EMAIL PROTECTED]; [EMAIL PROTECTED];
 [EMAIL PROTECTED];
 [EMAIL PROTECTED]
 Sent: Monday, March 26, 2001 2:42 PM
 Subject: Re: Performance Comparision between Linux
 OS Firewall and Cisco PIX
 525
 
 
  Allen,
  If SSH service is not open on the outside
 interface, how do you expect
  to troubleshoot the problem when there is problem
 with the Firewall?
  Tell me this, how can you troubleshoot a PIX
 remotely when there is
  problem? My employer is certainly not going to fly
 me out-of-state to fix
 a
  minor problem.  Furthermore, can you absolutely
 guarantee me, in writing,
  that the Cisco PIX
  can never be compromised?  Another thing, what
 makes you think that I am
  also running other services besides Firewall
 features on Linux.  If you
  read my email carefully, you also notice that I
 only SSH and netfilter
  (aka iptables) on the Firewall.  Your reason is
 based purely on FUD
  (Fear, Uncertainty and Doubt).
 
  Sean
 
 
  From: "Allen May" [EMAIL PROTECTED]
  To: "Sean Young" [EMAIL PROTECTED],
 [EMAIL PROTECTED],
  [EMAIL PROTECTED],
 [EMAIL PROTECTED]
  Subject: Re: Performance Comparision between
 Linux OS Firewall and Cisco
  PIX 525
  Date: Mon, 26 Mar 2001 14:29:34 -0600
  
  Is the outside interface still open to SSH
 connections?  If so  it's
  compromised, Linux is a full blown operating
 system that, when
 compromised,
  can have ANY program designed for Linux
 installed.  Can you imagine
  something like a packet analyzer grabbing all
 your passwords and sending
  them out over the net to someone else?  Ewww. 
 That's my #1 reason for
  going
  with something like a PIX.  Just make sure you're
 IDS is set to notify
 even
  in the event of a SUCCESSFUL connection.  I've
 seen people who set it up
  for
  unsuccessful attempts only.
  
  I hope that guy wasn't fired BECAUSE he
 recommended the Cisco solution.
  That's totally a matter of point of view on that
 decision  his wasn't
  wrong..neither was the Linux choice.  Some
 situations call for one while
  others call for the other.
  
  Oh and keep a copy of the correctly configured
 drive with all settings on
  hand.  A hard drive is much more prone to failure
 than RAM/ROM just due
 to
  the moving parts involved.
  
  Allen
  - Original Message -
  From: "Sean Young" [EMAIL PROTECTED]
  To: [EMAIL PROTECTED];
 [EMAIL PROTECTED];
  [EMAIL PROTECTED]
  Sent: Sunday, March 25, 2001 3:05 PM
  Subject: Re: Performance Comparision between
 Linux OS Firewall and Cisco
  PIX
  525
  
  
Ken,
Thank you very much for the advice.  This past
 Friday, my company has
decided to use Linux as our company Firewall. 
 Furthermore, we've
  decided
that this Firewall will be running kernel
 

Re: Performance Comparision between Linux OS Firewall and Cisco PIX 525

2001-03-25 Thread Sean Young

Ken,
Thank you very much for the advice.  This past Friday, my company has
decided to use Linux as our company Firewall.  Furthermore, we've decided
that this Firewall will be running kernel 2.4.2 with only two services
running on it, SSH and netfilter (aka iptables).  I've tested kernel
2.4.2 in the lab and notice it performs better than kernel 2.2.x.  I've also 
performed various intrusion detection tests on the box using
Cisco NetSonar, Cybercop, ISS, Axent Netrecon but is unable to break
it.  The linux box is rock-solid.  I am also running portsentry (IDS)
on the Firewall itself.

Also, we decide to running our squid proxy server on another linux box
to provide transparent caching for our internal users.  As far as VPN is
concerns, we are going to implement FreeS/WAN on another box.  I think
in the long run, it is going to save the company a lot of money.  We
end up not buying the PIX and web-caching engine from Cisco.  Oh, the
networking guy in our group who recommends Cisco PIX and Cisco web-
caching engine as a solution, he has been fired.  Go figure.

Regards,
Sean
P.S.  Priscilla, why not implementing TRANSPARENT caching by using squid
to speed up internet connection for your users?  Squid is free and very
secure and easy to use.

From: [EMAIL PROTECTED]
Reply-To: [EMAIL PROTECTED]
To: [EMAIL PROTECTED], "Stuart Brockwell" [EMAIL PROTECTED]
Subject: Re: Performance Comparision between Linux OS Firewall and Cisco 
PIX 525
Date: Sat, 24 Mar 2001 20:02:26 -0800

Sean,

Comments imbedded:

On 23 Mar 2001, at 16:12, Stuart Brockwell wrote:

  Hi Sean,
I am a Linux head my self, and one of our firewalls is in fact
running
  on a Linux box.  The only problem with this type of firewall is that
  you inherit all of the known bugs that the software has.  Given that
  the source code to Linux is widely available, you have a lot of very
  talented people out there who know these holes and are able to exploit
  them very easily.

It also means that there are a lot of talented people who are looking
at the code to make sure that any holes are patched.  In fact, when
new exploits are found, Linux is usually the fastest platform to have
a patch available.  Compare this to having to wait weeks for vendor
patches or having to prove to a vendor that a problem exists.

Also, a service can only be exploited if it is running.  A properly
configured firewall doesn't run unecessary services, this makes it
very difficult to exploit.  Essentially, it would come down to trying to
DoS it or running a password guessing program against it to get
remote access.


If you
  maintain your own Linux firewall, you will need to continuously look
  for the latest bug fixes to install on your Linux box to address the
  latest round of holes that have been released.

If the Linux firewall is properly setup, the only services running on it
are ipchains and SSH.  This means that you have to be aware of 2
services.  While there could always be a local exploit, if only
trusted admins have access, the trouble with keeping up patches
is minimal.  It is certainly no more trouble than keeping up with
bugs on a vendor platform.

 
  Cisco and companies such as Watch Guard closely guard their source
  code, often you can elect to take on a maintenance contract with the
  firewall where you recieve all the latest fixes for a 12 month period
  (this is what we did).  As this is their bread and butter, they spend
  a lot of time looking for holes and fixes to known bugs.
 

While true, this doesn't mean that their code will have fewer bugs
or that the bugs will be patched quicker.  There is a very large
support community for Linux that is very technical.  Most bugs are
patched in a matter of days, sometimes hours.


  the main plus for each of
  the commercial packages is that there is large support base, where as
  skilled Linux admin staff who can lock down a firewall are very few
  and far between.

This is simply not true.  There is a very large community of Linux
developers and admins, and most of them are very knowledgable.
There are good mailing lists and _plenty_ of good Linux
security/firewall books, articles, web sites, etc. available.

Locking down a Linux box is not rocket science.  That is FUD that
is propagated by vendors who want to sell product.  It's not hard to
configure a Linux box to be secure, the difficulty comes in running
lots of services and providing access to users.  If you have a box
that runs web, ftp, smtp, nfs, etc., then it becomes much harder to
secure, but none of these services should be running on a firewall.

The bottom line is that there are several good commercial firewalls,
but that doesn't mean that a Linux box cannot serve as a good, low-
end alternative.  Especially if cost is one of the main decision
factors.

-Kent




_
FAQ, list archives, and subscription info: 
http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure 

Re: Performance Comparision between Linux OS Firewall and Cisco PIX 525

2001-03-25 Thread KY

Sean,

Have you guys compared FreeBSD with Linux for the firewall?

Thanks

KY
""Sean Young"" [EMAIL PROTECTED] wrote in message
[EMAIL PROTECTED]">news:[EMAIL PROTECTED]...
 Ken,
 Thank you very much for the advice.  This past Friday, my company has
 decided to use Linux as our company Firewall.  Furthermore, we've decided
 that this Firewall will be running kernel 2.4.2 with only two services
 running on it, SSH and netfilter (aka iptables).  I've tested kernel
 2.4.2 in the lab and notice it performs better than kernel 2.2.x.  I've
also
 performed various intrusion detection tests on the box using
 Cisco NetSonar, Cybercop, ISS, Axent Netrecon but is unable to break
 it.  The linux box is rock-solid.  I am also running portsentry (IDS)
 on the Firewall itself.

 Also, we decide to running our squid proxy server on another linux box
 to provide transparent caching for our internal users.  As far as VPN is
 concerns, we are going to implement FreeS/WAN on another box.  I think
 in the long run, it is going to save the company a lot of money.  We
 end up not buying the PIX and web-caching engine from Cisco.  Oh, the
 networking guy in our group who recommends Cisco PIX and Cisco web-
 caching engine as a solution, he has been fired.  Go figure.

 Regards,
 Sean
 P.S.  Priscilla, why not implementing TRANSPARENT caching by using squid
 to speed up internet connection for your users?  Squid is free and very
 secure and easy to use.

 From: [EMAIL PROTECTED]
 Reply-To: [EMAIL PROTECTED]
 To: [EMAIL PROTECTED], "Stuart Brockwell" [EMAIL PROTECTED]
 Subject: Re: Performance Comparision between Linux OS Firewall and Cisco
 PIX 525
 Date: Sat, 24 Mar 2001 20:02:26 -0800
 
 Sean,
 
 Comments imbedded:
 
 On 23 Mar 2001, at 16:12, Stuart Brockwell wrote:
 
   Hi Sean,
 I am a Linux head my self, and one of our firewalls is in fact
 running
   on a Linux box.  The only problem with this type of firewall is that
   you inherit all of the known bugs that the software has.  Given that
   the source code to Linux is widely available, you have a lot of very
   talented people out there who know these holes and are able to exploit
   them very easily.
 
 It also means that there are a lot of talented people who are looking
 at the code to make sure that any holes are patched.  In fact, when
 new exploits are found, Linux is usually the fastest platform to have
 a patch available.  Compare this to having to wait weeks for vendor
 patches or having to prove to a vendor that a problem exists.
 
 Also, a service can only be exploited if it is running.  A properly
 configured firewall doesn't run unecessary services, this makes it
 very difficult to exploit.  Essentially, it would come down to trying to
 DoS it or running a password guessing program against it to get
 remote access.
 
 
 If you
   maintain your own Linux firewall, you will need to continuously look
   for the latest bug fixes to install on your Linux box to address the
   latest round of holes that have been released.
 
 If the Linux firewall is properly setup, the only services running on it
 are ipchains and SSH.  This means that you have to be aware of 2
 services.  While there could always be a local exploit, if only
 trusted admins have access, the trouble with keeping up patches
 is minimal.  It is certainly no more trouble than keeping up with
 bugs on a vendor platform.
 
  
   Cisco and companies such as Watch Guard closely guard their source
   code, often you can elect to take on a maintenance contract with the
   firewall where you recieve all the latest fixes for a 12 month period
   (this is what we did).  As this is their bread and butter, they spend
   a lot of time looking for holes and fixes to known bugs.
  
 
 While true, this doesn't mean that their code will have fewer bugs
 or that the bugs will be patched quicker.  There is a very large
 support community for Linux that is very technical.  Most bugs are
 patched in a matter of days, sometimes hours.
 
 
   the main plus for each of
   the commercial packages is that there is large support base, where as
   skilled Linux admin staff who can lock down a firewall are very few
   and far between.
 
 This is simply not true.  There is a very large community of Linux
 developers and admins, and most of them are very knowledgable.
 There are good mailing lists and _plenty_ of good Linux
 security/firewall books, articles, web sites, etc. available.
 
 Locking down a Linux box is not rocket science.  That is FUD that
 is propagated by vendors who want to sell product.  It's not hard to
 configure a Linux box to be secure, the difficulty comes in running
 lots of services and providing access to users.  If you have a box
 that runs web, ftp, smtp, nfs, etc., then it becomes much harder to
 secure, but none of these services should be running on a firewall.
 
 The bottom line is that there are several good commercial firewalls,
 but tha

Re: Performance Comparision between Linux OS Firewall and Cisco PIX 525

2001-03-24 Thread kent . hundley

Priscilla,

You can get a PIX 506 for about $1,400 from www.provantage.com. 
This may still be a little pricey for a school though. 

I wouldn't worry too much about someone breaking into a properly 
configured Linux firewall.  First, if you have a box acting as a 
firewall, it shouldn't be running _any_ unecessary services, i.e. 
DNS, SMTP, FTP, etc.  When I configure Unix/Linux to act as a 
firewall, the only services I leave running is SSH and the firewall 
software itself. Period.  All other services are disabled and removed.

There is no good reason to run any other traditional service on the 
firewall.  You can pick up wintel boxes that will run fine for a couple 
of hundred bucks.  If you need additional services they should be 
run on different boxes, not the firewall. 

 Pick a good password for use with SSH, something with several 
special characters, or use S/Key and you should be fine.  Course, 
that doesn't mean someone couldn't get _through_ the firewall, only 
that the firewall itself is secured.

Regards,
Kent

On 23 Mar 2001, at 9:37, Priscilla Oppenheimer wrote:

 How about if the customer is strapped for money. I work at a school.
 Luckily our students haven't gotten sophisticated enough to break into
 the Linux firewall but I don't the think that day is too far away.
 Some of them are very smart and they are learning Linux and networking
 in their classes. But PIX is too expensive, I think??
 
 Priscilla
 
 At 09:24 AM 3/23/01, Rik wrote:
 I have seen way too many Linux firewalls hacked as a result of
 mis-administration.  Now, I'm not assuming anything about your
 abilities as the last confirmed hack that I was notified about was a
 Linux FW setup by 2 guys that I know to be excellent Linux admins. 
 The problem is the inherent nature of the beast.  A PIX is totally
 secure right out of the box.  The last Linux hack I speak of was
 hacked based on an exploit within BIND and had nothing to do with the
 FW policy.
 
 I also find the PIX to be MUCH easier to configure and setup.  I can
 do in only a few lines of code what could possibly take pages and
 pages of code in Linux.  When talking about firewalls, simplicity is
 a critically important concern.  One compromise could easily remove
 any upfront cost advantage Linux has over Cisco.  Also, you don't
 have to be concerned with shutting down unused services on a PIX as
 you would on Linux.
 
 Go with the PIX.  It was designed from the ground up to do just what
 it does: protect your network.  Cisco claims that a properly
 configured PIX has never been compromised.  I believe them.
 
 Rik
 
 
 ""Sean Young"" [EMAIL PROTECTED] wrote in message
 [EMAIL PROTECTED]">news:[EMAIL PROTECTED]...
   Hi Everyone,
  
   My company is putting me in charge in implementing a Firewall for
   our company.  One guy in my networking group is recommending PIX
   Firewall. Furthermore, he also recommends a Cisco Web-caching
   engine.  His reason is that not only Cisco is good Firewall but it
   also provides VPN connectivity to our remote sites.  Myself, on
   the other hand, would like to implement Linux-based OS firewall
   along with FreeS/WAN VPN features set.  My reason is that a linux
   firewall can provide everything a Cisco PIX does and even more. 
   In term of hardware, the linux Firewall/ VPN/IPSec box will be
   running a dual-processor (800MHz) with 1GB of RAM. I just feel
   that I can get a lot more for the amount that we are going to
   spend with linux than with Cisco PIX.  I also feel that I tweak
   the source code on the LINUX kernel to increase the performance
   and security. Also, instead of purchasing the Cisco web-caching
   engine, I am thinking of building another linux box that will be
   running squid (web-caching) server.  Don't get me wrong, I think
   Cisco has a lot of good products in the area of routing; however,
   I just don't think it is necessary to throw away money at Cisco
   when I know that Linux or BSD can do the same job that PIX and
   Cisco web-caching engine do but for much less and also I can
   control the source code.  Has anyone has experiences with both the
   Linux/BSD, Squid and Cisco PIX, Cisco web-caching engine so that
   you can give advice on what I should do.  I am open to your
   suggestions.
  
   Many thanks.
   Sean
   _
   Get your FREE download of MSN Explorer at http://explorer.msn.com
  
   _
   FAQ, list archives, and subscription info:
 http://www.groupstudy.com/list/cisco.html
   Report misconduct and Nondisclosure violations to
   [EMAIL PROTECTED]
  
 
 
 _
 FAQ, list archives, and subscription info: 
 http://www.groupstudy.com/list/cisco.html
 Report misconduct and Nondisclosure violations to
 [EMAIL PROTECTED]
 
 
 
 
 Priscilla Oppenheimer
 http://www.priscilla.com
 
 _
 FAQ, list archives, and 

Re: Performance Comparision between Linux OS Firewall and Cisco PIX 525

2001-03-24 Thread kent . hundley

While I agree that for an enterprise I would choose PIX over Linux 
for firewall purposes, if your friends configured a Linux firewall and 
ran other services on it, they may be good Linux admins but they 
don't know much about security. 

There is _no_ good reason to run unnecessary services on a 
firewall. Period.  Wintel hardware is too inexpensive to use any 
argument that a box serving as a firewall needs to run DNS, FTP, 
SMTP, etc.

The only service other than ipchains that a Linux firewall should run 
is SSH.  This gives you all the remote administration of the box 
you need and makes the box very secure.  

-Kent


On 23 Mar 2001, at 9:24, Rik wrote:

 I have seen way too many Linux firewalls hacked as a result of
 mis-administration.  Now, I'm not assuming anything about your
 abilities as the last confirmed hack that I was notified about was a
 Linux FW setup by 2 guys that I know to be excellent Linux admins. 
 The problem is the inherent nature of the beast.  A PIX is totally
 secure right out of the box.  The last Linux hack I speak of was
 hacked based on an exploit within BIND and had nothing to do with the
 FW policy.
 
 I also find the PIX to be MUCH easier to configure and setup.  I can
 do in only a few lines of code what could possibly take pages and
 pages of code in Linux.  When talking about firewalls, simplicity is a
 critically important concern.  One compromise could easily remove any
 upfront cost advantage Linux has over Cisco.  Also, you don't have to
 be concerned with shutting down unused services on a PIX as you would
 on Linux.
 
 Go with the PIX.  It was designed from the ground up to do just what
 it does: protect your network.  Cisco claims that a properly
 configured PIX has never been compromised.  I believe them.
 
 Rik
 
 
 ""Sean Young"" [EMAIL PROTECTED] wrote in message
 [EMAIL PROTECTED]">news:[EMAIL PROTECTED]...
  Hi Everyone,
 
  My company is putting me in charge in implementing a Firewall for
  our company.  One guy in my networking group is recommending PIX
  Firewall. Furthermore, he also recommends a Cisco Web-caching
  engine.  His reason is that not only Cisco is good Firewall but it
  also provides VPN connectivity to our remote sites.  Myself, on the
  other hand, would like to implement Linux-based OS firewall along
  with FreeS/WAN VPN features set.  My reason is that a linux firewall
  can provide everything a Cisco PIX does and even more.  In term of
  hardware, the linux Firewall/ VPN/IPSec box will be running a
  dual-processor (800MHz) with 1GB of RAM. I just feel that I can get
  a lot more for the amount that we are going to spend with linux than
  with Cisco PIX.  I also feel that I tweak the source code on the
  LINUX kernel to increase the performance and security. Also, instead
  of purchasing the Cisco web-caching engine, I am thinking of
  building another linux box that will be running squid (web-caching)
  server.  Don't get me wrong, I think Cisco has a lot of good
  products in the area of routing; however, I just don't think it is
  necessary to throw away money at Cisco when I know that Linux or BSD
  can do the same job that PIX and Cisco web-caching engine do but for
  much less and also I can control the source code.  Has anyone has
  experiences with both the Linux/BSD, Squid and Cisco PIX, Cisco
  web-caching engine so that you can give advice on what I should do. 
  I am open to your suggestions.
 
  Many thanks.
  Sean
  _
  Get your FREE download of MSN Explorer at http://explorer.msn.com
 
  _
  FAQ, list archives, and subscription info:
 http://www.groupstudy.com/list/cisco.html
  Report misconduct and Nondisclosure violations to
  [EMAIL PROTECTED]
 
 
 
 _
 FAQ, list archives, and subscription info:
 http://www.groupstudy.com/list/cisco.html Report misconduct and
 Nondisclosure violations to [EMAIL PROTECTED]


_
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



Re: Performance Comparision between Linux OS Firewall and Cisco PIX 525

2001-03-24 Thread kent . hundley

Sean,

Comments imbedded:

On 23 Mar 2001, at 16:12, Stuart Brockwell wrote:

 Hi Sean,
   I am a Linux head my self, and one of our firewalls is in fact
   running
 on a Linux box.  The only problem with this type of firewall is that
 you inherit all of the known bugs that the software has.  Given that
 the source code to Linux is widely available, you have a lot of very
 talented people out there who know these holes and are able to exploit
 them very easily.

It also means that there are a lot of talented people who are looking 
at the code to make sure that any holes are patched.  In fact, when 
new exploits are found, Linux is usually the fastest platform to have 
a patch available.  Compare this to having to wait weeks for vendor 
patches or having to prove to a vendor that a problem exists.

Also, a service can only be exploited if it is running.  A properly 
configured firewall doesn't run unecessary services, this makes it 
very difficult to exploit.  Essentially, it would come down to trying to 
DoS it or running a password guessing program against it to get 
remote access.


   If you
 maintain your own Linux firewall, you will need to continuously look
 for the latest bug fixes to install on your Linux box to address the
 latest round of holes that have been released.

If the Linux firewall is properly setup, the only services running on it 
are ipchains and SSH.  This means that you have to be aware of 2 
services.  While there could always be a local exploit, if only 
trusted admins have access, the trouble with keeping up patches 
is minimal.  It is certainly no more trouble than keeping up with 
bugs on a vendor platform.

 
 Cisco and companies such as Watch Guard closely guard their source
 code, often you can elect to take on a maintenance contract with the
 firewall where you recieve all the latest fixes for a 12 month period
 (this is what we did).  As this is their bread and butter, they spend
 a lot of time looking for holes and fixes to known bugs.
 

While true, this doesn't mean that their code will have fewer bugs 
or that the bugs will be patched quicker.  There is a very large 
support community for Linux that is very technical.  Most bugs are 
patched in a matter of days, sometimes hours.


 the main plus for each of
 the commercial packages is that there is large support base, where as
 skilled Linux admin staff who can lock down a firewall are very few
 and far between.

This is simply not true.  There is a very large community of Linux 
developers and admins, and most of them are very knowledgable.  
There are good mailing lists and _plenty_ of good Linux 
security/firewall books, articles, web sites, etc. available.  

Locking down a Linux box is not rocket science.  That is FUD that 
is propagated by vendors who want to sell product.  It's not hard to 
configure a Linux box to be secure, the difficulty comes in running 
lots of services and providing access to users.  If you have a box 
that runs web, ftp, smtp, nfs, etc., then it becomes much harder to 
secure, but none of these services should be running on a firewall.

The bottom line is that there are several good commercial firewalls, 
but that doesn't mean that a Linux box cannot serve as a good, low-
end alternative.  Especially if cost is one of the main decision 
factors.

-Kent

  


_
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



Re: Performance Comparision between Linux OS Firewall and Cisco PIX 525

2001-03-24 Thread Priscilla Oppenheimer

Thanks for the advice, Kent.

I think we are doing exactly what you say, though I'll check. The 
administrator bought an inexpensive Wintel box and I believe he is running 
just the Linux firewall on it and no other services.

Performance has been surprisingly good, especially considering that about 
700 users access the Web consistently. We no longer use a proxy, so all the 
traffic really does go out to the Web. Mostly it's traffic to simple Web 
pages such as www.blackboard.com, but the students also download videos, 
games, etc., even if we tell them not to, of course. (We block Napster. ;-)

Priscilla

At 08:02 PM 3/24/01, you wrote:
Priscilla,

You can get a PIX 506 for about $1,400 from www.provantage.com.
This may still be a little pricey for a school though.

I wouldn't worry too much about someone breaking into a properly
configured Linux firewall.  First, if you have a box acting as a
firewall, it shouldn't be running _any_ unecessary services, i.e.
DNS, SMTP, FTP, etc.  When I configure Unix/Linux to act as a
firewall, the only services I leave running is SSH and the firewall
software itself. Period.  All other services are disabled and removed.

There is no good reason to run any other traditional service on the
firewall.  You can pick up wintel boxes that will run fine for a couple
of hundred bucks.  If you need additional services they should be
run on different boxes, not the firewall.

  Pick a good password for use with SSH, something with several
special characters, or use S/Key and you should be fine.  Course,
that doesn't mean someone couldn't get _through_ the firewall, only
that the firewall itself is secured.

Regards,
Kent

On 23 Mar 2001, at 9:37, Priscilla Oppenheimer wrote:

  How about if the customer is strapped for money. I work at a school.
  Luckily our students haven't gotten sophisticated enough to break into
  the Linux firewall but I don't the think that day is too far away.
  Some of them are very smart and they are learning Linux and networking
  in their classes. But PIX is too expensive, I think??
 
  Priscilla
 
  At 09:24 AM 3/23/01, Rik wrote:
  I have seen way too many Linux firewalls hacked as a result of
  mis-administration.  Now, I'm not assuming anything about your
  abilities as the last confirmed hack that I was notified about was a
  Linux FW setup by 2 guys that I know to be excellent Linux admins.
  The problem is the inherent nature of the beast.  A PIX is totally
  secure right out of the box.  The last Linux hack I speak of was
  hacked based on an exploit within BIND and had nothing to do with the
  FW policy.
  
  I also find the PIX to be MUCH easier to configure and setup.  I can
  do in only a few lines of code what could possibly take pages and
  pages of code in Linux.  When talking about firewalls, simplicity is
  a critically important concern.  One compromise could easily remove
  any upfront cost advantage Linux has over Cisco.  Also, you don't
  have to be concerned with shutting down unused services on a PIX as
  you would on Linux.
  
  Go with the PIX.  It was designed from the ground up to do just what
  it does: protect your network.  Cisco claims that a properly
  configured PIX has never been compromised.  I believe them.
  
  Rik
  
  
  ""Sean Young"" [EMAIL PROTECTED] wrote in message
  [EMAIL PROTECTED]">news:[EMAIL PROTECTED]...
Hi Everyone,
   
My company is putting me in charge in implementing a Firewall for
our company.  One guy in my networking group is recommending PIX
Firewall. Furthermore, he also recommends a Cisco Web-caching
engine.  His reason is that not only Cisco is good Firewall but it
also provides VPN connectivity to our remote sites.  Myself, on
the other hand, would like to implement Linux-based OS firewall
along with FreeS/WAN VPN features set.  My reason is that a linux
firewall can provide everything a Cisco PIX does and even more.
In term of hardware, the linux Firewall/ VPN/IPSec box will be
running a dual-processor (800MHz) with 1GB of RAM. I just feel
that I can get a lot more for the amount that we are going to
spend with linux than with Cisco PIX.  I also feel that I tweak
the source code on the LINUX kernel to increase the performance
and security. Also, instead of purchasing the Cisco web-caching
engine, I am thinking of building another linux box that will be
running squid (web-caching) server.  Don't get me wrong, I think
Cisco has a lot of good products in the area of routing; however,
I just don't think it is necessary to throw away money at Cisco
when I know that Linux or BSD can do the same job that PIX and
Cisco web-caching engine do but for much less and also I can
control the source code.  Has anyone has experiences with both the
Linux/BSD, Squid and Cisco PIX, Cisco web-caching engine so that
you can give advice on what I should do.  I am open to your
suggestions.
   
Many thanks.
  

Re: Performance Comparision between Linux OS Firewall and Cisco PIX 525

2001-03-23 Thread Rik

I have seen way too many Linux firewalls hacked as a result of
mis-administration.  Now, I'm not assuming anything about your abilities as
the last confirmed hack that I was notified about was a Linux FW setup by 2
guys that I know to be excellent Linux admins.  The problem is the inherent
nature of the beast.  A PIX is totally secure right out of the box.  The
last Linux hack I speak of was hacked based on an exploit within BIND and
had nothing to do with the FW policy.

I also find the PIX to be MUCH easier to configure and setup.  I can do in
only a few lines of code what could possibly take pages and pages of code in
Linux.  When talking about firewalls, simplicity is a critically important
concern.  One compromise could easily remove any upfront cost advantage
Linux has over Cisco.  Also, you don't have to be concerned with shutting
down unused services on a PIX as you would on Linux.

Go with the PIX.  It was designed from the ground up to do just what it
does: protect your network.  Cisco claims that a properly configured PIX has
never been compromised.  I believe them.

Rik


""Sean Young"" [EMAIL PROTECTED] wrote in message
[EMAIL PROTECTED]">news:[EMAIL PROTECTED]...
 Hi Everyone,

 My company is putting me in charge in implementing a Firewall for our
 company.  One guy in my networking group is recommending PIX Firewall.
 Furthermore, he also recommends a Cisco Web-caching engine.  His reason
 is that not only Cisco is good Firewall but it also provides VPN
 connectivity to our remote sites.  Myself, on the other hand, would
 like to implement Linux-based OS firewall along with FreeS/WAN VPN
 features set.  My reason is that a linux firewall can provide everything
 a Cisco PIX does and even more.  In term of hardware, the linux Firewall/
 VPN/IPSec box will be running a dual-processor (800MHz) with 1GB of RAM.
 I just feel that I can get a lot more for the amount that we are going
 to spend with linux than with Cisco PIX.  I also feel that I tweak the
 source code on the LINUX kernel to increase the performance and security.
 Also, instead of purchasing the Cisco web-caching engine, I am thinking
 of building another linux box that will be running squid (web-caching)
 server.  Don't get me wrong, I think Cisco has a lot of good products
 in the area of routing; however, I just don't think it is necessary to
 throw away money at Cisco when I know that Linux or BSD can do the same
 job that PIX and Cisco web-caching engine do but for much less and also
 I can control the source code.  Has anyone has experiences with both
 the Linux/BSD, Squid and Cisco PIX, Cisco web-caching engine so that
 you can give advice on what I should do.  I am open to your suggestions.

 Many thanks.
 Sean
 _
 Get your FREE download of MSN Explorer at http://explorer.msn.com

 _
 FAQ, list archives, and subscription info:
http://www.groupstudy.com/list/cisco.html
 Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



_
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



Re: Performance Comparision between Linux OS Firewall and Cisco PIX 525

2001-03-23 Thread Priscilla Oppenheimer

How about if the customer is strapped for money. I work at a school. 
Luckily our students haven't gotten sophisticated enough to break into the 
Linux firewall but I don't the think that day is too far away. Some of them 
are very smart and they are learning Linux and networking in their classes. 
But PIX is too expensive, I think??

Priscilla

At 09:24 AM 3/23/01, Rik wrote:
I have seen way too many Linux firewalls hacked as a result of
mis-administration.  Now, I'm not assuming anything about your abilities as
the last confirmed hack that I was notified about was a Linux FW setup by 2
guys that I know to be excellent Linux admins.  The problem is the inherent
nature of the beast.  A PIX is totally secure right out of the box.  The
last Linux hack I speak of was hacked based on an exploit within BIND and
had nothing to do with the FW policy.

I also find the PIX to be MUCH easier to configure and setup.  I can do in
only a few lines of code what could possibly take pages and pages of code in
Linux.  When talking about firewalls, simplicity is a critically important
concern.  One compromise could easily remove any upfront cost advantage
Linux has over Cisco.  Also, you don't have to be concerned with shutting
down unused services on a PIX as you would on Linux.

Go with the PIX.  It was designed from the ground up to do just what it
does: protect your network.  Cisco claims that a properly configured PIX has
never been compromised.  I believe them.

Rik


""Sean Young"" [EMAIL PROTECTED] wrote in message
[EMAIL PROTECTED]">news:[EMAIL PROTECTED]...
  Hi Everyone,
 
  My company is putting me in charge in implementing a Firewall for our
  company.  One guy in my networking group is recommending PIX Firewall.
  Furthermore, he also recommends a Cisco Web-caching engine.  His reason
  is that not only Cisco is good Firewall but it also provides VPN
  connectivity to our remote sites.  Myself, on the other hand, would
  like to implement Linux-based OS firewall along with FreeS/WAN VPN
  features set.  My reason is that a linux firewall can provide everything
  a Cisco PIX does and even more.  In term of hardware, the linux Firewall/
  VPN/IPSec box will be running a dual-processor (800MHz) with 1GB of RAM.
  I just feel that I can get a lot more for the amount that we are going
  to spend with linux than with Cisco PIX.  I also feel that I tweak the
  source code on the LINUX kernel to increase the performance and security.
  Also, instead of purchasing the Cisco web-caching engine, I am thinking
  of building another linux box that will be running squid (web-caching)
  server.  Don't get me wrong, I think Cisco has a lot of good products
  in the area of routing; however, I just don't think it is necessary to
  throw away money at Cisco when I know that Linux or BSD can do the same
  job that PIX and Cisco web-caching engine do but for much less and also
  I can control the source code.  Has anyone has experiences with both
  the Linux/BSD, Squid and Cisco PIX, Cisco web-caching engine so that
  you can give advice on what I should do.  I am open to your suggestions.
 
  Many thanks.
  Sean
  _
  Get your FREE download of MSN Explorer at http://explorer.msn.com
 
  _
  FAQ, list archives, and subscription info:
http://www.groupstudy.com/list/cisco.html
  Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]
 


_
FAQ, list archives, and subscription info: 
http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]




Priscilla Oppenheimer
http://www.priscilla.com

_
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



RE: Performance Comparision between Linux OS Firewall and Cisco PIX 525

2001-03-23 Thread Chris Lemagie

On the performance front, a Pix 525 will sustain just under 400MB of
throughput, most if any Linux based firewalls will not touch that...  On the
Price front, correct, the Pix 525 is a fairly expensive unit, but you are
able to drop to a 515 which will support 172 MB sustained throughput and 6
interfaces if you purchase the un-restricted version.  The 515 restricted
version comes in at about $5300 with three interfaces and will still support
the same throughput numbers and 65K sessions.

Chris Lemagie

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of
Priscilla Oppenheimer
Sent: Friday, March 23, 2001 9:38 AM
To: [EMAIL PROTECTED]
Subject: Re: Performance Comparision between Linux OS Firewall and Cisco
PIX 525


How about if the customer is strapped for money. I work at a school.
Luckily our students haven't gotten sophisticated enough to break into the
Linux firewall but I don't the think that day is too far away. Some of them
are very smart and they are learning Linux and networking in their classes.
But PIX is too expensive, I think??

Priscilla

At 09:24 AM 3/23/01, Rik wrote:
I have seen way too many Linux firewalls hacked as a result of
mis-administration.  Now, I'm not assuming anything about your abilities as
the last confirmed hack that I was notified about was a Linux FW setup by 2
guys that I know to be excellent Linux admins.  The problem is the inherent
nature of the beast.  A PIX is totally secure right out of the box.  The
last Linux hack I speak of was hacked based on an exploit within BIND and
had nothing to do with the FW policy.

I also find the PIX to be MUCH easier to configure and setup.  I can do in
only a few lines of code what could possibly take pages and pages of code
in
Linux.  When talking about firewalls, simplicity is a critically important
concern.  One compromise could easily remove any upfront cost advantage
Linux has over Cisco.  Also, you don't have to be concerned with shutting
down unused services on a PIX as you would on Linux.

Go with the PIX.  It was designed from the ground up to do just what it
does: protect your network.  Cisco claims that a properly configured PIX
has
never been compromised.  I believe them.

Rik


""Sean Young"" [EMAIL PROTECTED] wrote in message
[EMAIL PROTECTED]">news:[EMAIL PROTECTED]...
  Hi Everyone,
 
  My company is putting me in charge in implementing a Firewall for our
  company.  One guy in my networking group is recommending PIX Firewall.
  Furthermore, he also recommends a Cisco Web-caching engine.  His reason
  is that not only Cisco is good Firewall but it also provides VPN
  connectivity to our remote sites.  Myself, on the other hand, would
  like to implement Linux-based OS firewall along with FreeS/WAN VPN
  features set.  My reason is that a linux firewall can provide everything
  a Cisco PIX does and even more.  In term of hardware, the linux
Firewall/
  VPN/IPSec box will be running a dual-processor (800MHz) with 1GB of RAM.
  I just feel that I can get a lot more for the amount that we are going
  to spend with linux than with Cisco PIX.  I also feel that I tweak the
  source code on the LINUX kernel to increase the performance and
security.
  Also, instead of purchasing the Cisco web-caching engine, I am thinking
  of building another linux box that will be running squid (web-caching)
  server.  Don't get me wrong, I think Cisco has a lot of good products
  in the area of routing; however, I just don't think it is necessary to
  throw away money at Cisco when I know that Linux or BSD can do the same
  job that PIX and Cisco web-caching engine do but for much less and also
  I can control the source code.  Has anyone has experiences with both
  the Linux/BSD, Squid and Cisco PIX, Cisco web-caching engine so that
  you can give advice on what I should do.  I am open to your suggestions.
 
  Many thanks.
  Sean
  _
  Get your FREE download of MSN Explorer at http://explorer.msn.com
 
  _
  FAQ, list archives, and subscription info:
http://www.groupstudy.com/list/cisco.html
  Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]
 


_
FAQ, list archives, and subscription info:
http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]




Priscilla Oppenheimer
http://www.priscilla.com

_
FAQ, list archives, and subscription info:
http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

_
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



Re: Performance Comparision between Linux OS Firewall and Cisco PIX 525

2001-03-23 Thread Moe Tavakoli

It was assumed that the question was a result of an
implementation in an enterpise system.  Of course in a
school or a small comapny where uptime does not = $
there is no issue, use Linux, use MS Proxy for all
that matters.  But in an enterprise where uptime is
Essentail, there is money at stake and information has
lots of value, I would sleep easier at night knowing
that I have an enterprise level platform with a solid
proven track record, backed by a company who is
focused on producing and supporting systems to enable
me to focus on doing what I'm good at...

Moe.

--- Priscilla Oppenheimer [EMAIL PROTECTED] wrote:
 How about if the customer is strapped for money. I
 work at a school. 
 Luckily our students haven't gotten sophisticated
 enough to break into the 
 Linux firewall but I don't the think that day is too
 far away. Some of them 
 are very smart and they are learning Linux and
 networking in their classes. 
 But PIX is too expensive, I think??
 
 Priscilla
 
 At 09:24 AM 3/23/01, Rik wrote:
 I have seen way too many Linux firewalls hacked as
 a result of
 mis-administration.  Now, I'm not assuming anything
 about your abilities as
 the last confirmed hack that I was notified about
 was a Linux FW setup by 2
 guys that I know to be excellent Linux admins.  The
 problem is the inherent
 nature of the beast.  A PIX is totally secure right
 out of the box.  The
 last Linux hack I speak of was hacked based on an
 exploit within BIND and
 had nothing to do with the FW policy.
 
 I also find the PIX to be MUCH easier to configure
 and setup.  I can do in
 only a few lines of code what could possibly take
 pages and pages of code in
 Linux.  When talking about firewalls, simplicity is
 a critically important
 concern.  One compromise could easily remove any
 upfront cost advantage
 Linux has over Cisco.  Also, you don't have to be
 concerned with shutting
 down unused services on a PIX as you would on
 Linux.
 
 Go with the PIX.  It was designed from the ground
 up to do just what it
 does: protect your network.  Cisco claims that a
 properly configured PIX has
 never been compromised.  I believe them.
 
 Rik
 
 
 ""Sean Young"" [EMAIL PROTECTED] wrote in
 message
 [EMAIL PROTECTED]">news:[EMAIL PROTECTED]...
   Hi Everyone,
  
   My company is putting me in charge in
 implementing a Firewall for our
   company.  One guy in my networking group is
 recommending PIX Firewall.
   Furthermore, he also recommends a Cisco
 Web-caching engine.  His reason
   is that not only Cisco is good Firewall but it
 also provides VPN
   connectivity to our remote sites.  Myself, on
 the other hand, would
   like to implement Linux-based OS firewall along
 with FreeS/WAN VPN
   features set.  My reason is that a linux
 firewall can provide everything
   a Cisco PIX does and even more.  In term of
 hardware, the linux Firewall/
   VPN/IPSec box will be running a dual-processor
 (800MHz) with 1GB of RAM.
   I just feel that I can get a lot more for the
 amount that we are going
   to spend with linux than with Cisco PIX.  I also
 feel that I tweak the
   source code on the LINUX kernel to increase the
 performance and security.
   Also, instead of purchasing the Cisco
 web-caching engine, I am thinking
   of building another linux box that will be
 running squid (web-caching)
   server.  Don't get me wrong, I think Cisco has a
 lot of good products
   in the area of routing; however, I just don't
 think it is necessary to
   throw away money at Cisco when I know that Linux
 or BSD can do the same
   job that PIX and Cisco web-caching engine do but
 for much less and also
   I can control the source code.  Has anyone has
 experiences with both
   the Linux/BSD, Squid and Cisco PIX, Cisco
 web-caching engine so that
   you can give advice on what I should do.  I am
 open to your suggestions.
  
   Many thanks.
   Sean
  

_
   Get your FREE download of MSN Explorer at
 http://explorer.msn.com
  
   _
   FAQ, list archives, and subscription info:
 http://www.groupstudy.com/list/cisco.html
   Report misconduct and Nondisclosure violations
 to [EMAIL PROTECTED]
  
 
 
 _
 FAQ, list archives, and subscription info: 
 http://www.groupstudy.com/list/cisco.html
 Report misconduct and Nondisclosure violations to
 [EMAIL PROTECTED]
 
 
 
 
 Priscilla Oppenheimer
 http://www.priscilla.com
 
 _
 FAQ, list archives, and subscription info:
 http://www.groupstudy.com/list/cisco.html
 Report misconduct and Nondisclosure violations to
[EMAIL PROTECTED]


=
_
Moe Tavakoli

__
Do You Yahoo!?
Get email at your own domain with Yahoo! Mail. 
http://personal.mail.yahoo.com/

_
FAQ, list archives, and subscription info: 

Re: Performance Comparision between Linux OS Firewall and Cisco PIX 525

2001-03-22 Thread Stuart Brockwell

Hi Sean,
  I am a Linux head my self, and one of our firewalls is in fact running
on a Linux box.  The only problem with this type of firewall is that you
inherit all of the known bugs that the software has.  Given that the source
code to Linux is widely available, you have a lot of very talented people
out there who know these holes and are able to exploit them very easily.  If
you are really keen on a Linux firewall, I would suggest you look at some of
the firewalls running on a cut down version of Linux.  One such firewall is
Watch Guard, (there are many around).  We also use one of these in our
office.  The plus to one of these firewalls is that these guys do it for a
living.  If you maintain your own Linux firewall, you will need to
continuously look for the latest bug fixes to install on your Linux box to
address the latest round of holes that have been released.

Cisco and companies such as Watch Guard closely guard their source code,
often you can elect to take on a maintenance contract with the firewall
where you recieve all the latest fixes for a 12 month period (this is what
we did).  As this is their bread and butter, they spend a lot of time
looking for holes and fixes to known bugs.

We do not use a PIX firewall, but we have used Novel Boarder manager, Watch
Guard, Linux and one of the Nokia firewalls (I do not know which).  All have
their good and bad points, the main plus for each of the commercial packages
is that there is large support base, where as skilled Linux admin staff who
can lock down a firewall are very few and far between.

Good luck with your firewall, hope this is of some assistance.

Stuart Brockwell
Engineer - Network Planning
Primus Telecom (Aust)
MCSE, CCNA, CCDA




""Sean Young"" [EMAIL PROTECTED] wrote in message
[EMAIL PROTECTED]">news:[EMAIL PROTECTED]...
 Hi Everyone,

 My company is putting me in charge in implementing a Firewall for our
 company.  One guy in my networking group is recommending PIX Firewall.
 Furthermore, he also recommends a Cisco Web-caching engine.  His reason
 is that not only Cisco is good Firewall but it also provides VPN
 connectivity to our remote sites.  Myself, on the other hand, would
 like to implement Linux-based OS firewall along with FreeS/WAN VPN
 features set.  My reason is that a linux firewall can provide everything
 a Cisco PIX does and even more.  In term of hardware, the linux Firewall/
 VPN/IPSec box will be running a dual-processor (800MHz) with 1GB of RAM.
 I just feel that I can get a lot more for the amount that we are going
 to spend with linux than with Cisco PIX.  I also feel that I tweak the
 source code on the LINUX kernel to increase the performance and security.
 Also, instead of purchasing the Cisco web-caching engine, I am thinking
 of building another linux box that will be running squid (web-caching)
 server.  Don't get me wrong, I think Cisco has a lot of good products
 in the area of routing; however, I just don't think it is necessary to
 throw away money at Cisco when I know that Linux or BSD can do the same
 job that PIX and Cisco web-caching engine do but for much less and also
 I can control the source code.  Has anyone has experiences with both
 the Linux/BSD, Squid and Cisco PIX, Cisco web-caching engine so that
 you can give advice on what I should do.  I am open to your suggestions.

 Many thanks.
 Sean
 _
 Get your FREE download of MSN Explorer at http://explorer.msn.com

 _
 FAQ, list archives, and subscription info:
http://www.groupstudy.com/list/cisco.html
 Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



_
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]