Re: Performance Comparision between Linux OS Firewall and Cisco PIX 525

2001-03-26 Thread Moe Tavakoli

Sean,

Do you also allow telnet (or SSH) to your edge
routers?  If not then how do you do remote admin.  If
so.. well, never mind.
In the case of not being able to connect to the PIX
from the outside, well I have been doing remote
admin on networks with a PIX, which by the way did not
allow any connections to it from the outside till SSH
came along, for many years.  There are things like
VPNs and remote access dial-ups to the private side.

You guys are going over some stupid and none valid
points to prove your point...

Bottom line, if you know how to properly set up a
Linux firewall, great.  You have a very powerfull tool
at a very low price (almost free!)
If you are an enterprise, which makes money (and I
mean real money, and not your typical mom and pop)
with their infrastructure, one would be a fool to
implement a Linux firewall.  Something that is
standards based and you can call many firms for
support and is backed by a company with it's balls on
the line for their products is the way to go.  Lets
forget the technical is this better or taht and look
at the business logic (technical issues seem to never
be solved!)
I would rather implement Cisco because, I know when
the person who set it up leaves there are MANY people
out there, a phone call away, that can hop in and make
the needed changes.  They don't have to ask what ver
of Linux I'm running, they don't have to look and see
which of many firewall (and router) apps are being
used... There is one common language which the PIX is
configured in.
Also, your Linux box is only as good as the hardware
you run it on... There aren't many cheap boxes with
the same MTBF as teh PIXs (or Nokia's or any
enterprise class FW.)

Moe.

--- Allen May <[EMAIL PROTECTED]> wrote:
> One more thing I forgot to mention.  If compromised
> (& it has to be from
> inside because outside interface cannot be used to
> connect), all they can do
> to a PIX is mess up your config or add some lines. 
> However, with TACACS+ &
> AAA authentication you can even limit what commands
> they can execute.  If
> the config is messed up, just dial in and copy the
> config from the tftp
> server again.
> 
> 
> - Original Message -
> From: "Sean Young" <[EMAIL PROTECTED]>
> To: <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]>;
> <[EMAIL PROTECTED]>;
> <[EMAIL PROTECTED]>
> Sent: Monday, March 26, 2001 2:42 PM
> Subject: Re: Performance Comparision between Linux
> OS Firewall and Cisco PIX
> 525
> 
> 
> > Allen,
> > If SSH service is not open on the outside
> interface, how do you expect
> > to troubleshoot the problem when there is problem
> with the Firewall?
> > Tell me this, how can you troubleshoot a PIX
> remotely when there is
> > problem? My employer is certainly not going to fly
> me out-of-state to fix
> a
> > minor problem.  Furthermore, can you absolutely
> guarantee me, in writing,
> > that the Cisco PIX
> > can never be compromised?  Another thing, what
> makes you think that I am
> > also running other services besides Firewall
> features on Linux.  If you
> > read my email carefully, you also notice that I
> only SSH and netfilter
> > (aka iptables) on the Firewall.  Your reason is
> based purely on FUD
> > (Fear, Uncertainty and Doubt).
> >
> > Sean
> >
> >
> > >From: "Allen May" <[EMAIL PROTECTED]>
> > >To: "Sean Young" <[EMAIL PROTECTED]>,
> <[EMAIL PROTECTED]>,
> > ><[EMAIL PROTECTED]>,
> <[EMAIL PROTECTED]>
> > >Subject: Re: Performance Comparision between
> Linux OS Firewall and Cisco
> > >PIX 525
> > >Date: Mon, 26 Mar 2001 14:29:34 -0600
> > >
> > >Is the outside interface still open to SSH
> connections?  If so & it's
> > >compromised, Linux is a full blown operating
> system that, when
> compromised,
> > >can have ANY program designed for Linux
> installed.  Can you imagine
> > >something like a packet analyzer grabbing all
> your passwords and sending
> > >them out over the net to someone else?  Ewww. 
> That's my #1 reason for
> > >going
> > >with something like a PIX.  Just make sure you're
> IDS is set to notify
> even
> > >in the event of a SUCCESSFUL connection.  I've
> seen people who set it up
> > >for
> > >unsuccessful attempts only.
> > >
> > >I hope that guy wasn't fired BECAUSE he
> recommended the Cisco solution.
> > >That's totally a matter of point of view on that
> decision & his wasn't
> > >wrong..neither was the Linux choice.  Some
> situati

RE: Performance Comparision between Linux OS Firewall and Cisco PIX 525

2001-03-26 Thread Simmons, Chad

Inline comment


-Original Message-
From: Sean Young [mailto:[EMAIL PROTECTED]]
Sent: Monday, March 26, 2001 4:20 PM
To: [EMAIL PROTECTED]; [EMAIL PROTECTED]; [EMAIL PROTECTED];
[EMAIL PROTECTED]
Subject: Re: Performance Comparision between Linux OS Firewall and Cisco
PIX 525

>That is because they don't know what they are doing.  How do you know
>that Cisco PIX doesn't have any security holes.  Did you read about Cisco
>IOS devices having security regarding ISN security hole in it?  What
>make you think that PIX doesn't have this problem?  Based on what the
>vendors tell you?  I would take their word with a grain of salt.

The PIX is based on a completely different codebase than Cisco's IOS.

_
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



Re: Performance Comparision between Linux OS Firewall and Cisco PIX 525

2001-03-26 Thread Allen May

OK this is messed up.  I sent you a list of possible things that could
happen and you're still going off on me.  I was trying to allow you to make
precautions against this stuff but you're going nuts here.  I don't want an
argument, I'm trying to help.  I LIKE Linux.

More inline comments (hopefully the last).


- Original Message -
From: "Sean Young" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]>;
<[EMAIL PROTECTED]>
Sent: Monday, March 26, 2001 3:19 PM
Subject: Re: Performance Comparision between Linux OS Firewall and Cisco PIX
525


> Sigh...inline comments
>
>
> >From: "Allen May" <[EMAIL PROTECTED]>
> >To: "Sean Young" <[EMAIL PROTECTED]>, <[EMAIL PROTECTED]>,
> >    <[EMAIL PROTECTED]>, <[EMAIL PROTECTED]>
> >Subject: Re: Performance Comparision between Linux OS Firewall and Cisco
> >PIX 525
> >Date: Mon, 26 Mar 2001 14:55:57 -0600
> >
> >Sigh...inline comments:
> >
> >- Original Message -
> >From: "Sean Young" <[EMAIL PROTECTED]>
> >To: <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]>;
<[EMAIL PROTECTED]>;
> ><[EMAIL PROTECTED]>
> >Sent: Monday, March 26, 2001 2:42 PM
> >Subject: Re: Performance Comparision between Linux OS Firewall and Cisco
> >PIX
> >525
> >
> >
> > > Allen,
> > > If SSH service is not open on the outside interface, how do you expect
> > > to troubleshoot the problem when there is problem with the Firewall?
> >VPN, dial-up modem, terminal server, ACLs, etc.  If they find your
password
> >or someone knows it & get in, does IDS tell you?
>
> Dial-up modem.  Istn't there a war-dialer that can hack your system.
> Another thing, isn't the VPN also has a public interface as well? what
> about if your VPN has been compromised?  Ever thought about that?

I'm a security administrator.  Of course I've thought of that.
1)  No it does not have a public interface.  It has a virtual IP with only
vpn ports opened to it.  ACL only allows certain source IP's to even access
it.  You have to have username/password just to get into VPN and even then,
TACACS+ or RADIUS limits the commands you can type from that point.  It's an
added layer of security that they have to get passed before even being able
to SSH or telnet to the firewall.  This forces them to have 3
username/password combinations and get through ACL without disabling the
account they're trying to use.  This is simply another layer of security you
would have.

2)  War dialers don't do any good when it's AAA-authentication with TACACS+.
The account is disabled after X attempts.  See following comment about IDS
as well.  Besides, why use that argument when you've got SSH wide open to
the entire internet?  Also how are they going to get your phone #?  Same way
they would have to get the password.  Again, another layer of security I
simply suggested.

3)  IDS tells me when a VPN user establishes a connection with the firewall
when configured.  That's what I said in the first email.  If you have it,
set it up to notify you even of successful attempts.  It's another layer of
security you could possibly use instead of just SSH enabled to the world.
>
> >
> > > Tell me this, how can you troubleshoot a PIX remotely when there is
> > > problem? My employer is certainly not going to fly me out-of-state to
> >fix
> >a
> > > minor problem.
> >See above answer.
> >
> > >Furthermore, can you absolutely guarantee me, in writing,
> > > that the Cisco PIX
> > > can never be compromised?
> >No guarantee but it's claimed to have never been compromised unless the
> >attacker had inside access (physical, vpn, etc) and knew the password and
> >the user was careless enough to not implement ACL.  On the other hand,
read
> >up on security on Linux for yourself.  Redhat was the #1 hacked operating
> >system (even surpassed Windows last I read).
>
> Ever heard of Linux Router Project.  What make you think that I am running
> RedHat?  Ever heard of NetBSD?  It is even more secure than
> PIX

I mentioned vulnerabilites in Redhat as an example not knowing what you were
using.  Regardless, it's a full blown OS that when compromised, someone can
install any service they like.  Please send the link stating it's more
secure than PIX.  I want to see how someone can install a packet sniffer on
a PIX when they know my  password.

>
> >
> > >Another thing, what makes you think that I am
> > > also running other services besides Firewall features on Linux.  If
you
> > >

Re: Performance Comparision between Linux OS Firewall and Cisco PIX 525

2001-03-26 Thread Roger Sohn

There are a few ways to go about this.

1)You can run a stripped down (running minimal and only required services)
Linux box serving only SSH connections and you can use that machine to login
into your PIX (allowing your PIX to only accept connections from this SSH
server) and perform administration.
2) Or...you can just run the PIX and I think you can also run a TACACS+
server with it to authenticate encrypted passwords and logins, or run
encryption on the PIX itself.  I could be mistaken, but I know something
like that would probably work best.

But the thing that people have to understand is, that *no one* can
absolutely guarantee that anything can't be compromised.  It will always be
a 99.999% chance that it will be secure.  It all depends on how the
firewall you choose is set up.  Anything is breakable.

But in my opinion, I would recommend running a hardware firewall solution
such as the PIX or equivalent because the device is specifically made to run
the firewalling processes.  Unlike a Linux/Unix/NT box with a software-based
firewall system such as Checkpoint, etc. a hardware solution does not have
the OS overhead with services that firewalling does not require and also
exploits and patches that you need to constantly be up to date about, issues
that others have already mentioned.  It just comes down to how much money
you want to spend and also what you prefer.  I may prefer the Cisco PIX, but
I have friends that recommend a home-grown Unix box solution.

Just trying to help,
Roger

- Original Message -
From: "Sean Young" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]>;
<[EMAIL PROTECTED]>
Sent: Monday, March 26, 2001 12:42 PM
Subject: Re: Performance Comparision between Linux OS Firewall and Cisco PIX
525


> Allen,
> If SSH service is not open on the outside interface, how do you expect
> to troubleshoot the problem when there is problem with the Firewall?
> Tell me this, how can you troubleshoot a PIX remotely when there is
> problem? My employer is certainly not going to fly me out-of-state to fix
a
> minor problem.  Furthermore, can you absolutely guarantee me, in writing,
> that the Cisco PIX
> can never be compromised?  Another thing, what makes you think that I am
> also running other services besides Firewall features on Linux.  If you
> read my email carefully, you also notice that I only SSH and netfilter
> (aka iptables) on the Firewall.  Your reason is based purely on FUD
> (Fear, Uncertainty and Doubt).
>
> Sean
>
>
> >From: "Allen May" <[EMAIL PROTECTED]>
> >To: "Sean Young" <[EMAIL PROTECTED]>, <[EMAIL PROTECTED]>,
> ><[EMAIL PROTECTED]>, <[EMAIL PROTECTED]>
> >Subject: Re: Performance Comparision between Linux OS Firewall and Cisco
> >PIX 525
> >Date: Mon, 26 Mar 2001 14:29:34 -0600
> >
> >Is the outside interface still open to SSH connections?  If so & it's
> >compromised, Linux is a full blown operating system that, when
compromised,
> >can have ANY program designed for Linux installed.  Can you imagine
> >something like a packet analyzer grabbing all your passwords and sending
> >them out over the net to someone else?  Ewww.  That's my #1 reason for
> >going
> >with something like a PIX.  Just make sure you're IDS is set to notify
even
> >in the event of a SUCCESSFUL connection.  I've seen people who set it up
> >for
> >unsuccessful attempts only.
> >
> >I hope that guy wasn't fired BECAUSE he recommended the Cisco solution.
> >That's totally a matter of point of view on that decision & his wasn't
> >wrong..neither was the Linux choice.  Some situations call for one while
> >others call for the other.
> >
> >Oh and keep a copy of the correctly configured drive with all settings on
> >hand.  A hard drive is much more prone to failure than RAM/ROM just due
to
> >the moving parts involved.
> >
> >Allen
> >- Original Message -
> >From: "Sean Young" <[EMAIL PROTECTED]>
> >To: <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]>;
> ><[EMAIL PROTECTED]>
> >Sent: Sunday, March 25, 2001 3:05 PM
> >Subject: Re: Performance Comparision between Linux OS Firewall and Cisco
> >PIX
> >525
> >
> >
> > > Ken,
> > > Thank you very much for the advice.  This past Friday, my company has
> > > decided to use Linux as our company Firewall.  Furthermore, we've
> >decided
> > > that this Firewall will be running kernel 2.4.2 with only two services
> > > running on it, SSH and netfilter (aka iptables).  I've tested kernel
> > > 2.4.2 in the

Re: Performance Comparision between Linux OS Firewall and Cisco PIX 525

2001-03-26 Thread Sean Young

Sigh...inline comments


>From: "Allen May" <[EMAIL PROTECTED]>
>To: "Sean Young" <[EMAIL PROTECTED]>, <[EMAIL PROTECTED]>, 
><[EMAIL PROTECTED]>, <[EMAIL PROTECTED]>
>Subject: Re: Performance Comparision between Linux OS Firewall and Cisco 
>PIX 525
>Date: Mon, 26 Mar 2001 14:55:57 -0600
>
>Sigh...inline comments:
>
>- Original Message -
>From: "Sean Young" <[EMAIL PROTECTED]>
>To: <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]>;
><[EMAIL PROTECTED]>
>Sent: Monday, March 26, 2001 2:42 PM
>Subject: Re: Performance Comparision between Linux OS Firewall and Cisco 
>PIX
>525
>
>
> > Allen,
> > If SSH service is not open on the outside interface, how do you expect
> > to troubleshoot the problem when there is problem with the Firewall?
>VPN, dial-up modem, terminal server, ACLs, etc.  If they find your password
>or someone knows it & get in, does IDS tell you?

Dial-up modem.  Istn't there a war-dialer that can hack your system.
Another thing, isn't the VPN also has a public interface as well? what
about if your VPN has been compromised?  Ever thought about that?

>
> > Tell me this, how can you troubleshoot a PIX remotely when there is
> > problem? My employer is certainly not going to fly me out-of-state to 
>fix
>a
> > minor problem.
>See above answer.
>
> >Furthermore, can you absolutely guarantee me, in writing,
> > that the Cisco PIX
> > can never be compromised?
>No guarantee but it's claimed to have never been compromised unless the
>attacker had inside access (physical, vpn, etc) and knew the password and
>the user was careless enough to not implement ACL.  On the other hand, read
>up on security on Linux for yourself.  Redhat was the #1 hacked operating
>system (even surpassed Windows last I read).

Ever heard of Linux Router Project.  What make you think that I am running 
RedHat?  Ever heard of NetBSD?  It is even more secure than
PIX

>
> >Another thing, what makes you think that I am
> > also running other services besides Firewall features on Linux.  If you
> > read my email carefully, you also notice that I only SSH and netfilter
> > (aka iptables) on the Firewall
>I read that part.  Thats why I said root or sudo access allows a user to
>install other services.  A Cisco IOS does not.  It's easy to add a new
>service if you have access to do it.  You can even install via ftp.
>
Now how do you plan getting my root password?

> >Your reason is based purely on FUD
> > (Fear, Uncertainty and Doubt).
>It's based on 12 years experience and working as security administrator at
>an ISP where we've had many DSL users complain about their Linux boxes 
>being
>hacked.  Some find out they've been hacked after someone on the internet 
>had
>reports of porn sites running on their compromised system.  Users who
>purchased a PIX and allowed us to manage it have not been hacked even one
>time so far.

That is because they don't know what they are doing.  How do you know
that Cisco PIX doesn't have any security holes.  Did you read about Cisco
IOS devices having security regarding ISN security hole in it?  What
make you think that PIX doesn't have this problem?  Based on what the
vendors tell you?  I would take their word with a grain of salt.
>
>I ain't skeered ;)  I was trying to let you know the vulnerabilities you
>might have and allow you to take precautions.  If you're going to be that
>way about it, you can learn on your own the hard way when you have to fly
>out there to fix a compromised system or failed hard drive.  From your 
>reply
>you either didn't read my reply carefully or didn't even understand it.
>
Every systems has it good and bad.  It is up to us to decide.  If I am
educated about Linux and its capabilities and limitation, I think the
system can be a very effective Firewall.

Just my 2 cents.
Sean
> >
> > Sean
> >
> >
> > >From: "Allen May" <[EMAIL PROTECTED]>
> > >To: "Sean Young" <[EMAIL PROTECTED]>, <[EMAIL PROTECTED]>,
> > ><[EMAIL PROTECTED]>, <[EMAIL PROTECTED]>
> > >Subject: Re: Performance Comparision between Linux OS Firewall and 
>Cisco
> > >PIX 525
> > >Date: Mon, 26 Mar 2001 14:29:34 -0600
> > >
> > >Is the outside interface still open to SSH connections?  If so & it's
> > >compromised, Linux is a full blown operating system that, when
>compromised,
> > >can have ANY program designed for Linux installed.  Can you imagine
> > >something like a packet analyze

Re: Performance Comparision between Linux OS Firewall and Cisco PIX 525

2001-03-26 Thread Allen May

Yeah after reading all the reviews I found that FreeBSD, OpenBSD, and
Slackware were among the most secure & least hacked.

- Original Message -
From: "Brian" <[EMAIL PROTECTED]>
To: "Allen May" <[EMAIL PROTECTED]>
Cc: "Sean Young" <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]>;
<[EMAIL PROTECTED]>; <[EMAIL PROTECTED]>
Sent: Monday, March 26, 2001 3:08 PM
Subject: Re: Performance Comparision between Linux OS Firewall and Cisco PIX
525


> If you at all consider the computer based firewall solution, openbsd is
> worth at least a look.
>
> Bri
>
> On Mon, 26 Mar 2001, Allen May wrote:
>
> > Is the outside interface still open to SSH connections?  If so & it's
> > compromised, Linux is a full blown operating system that, when
compromised,
> > can have ANY program designed for Linux installed.  Can you imagine
> > something like a packet analyzer grabbing all your passwords and sending
> > them out over the net to someone else?  Ewww.  That's my #1 reason for
going
> > with something like a PIX.  Just make sure you're IDS is set to notify
even
> > in the event of a SUCCESSFUL connection.  I've seen people who set it up
for
> > unsuccessful attempts only.
> >
> > I hope that guy wasn't fired BECAUSE he recommended the Cisco solution.
> > That's totally a matter of point of view on that decision & his wasn't
> > wrong..neither was the Linux choice.  Some situations call for one while
> > others call for the other.
> >
> > Oh and keep a copy of the correctly configured drive with all settings
on
> > hand.  A hard drive is much more prone to failure than RAM/ROM just due
to
> > the moving parts involved.
> >
> > Allen
> > ----- Original Message -
> > From: "Sean Young" <[EMAIL PROTECTED]>
> > To: <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]>;
> > <[EMAIL PROTECTED]>
> > Sent: Sunday, March 25, 2001 3:05 PM
> > Subject: Re: Performance Comparision between Linux OS Firewall and Cisco
PIX
> > 525
> >
> >
> > > Ken,
> > > Thank you very much for the advice.  This past Friday, my company has
> > > decided to use Linux as our company Firewall.  Furthermore, we've
decided
> > > that this Firewall will be running kernel 2.4.2 with only two services
> > > running on it, SSH and netfilter (aka iptables).  I've tested kernel
> > > 2.4.2 in the lab and notice it performs better than kernel 2.2.x.
I've
> > also
> > > performed various intrusion detection tests on the box using
> > > Cisco NetSonar, Cybercop, ISS, Axent Netrecon but is unable to break
> > > it.  The linux box is rock-solid.  I am also running portsentry (IDS)
> > > on the Firewall itself.
> > >
> > > Also, we decide to running our squid proxy server on another linux box
> > > to provide transparent caching for our internal users.  As far as VPN
is
> > > concerns, we are going to implement FreeS/WAN on another box.  I think
> > > in the long run, it is going to save the company a lot of money.  We
> > > end up not buying the PIX and web-caching engine from Cisco.  Oh, the
> > > networking guy in our group who recommends Cisco PIX and Cisco web-
> > > caching engine as a solution, he has been fired.  Go figure.
> > >
> > > Regards,
> > > Sean
> > > P.S.  Priscilla, why not implementing TRANSPARENT caching by using
squid
> > > to speed up internet connection for your users?  Squid is free and
very
> > > secure and easy to use.
> > >
> > > >From: [EMAIL PROTECTED]
> > > >Reply-To: [EMAIL PROTECTED]
> > > >To: [EMAIL PROTECTED], "Stuart Brockwell"
<[EMAIL PROTECTED]>
> > > >Subject: Re: Performance Comparision between Linux OS Firewall and
Cisco
> > > >PIX 525
> > > >Date: Sat, 24 Mar 2001 20:02:26 -0800
> > > >
> > > >Sean,
> > > >
> > > >Comments imbedded:
> > > >
> > > >On 23 Mar 2001, at 16:12, Stuart Brockwell wrote:
> > > >
> > > > > Hi Sean,
> > > > >   I am a Linux head my self, and one of our firewalls is in
fact
> > > > >   running
> > > > > on a Linux box.  The only problem with this type of firewall is
that
> > > > > you inherit all of the known bugs that the software has.  Given
that
> > > > > the source code to Linux is widely available, you have a lot of
very
> > > > > talented people out there w

Re: Performance Comparision between Linux OS Firewall and Cisco PIX 525

2001-03-26 Thread Allen May

One more thing I forgot to mention.  If compromised (& it has to be from
inside because outside interface cannot be used to connect), all they can do
to a PIX is mess up your config or add some lines.  However, with TACACS+ &
AAA authentication you can even limit what commands they can execute.  If
the config is messed up, just dial in and copy the config from the tftp
server again.


- Original Message -
From: "Sean Young" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]>;
<[EMAIL PROTECTED]>
Sent: Monday, March 26, 2001 2:42 PM
Subject: Re: Performance Comparision between Linux OS Firewall and Cisco PIX
525


> Allen,
> If SSH service is not open on the outside interface, how do you expect
> to troubleshoot the problem when there is problem with the Firewall?
> Tell me this, how can you troubleshoot a PIX remotely when there is
> problem? My employer is certainly not going to fly me out-of-state to fix
a
> minor problem.  Furthermore, can you absolutely guarantee me, in writing,
> that the Cisco PIX
> can never be compromised?  Another thing, what makes you think that I am
> also running other services besides Firewall features on Linux.  If you
> read my email carefully, you also notice that I only SSH and netfilter
> (aka iptables) on the Firewall.  Your reason is based purely on FUD
> (Fear, Uncertainty and Doubt).
>
> Sean
>
>
> >From: "Allen May" <[EMAIL PROTECTED]>
> >To: "Sean Young" <[EMAIL PROTECTED]>, <[EMAIL PROTECTED]>,
> ><[EMAIL PROTECTED]>, <[EMAIL PROTECTED]>
> >Subject: Re: Performance Comparision between Linux OS Firewall and Cisco
> >PIX 525
> >Date: Mon, 26 Mar 2001 14:29:34 -0600
> >
> >Is the outside interface still open to SSH connections?  If so & it's
> >compromised, Linux is a full blown operating system that, when
compromised,
> >can have ANY program designed for Linux installed.  Can you imagine
> >something like a packet analyzer grabbing all your passwords and sending
> >them out over the net to someone else?  Ewww.  That's my #1 reason for
> >going
> >with something like a PIX.  Just make sure you're IDS is set to notify
even
> >in the event of a SUCCESSFUL connection.  I've seen people who set it up
> >for
> >unsuccessful attempts only.
> >
> >I hope that guy wasn't fired BECAUSE he recommended the Cisco solution.
> >That's totally a matter of point of view on that decision & his wasn't
> >wrong..neither was the Linux choice.  Some situations call for one while
> >others call for the other.
> >
> >Oh and keep a copy of the correctly configured drive with all settings on
> >hand.  A hard drive is much more prone to failure than RAM/ROM just due
to
> >the moving parts involved.
> >
> >Allen
> >- Original Message -
> >From: "Sean Young" <[EMAIL PROTECTED]>
> >To: <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]>;
> ><[EMAIL PROTECTED]>
> >Sent: Sunday, March 25, 2001 3:05 PM
> >Subject: Re: Performance Comparision between Linux OS Firewall and Cisco
> >PIX
> >525
> >
> >
> > > Ken,
> > > Thank you very much for the advice.  This past Friday, my company has
> > > decided to use Linux as our company Firewall.  Furthermore, we've
> >decided
> > > that this Firewall will be running kernel 2.4.2 with only two services
> > > running on it, SSH and netfilter (aka iptables).  I've tested kernel
> > > 2.4.2 in the lab and notice it performs better than kernel 2.2.x.
I've
> >also
> > > performed various intrusion detection tests on the box using
> > > Cisco NetSonar, Cybercop, ISS, Axent Netrecon but is unable to break
> > > it.  The linux box is rock-solid.  I am also running portsentry (IDS)
> > > on the Firewall itself.
> > >
> > > Also, we decide to running our squid proxy server on another linux box
> > > to provide transparent caching for our internal users.  As far as VPN
is
> > > concerns, we are going to implement FreeS/WAN on another box.  I think
> > > in the long run, it is going to save the company a lot of money.  We
> > > end up not buying the PIX and web-caching engine from Cisco.  Oh, the
> > > networking guy in our group who recommends Cisco PIX and Cisco web-
> > > caching engine as a solution, he has been fired.  Go figure.
> > >
> > > Regards,
> > > Sean
> > > P.S.  Priscilla, why not implementing TRANSPARENT caching by using
squid
> > > to spee

Re: Performance Comparision between Linux OS Firewall and Cisco PIX 525

2001-03-26 Thread Allen May

Sigh...inline comments:

- Original Message -
From: "Sean Young" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]>;
<[EMAIL PROTECTED]>
Sent: Monday, March 26, 2001 2:42 PM
Subject: Re: Performance Comparision between Linux OS Firewall and Cisco PIX
525


> Allen,
> If SSH service is not open on the outside interface, how do you expect
> to troubleshoot the problem when there is problem with the Firewall?
VPN, dial-up modem, terminal server, ACLs, etc.  If they find your password
or someone knows it & get in, does IDS tell you?

> Tell me this, how can you troubleshoot a PIX remotely when there is
> problem? My employer is certainly not going to fly me out-of-state to fix
a
> minor problem.
See above answer.

>Furthermore, can you absolutely guarantee me, in writing,
> that the Cisco PIX
> can never be compromised?
No guarantee but it's claimed to have never been compromised unless the
attacker had inside access (physical, vpn, etc) and knew the password and
the user was careless enough to not implement ACL.  On the other hand, read
up on security on Linux for yourself.  Redhat was the #1 hacked operating
system (even surpassed Windows last I read).

>Another thing, what makes you think that I am
> also running other services besides Firewall features on Linux.  If you
> read my email carefully, you also notice that I only SSH and netfilter
> (aka iptables) on the Firewall.
I read that part.  Thats why I said root or sudo access allows a user to
install other services.  A Cisco IOS does not.  It's easy to add a new
service if you have access to do it.  You can even install via ftp.

>Your reason is based purely on FUD
> (Fear, Uncertainty and Doubt).
It's based on 12 years experience and working as security administrator at
an ISP where we've had many DSL users complain about their Linux boxes being
hacked.  Some find out they've been hacked after someone on the internet had
reports of porn sites running on their compromised system.  Users who
purchased a PIX and allowed us to manage it have not been hacked even one
time so far.

I ain't skeered ;)  I was trying to let you know the vulnerabilities you
might have and allow you to take precautions.  If you're going to be that
way about it, you can learn on your own the hard way when you have to fly
out there to fix a compromised system or failed hard drive.  From your reply
you either didn't read my reply carefully or didn't even understand it.

>
> Sean
>
>
> >From: "Allen May" <[EMAIL PROTECTED]>
> >To: "Sean Young" <[EMAIL PROTECTED]>, <[EMAIL PROTECTED]>,
> ><[EMAIL PROTECTED]>, <[EMAIL PROTECTED]>
> >Subject: Re: Performance Comparision between Linux OS Firewall and Cisco
> >PIX 525
> >Date: Mon, 26 Mar 2001 14:29:34 -0600
> >
> >Is the outside interface still open to SSH connections?  If so & it's
> >compromised, Linux is a full blown operating system that, when
compromised,
> >can have ANY program designed for Linux installed.  Can you imagine
> >something like a packet analyzer grabbing all your passwords and sending
> >them out over the net to someone else?  Ewww.  That's my #1 reason for
> >going
> >with something like a PIX.  Just make sure you're IDS is set to notify
even
> >in the event of a SUCCESSFUL connection.  I've seen people who set it up
> >for
> >unsuccessful attempts only.
> >
> >I hope that guy wasn't fired BECAUSE he recommended the Cisco solution.
> >That's totally a matter of point of view on that decision & his wasn't
> >wrong..neither was the Linux choice.  Some situations call for one while
> >others call for the other.
> >
> >Oh and keep a copy of the correctly configured drive with all settings on
> >hand.  A hard drive is much more prone to failure than RAM/ROM just due
to
> >the moving parts involved.
> >
> >Allen
> >- Original Message -
> >From: "Sean Young" <[EMAIL PROTECTED]>
> >To: <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]>;
> ><[EMAIL PROTECTED]>
> >Sent: Sunday, March 25, 2001 3:05 PM
> >Subject: Re: Performance Comparision between Linux OS Firewall and Cisco
> >PIX
> >525
> >
> >
> > > Ken,
> > > Thank you very much for the advice.  This past Friday, my company has
> > > decided to use Linux as our company Firewall.  Furthermore, we've
> >decided
> > > that this Firewall will be running kernel 2.4.2 with only two services
> > > running on it, SSH and netfilter (aka iptables).  I've tested kernel
> >

Re: Performance Comparision between Linux OS Firewall and Cisco PIX 525

2001-03-26 Thread Sean Young

Allen,
If SSH service is not open on the outside interface, how do you expect
to troubleshoot the problem when there is problem with the Firewall?
Tell me this, how can you troubleshoot a PIX remotely when there is
problem? My employer is certainly not going to fly me out-of-state to fix a 
minor problem.  Furthermore, can you absolutely guarantee me, in writing, 
that the Cisco PIX
can never be compromised?  Another thing, what makes you think that I am
also running other services besides Firewall features on Linux.  If you
read my email carefully, you also notice that I only SSH and netfilter
(aka iptables) on the Firewall.  Your reason is based purely on FUD
(Fear, Uncertainty and Doubt).

Sean


>From: "Allen May" <[EMAIL PROTECTED]>
>To: "Sean Young" <[EMAIL PROTECTED]>, <[EMAIL PROTECTED]>, 
><[EMAIL PROTECTED]>, <[EMAIL PROTECTED]>
>Subject: Re: Performance Comparision between Linux OS Firewall and Cisco 
>PIX 525
>Date: Mon, 26 Mar 2001 14:29:34 -0600
>
>Is the outside interface still open to SSH connections?  If so & it's
>compromised, Linux is a full blown operating system that, when compromised,
>can have ANY program designed for Linux installed.  Can you imagine
>something like a packet analyzer grabbing all your passwords and sending
>them out over the net to someone else?  Ewww.  That's my #1 reason for 
>going
>with something like a PIX.  Just make sure you're IDS is set to notify even
>in the event of a SUCCESSFUL connection.  I've seen people who set it up 
>for
>unsuccessful attempts only.
>
>I hope that guy wasn't fired BECAUSE he recommended the Cisco solution.
>That's totally a matter of point of view on that decision & his wasn't
>wrong..neither was the Linux choice.  Some situations call for one while
>others call for the other.
>
>Oh and keep a copy of the correctly configured drive with all settings on
>hand.  A hard drive is much more prone to failure than RAM/ROM just due to
>the moving parts involved.
>
>Allen
>- Original Message -
>From: "Sean Young" <[EMAIL PROTECTED]>
>To: <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]>;
><[EMAIL PROTECTED]>
>Sent: Sunday, March 25, 2001 3:05 PM
>Subject: Re: Performance Comparision between Linux OS Firewall and Cisco 
>PIX
>525
>
>
> > Ken,
> > Thank you very much for the advice.  This past Friday, my company has
> > decided to use Linux as our company Firewall.  Furthermore, we've 
>decided
> > that this Firewall will be running kernel 2.4.2 with only two services
> > running on it, SSH and netfilter (aka iptables).  I've tested kernel
> > 2.4.2 in the lab and notice it performs better than kernel 2.2.x.  I've
>also
> > performed various intrusion detection tests on the box using
> > Cisco NetSonar, Cybercop, ISS, Axent Netrecon but is unable to break
> > it.  The linux box is rock-solid.  I am also running portsentry (IDS)
> > on the Firewall itself.
> >
> > Also, we decide to running our squid proxy server on another linux box
> > to provide transparent caching for our internal users.  As far as VPN is
> > concerns, we are going to implement FreeS/WAN on another box.  I think
> > in the long run, it is going to save the company a lot of money.  We
> > end up not buying the PIX and web-caching engine from Cisco.  Oh, the
> > networking guy in our group who recommends Cisco PIX and Cisco web-
> > caching engine as a solution, he has been fired.  Go figure.
> >
> > Regards,
> > Sean
> > P.S.  Priscilla, why not implementing TRANSPARENT caching by using squid
> > to speed up internet connection for your users?  Squid is free and very
> > secure and easy to use.
> >
> > >From: [EMAIL PROTECTED]
> > >Reply-To: [EMAIL PROTECTED]
> > >To: [EMAIL PROTECTED], "Stuart Brockwell" 
><[EMAIL PROTECTED]>
> > >Subject: Re: Performance Comparision between Linux OS Firewall and 
>Cisco
> > >PIX 525
> > >Date: Sat, 24 Mar 2001 20:02:26 -0800
> > >
> > >Sean,
> > >
> > >Comments imbedded:
> > >
> > >On 23 Mar 2001, at 16:12, Stuart Brockwell wrote:
> > >
> > > > Hi Sean,
> > > >   I am a Linux head my self, and one of our firewalls is in fact
> > > >   running
> > > > on a Linux box.  The only problem with this type of firewall is that
> > > > you inherit all of the known bugs that the software has.  Given that
> > > > the source code to Linux is widely available, you have a lot of very
> > > > talented peopl

Re: Performance Comparision between Linux OS Firewall and Cisco PIX 525

2001-03-26 Thread Allen May

Is the outside interface still open to SSH connections?  If so & it's
compromised, Linux is a full blown operating system that, when compromised,
can have ANY program designed for Linux installed.  Can you imagine
something like a packet analyzer grabbing all your passwords and sending
them out over the net to someone else?  Ewww.  That's my #1 reason for going
with something like a PIX.  Just make sure you're IDS is set to notify even
in the event of a SUCCESSFUL connection.  I've seen people who set it up for
unsuccessful attempts only.

I hope that guy wasn't fired BECAUSE he recommended the Cisco solution.
That's totally a matter of point of view on that decision & his wasn't
wrong..neither was the Linux choice.  Some situations call for one while
others call for the other.

Oh and keep a copy of the correctly configured drive with all settings on
hand.  A hard drive is much more prone to failure than RAM/ROM just due to
the moving parts involved.

Allen
- Original Message -
From: "Sean Young" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]>;
<[EMAIL PROTECTED]>
Sent: Sunday, March 25, 2001 3:05 PM
Subject: Re: Performance Comparision between Linux OS Firewall and Cisco PIX
525


> Ken,
> Thank you very much for the advice.  This past Friday, my company has
> decided to use Linux as our company Firewall.  Furthermore, we've decided
> that this Firewall will be running kernel 2.4.2 with only two services
> running on it, SSH and netfilter (aka iptables).  I've tested kernel
> 2.4.2 in the lab and notice it performs better than kernel 2.2.x.  I've
also
> performed various intrusion detection tests on the box using
> Cisco NetSonar, Cybercop, ISS, Axent Netrecon but is unable to break
> it.  The linux box is rock-solid.  I am also running portsentry (IDS)
> on the Firewall itself.
>
> Also, we decide to running our squid proxy server on another linux box
> to provide transparent caching for our internal users.  As far as VPN is
> concerns, we are going to implement FreeS/WAN on another box.  I think
> in the long run, it is going to save the company a lot of money.  We
> end up not buying the PIX and web-caching engine from Cisco.  Oh, the
> networking guy in our group who recommends Cisco PIX and Cisco web-
> caching engine as a solution, he has been fired.  Go figure.
>
> Regards,
> Sean
> P.S.  Priscilla, why not implementing TRANSPARENT caching by using squid
> to speed up internet connection for your users?  Squid is free and very
> secure and easy to use.
>
> >From: [EMAIL PROTECTED]
> >Reply-To: [EMAIL PROTECTED]
> >To: [EMAIL PROTECTED], "Stuart Brockwell" <[EMAIL PROTECTED]>
> >Subject: Re: Performance Comparision between Linux OS Firewall and Cisco
> >PIX 525
> >Date: Sat, 24 Mar 2001 20:02:26 -0800
> >
> >Sean,
> >
> >Comments imbedded:
> >
> >On 23 Mar 2001, at 16:12, Stuart Brockwell wrote:
> >
> > > Hi Sean,
> > >   I am a Linux head my self, and one of our firewalls is in fact
> > >   running
> > > on a Linux box.  The only problem with this type of firewall is that
> > > you inherit all of the known bugs that the software has.  Given that
> > > the source code to Linux is widely available, you have a lot of very
> > > talented people out there who know these holes and are able to exploit
> > > them very easily.
> >
> >It also means that there are a lot of talented people who are looking
> >at the code to make sure that any holes are patched.  In fact, when
> >new exploits are found, Linux is usually the fastest platform to have
> >a patch available.  Compare this to having to wait weeks for vendor
> >patches or having to prove to a vendor that a problem exists.
> >
> >Also, a service can only be exploited if it is running.  A properly
> >configured firewall doesn't run unecessary services, this makes it
> >very difficult to exploit.  Essentially, it would come down to trying to
> >DoS it or running a password guessing program against it to get
> >remote access.
> >
> >
> >If you
> > > maintain your own Linux firewall, you will need to continuously look
> > > for the latest bug fixes to install on your Linux box to address the
> > > latest round of holes that have been released.
> >
> >If the Linux firewall is properly setup, the only services running on it
> >are ipchains and SSH.  This means that you have to be aware of 2
> >services.  While there could always be a local exploit, if only
> >trusted admins have access, the trouble with keeping up patches
> >is mini

RE: Performance Comparision between Linux OS Firewall and Cisco PIX 525

2001-03-26 Thread Rik Guyler

But that just proves my point - you *can't* setup DNS server on a PIX, so it
becomes a non-issue with a PIX.  Besides, I think everybody I know has done
something that they know not to be the best thing but do it because it is a
quick and easy solution.

Don't get me wrong - I like Linux.  The real problem I see with network
security is not so much technology, but with human nature.  The PIX by
design removes many of the holes that human nature can drag us into.  A
simple case of less is more.

Rik

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]
Sent: Saturday, March 24, 2001 11:02 PM
To: [EMAIL PROTECTED]; Rik
Subject: Re: Performance Comparision between Linux OS Firewall and Cisco
PIX 525


While I agree that for an enterprise I would choose PIX over Linux 
for firewall purposes, if your friends configured a Linux firewall and 
ran other services on it, they may be good Linux admins but they 
don't know much about security. 

There is _no_ good reason to run unnecessary services on a 
firewall. Period.  Wintel hardware is too inexpensive to use any 
argument that a box serving as a firewall needs to run DNS, FTP, 
SMTP, etc.

The only service other than ipchains that a Linux firewall should run 
is SSH.  This gives you all the remote administration of the box 
you need and makes the box very secure.  

-Kent


On 23 Mar 2001, at 9:24, Rik wrote:

> I have seen way too many Linux firewalls hacked as a result of
> mis-administration.  Now, I'm not assuming anything about your
> abilities as the last confirmed hack that I was notified about was a
> Linux FW setup by 2 guys that I know to be excellent Linux admins. 
> The problem is the inherent nature of the beast.  A PIX is totally
> secure right out of the box.  The last Linux hack I speak of was
> hacked based on an exploit within BIND and had nothing to do with the
> FW policy.
> 
> I also find the PIX to be MUCH easier to configure and setup.  I can
> do in only a few lines of code what could possibly take pages and
> pages of code in Linux.  When talking about firewalls, simplicity is a
> critically important concern.  One compromise could easily remove any
> upfront cost advantage Linux has over Cisco.  Also, you don't have to
> be concerned with shutting down unused services on a PIX as you would
> on Linux.
> 
> Go with the PIX.  It was designed from the ground up to do just what
> it does: protect your network.  Cisco claims that a properly
> configured PIX has never been compromised.  I believe them.
> 
> Rik
> 
> 
> ""Sean Young"" <[EMAIL PROTECTED]> wrote in message
> [EMAIL PROTECTED]">news:[EMAIL PROTECTED]...
> > Hi Everyone,
> >
> > My company is putting me in charge in implementing a Firewall for
> > our company.  One guy in my networking group is recommending PIX
> > Firewall. Furthermore, he also recommends a Cisco Web-caching
> > engine.  His reason is that not only Cisco is good Firewall but it
> > also provides VPN connectivity to our remote sites.  Myself, on the
> > other hand, would like to implement Linux-based OS firewall along
> > with FreeS/WAN VPN features set.  My reason is that a linux firewall
> > can provide everything a Cisco PIX does and even more.  In term of
> > hardware, the linux Firewall/ VPN/IPSec box will be running a
> > dual-processor (800MHz) with 1GB of RAM. I just feel that I can get
> > a lot more for the amount that we are going to spend with linux than
> > with Cisco PIX.  I also feel that I tweak the source code on the
> > LINUX kernel to increase the performance and security. Also, instead
> > of purchasing the Cisco web-caching engine, I am thinking of
> > building another linux box that will be running squid (web-caching)
> > server.  Don't get me wrong, I think Cisco has a lot of good
> > products in the area of routing; however, I just don't think it is
> > necessary to throw away money at Cisco when I know that Linux or BSD
> > can do the same job that PIX and Cisco web-caching engine do but for
> > much less and also I can control the source code.  Has anyone has
> > experiences with both the Linux/BSD, Squid and Cisco PIX, Cisco
> > web-caching engine so that you can give advice on what I should do. 
> > I am open to your suggestions.
> >
> > Many thanks.
> > Sean
> > _
> > Get your FREE download of MSN Explorer at http://explorer.msn.com
> >
> > _
> > FAQ, list archives, and subscription info:
> http://www.groupstudy.com/list/cisco.html
> > Report misconduct and Nondisclosure violations to
> > [EMAIL PROTECTED

Re: Performance Comparision between Linux OS Firewall and Cisco PIX 525

2001-03-25 Thread KY

Sean,

Have you guys compared FreeBSD with Linux for the firewall?

Thanks

KY
""Sean Young"" <[EMAIL PROTECTED]> wrote in message
[EMAIL PROTECTED]">news:[EMAIL PROTECTED]...
> Ken,
> Thank you very much for the advice.  This past Friday, my company has
> decided to use Linux as our company Firewall.  Furthermore, we've decided
> that this Firewall will be running kernel 2.4.2 with only two services
> running on it, SSH and netfilter (aka iptables).  I've tested kernel
> 2.4.2 in the lab and notice it performs better than kernel 2.2.x.  I've
also
> performed various intrusion detection tests on the box using
> Cisco NetSonar, Cybercop, ISS, Axent Netrecon but is unable to break
> it.  The linux box is rock-solid.  I am also running portsentry (IDS)
> on the Firewall itself.
>
> Also, we decide to running our squid proxy server on another linux box
> to provide transparent caching for our internal users.  As far as VPN is
> concerns, we are going to implement FreeS/WAN on another box.  I think
> in the long run, it is going to save the company a lot of money.  We
> end up not buying the PIX and web-caching engine from Cisco.  Oh, the
> networking guy in our group who recommends Cisco PIX and Cisco web-
> caching engine as a solution, he has been fired.  Go figure.
>
> Regards,
> Sean
> P.S.  Priscilla, why not implementing TRANSPARENT caching by using squid
> to speed up internet connection for your users?  Squid is free and very
> secure and easy to use.
>
> >From: [EMAIL PROTECTED]
> >Reply-To: [EMAIL PROTECTED]
> >To: [EMAIL PROTECTED], "Stuart Brockwell" <[EMAIL PROTECTED]>
> >Subject: Re: Performance Comparision between Linux OS Firewall and Cisco
> >PIX 525
> >Date: Sat, 24 Mar 2001 20:02:26 -0800
> >
> >Sean,
> >
> >Comments imbedded:
> >
> >On 23 Mar 2001, at 16:12, Stuart Brockwell wrote:
> >
> > > Hi Sean,
> > >   I am a Linux head my self, and one of our firewalls is in fact
> > >   running
> > > on a Linux box.  The only problem with this type of firewall is that
> > > you inherit all of the known bugs that the software has.  Given that
> > > the source code to Linux is widely available, you have a lot of very
> > > talented people out there who know these holes and are able to exploit
> > > them very easily.
> >
> >It also means that there are a lot of talented people who are looking
> >at the code to make sure that any holes are patched.  In fact, when
> >new exploits are found, Linux is usually the fastest platform to have
> >a patch available.  Compare this to having to wait weeks for vendor
> >patches or having to prove to a vendor that a problem exists.
> >
> >Also, a service can only be exploited if it is running.  A properly
> >configured firewall doesn't run unecessary services, this makes it
> >very difficult to exploit.  Essentially, it would come down to trying to
> >DoS it or running a password guessing program against it to get
> >remote access.
> >
> >
> >If you
> > > maintain your own Linux firewall, you will need to continuously look
> > > for the latest bug fixes to install on your Linux box to address the
> > > latest round of holes that have been released.
> >
> >If the Linux firewall is properly setup, the only services running on it
> >are ipchains and SSH.  This means that you have to be aware of 2
> >services.  While there could always be a local exploit, if only
> >trusted admins have access, the trouble with keeping up patches
> >is minimal.  It is certainly no more trouble than keeping up with
> >bugs on a vendor platform.
> >
> > >
> > > Cisco and companies such as Watch Guard closely guard their source
> > > code, often you can elect to take on a maintenance contract with the
> > > firewall where you recieve all the latest fixes for a 12 month period
> > > (this is what we did).  As this is their bread and butter, they spend
> > > a lot of time looking for holes and fixes to known bugs.
> > >
> >
> >While true, this doesn't mean that their code will have fewer bugs
> >or that the bugs will be patched quicker.  There is a very large
> >support community for Linux that is very technical.  Most bugs are
> >patched in a matter of days, sometimes hours.
> >
> >
> > > the main plus for each of
> > > the commercial packages is that there is large support base, where as
> > > skilled Linux admin staff who can lock down a firewall are very few
> > > and far between.

Re: Performance Comparision between Linux OS Firewall and Cisco PIX 525

2001-03-25 Thread Sean Young

Ken,
Thank you very much for the advice.  This past Friday, my company has
decided to use Linux as our company Firewall.  Furthermore, we've decided
that this Firewall will be running kernel 2.4.2 with only two services
running on it, SSH and netfilter (aka iptables).  I've tested kernel
2.4.2 in the lab and notice it performs better than kernel 2.2.x.  I've also 
performed various intrusion detection tests on the box using
Cisco NetSonar, Cybercop, ISS, Axent Netrecon but is unable to break
it.  The linux box is rock-solid.  I am also running portsentry (IDS)
on the Firewall itself.

Also, we decide to running our squid proxy server on another linux box
to provide transparent caching for our internal users.  As far as VPN is
concerns, we are going to implement FreeS/WAN on another box.  I think
in the long run, it is going to save the company a lot of money.  We
end up not buying the PIX and web-caching engine from Cisco.  Oh, the
networking guy in our group who recommends Cisco PIX and Cisco web-
caching engine as a solution, he has been fired.  Go figure.

Regards,
Sean
P.S.  Priscilla, why not implementing TRANSPARENT caching by using squid
to speed up internet connection for your users?  Squid is free and very
secure and easy to use.

>From: [EMAIL PROTECTED]
>Reply-To: [EMAIL PROTECTED]
>To: [EMAIL PROTECTED], "Stuart Brockwell" <[EMAIL PROTECTED]>
>Subject: Re: Performance Comparision between Linux OS Firewall and Cisco 
>PIX 525
>Date: Sat, 24 Mar 2001 20:02:26 -0800
>
>Sean,
>
>Comments imbedded:
>
>On 23 Mar 2001, at 16:12, Stuart Brockwell wrote:
>
> > Hi Sean,
> >   I am a Linux head my self, and one of our firewalls is in fact
> >   running
> > on a Linux box.  The only problem with this type of firewall is that
> > you inherit all of the known bugs that the software has.  Given that
> > the source code to Linux is widely available, you have a lot of very
> > talented people out there who know these holes and are able to exploit
> > them very easily.
>
>It also means that there are a lot of talented people who are looking
>at the code to make sure that any holes are patched.  In fact, when
>new exploits are found, Linux is usually the fastest platform to have
>a patch available.  Compare this to having to wait weeks for vendor
>patches or having to prove to a vendor that a problem exists.
>
>Also, a service can only be exploited if it is running.  A properly
>configured firewall doesn't run unecessary services, this makes it
>very difficult to exploit.  Essentially, it would come down to trying to
>DoS it or running a password guessing program against it to get
>remote access.
>
>
>If you
> > maintain your own Linux firewall, you will need to continuously look
> > for the latest bug fixes to install on your Linux box to address the
> > latest round of holes that have been released.
>
>If the Linux firewall is properly setup, the only services running on it
>are ipchains and SSH.  This means that you have to be aware of 2
>services.  While there could always be a local exploit, if only
>trusted admins have access, the trouble with keeping up patches
>is minimal.  It is certainly no more trouble than keeping up with
>bugs on a vendor platform.
>
> >
> > Cisco and companies such as Watch Guard closely guard their source
> > code, often you can elect to take on a maintenance contract with the
> > firewall where you recieve all the latest fixes for a 12 month period
> > (this is what we did).  As this is their bread and butter, they spend
> > a lot of time looking for holes and fixes to known bugs.
> >
>
>While true, this doesn't mean that their code will have fewer bugs
>or that the bugs will be patched quicker.  There is a very large
>support community for Linux that is very technical.  Most bugs are
>patched in a matter of days, sometimes hours.
>
>
> > the main plus for each of
> > the commercial packages is that there is large support base, where as
> > skilled Linux admin staff who can lock down a firewall are very few
> > and far between.
>
>This is simply not true.  There is a very large community of Linux
>developers and admins, and most of them are very knowledgable.
>There are good mailing lists and _plenty_ of good Linux
>security/firewall books, articles, web sites, etc. available.
>
>Locking down a Linux box is not rocket science.  That is FUD that
>is propagated by vendors who want to sell product.  It's not hard to
>configure a Linux box to be secure, the difficulty comes in running
>lots of services and providing access to users.  If you have a box
>that runs web, ftp, smtp, nfs, etc., then it becomes much harder to
>secure, but n

Re: Performance Comparision between Linux OS Firewall and Cisco PIX 525

2001-03-24 Thread Priscilla Oppenheimer

Thanks for the advice, Kent.

I think we are doing exactly what you say, though I'll check. The 
administrator bought an inexpensive Wintel box and I believe he is running 
just the Linux firewall on it and no other services.

Performance has been surprisingly good, especially considering that about 
700 users access the Web consistently. We no longer use a proxy, so all the 
traffic really does go out to the Web. Mostly it's traffic to simple Web 
pages such as www.blackboard.com, but the students also download videos, 
games, etc., even if we tell them not to, of course. (We block Napster. &;-)

Priscilla

At 08:02 PM 3/24/01, you wrote:
>Priscilla,
>
>You can get a PIX 506 for about $1,400 from www.provantage.com.
>This may still be a little pricey for a school though.
>
>I wouldn't worry too much about someone breaking into a properly
>configured Linux firewall.  First, if you have a box acting as a
>firewall, it shouldn't be running _any_ unecessary services, i.e.
>DNS, SMTP, FTP, etc.  When I configure Unix/Linux to act as a
>firewall, the only services I leave running is SSH and the firewall
>software itself. Period.  All other services are disabled and removed.
>
>There is no good reason to run any other traditional service on the
>firewall.  You can pick up wintel boxes that will run fine for a couple
>of hundred bucks.  If you need additional services they should be
>run on different boxes, not the firewall.
>
>  Pick a good password for use with SSH, something with several
>special characters, or use S/Key and you should be fine.  Course,
>that doesn't mean someone couldn't get _through_ the firewall, only
>that the firewall itself is secured.
>
>Regards,
>Kent
>
>On 23 Mar 2001, at 9:37, Priscilla Oppenheimer wrote:
>
> > How about if the customer is strapped for money. I work at a school.
> > Luckily our students haven't gotten sophisticated enough to break into
> > the Linux firewall but I don't the think that day is too far away.
> > Some of them are very smart and they are learning Linux and networking
> > in their classes. But PIX is too expensive, I think??
> >
> > Priscilla
> >
> > At 09:24 AM 3/23/01, Rik wrote:
> > >I have seen way too many Linux firewalls hacked as a result of
> > >mis-administration.  Now, I'm not assuming anything about your
> > >abilities as the last confirmed hack that I was notified about was a
> > >Linux FW setup by 2 guys that I know to be excellent Linux admins.
> > >The problem is the inherent nature of the beast.  A PIX is totally
> > >secure right out of the box.  The last Linux hack I speak of was
> > >hacked based on an exploit within BIND and had nothing to do with the
> > >FW policy.
> > >
> > >I also find the PIX to be MUCH easier to configure and setup.  I can
> > >do in only a few lines of code what could possibly take pages and
> > >pages of code in Linux.  When talking about firewalls, simplicity is
> > >a critically important concern.  One compromise could easily remove
> > >any upfront cost advantage Linux has over Cisco.  Also, you don't
> > >have to be concerned with shutting down unused services on a PIX as
> > >you would on Linux.
> > >
> > >Go with the PIX.  It was designed from the ground up to do just what
> > >it does: protect your network.  Cisco claims that a properly
> > >configured PIX has never been compromised.  I believe them.
> > >
> > >Rik
> > >
> > >
> > >""Sean Young"" <[EMAIL PROTECTED]> wrote in message
> > >[EMAIL PROTECTED]">news:[EMAIL PROTECTED]...
> > > > Hi Everyone,
> > > >
> > > > My company is putting me in charge in implementing a Firewall for
> > > > our company.  One guy in my networking group is recommending PIX
> > > > Firewall. Furthermore, he also recommends a Cisco Web-caching
> > > > engine.  His reason is that not only Cisco is good Firewall but it
> > > > also provides VPN connectivity to our remote sites.  Myself, on
> > > > the other hand, would like to implement Linux-based OS firewall
> > > > along with FreeS/WAN VPN features set.  My reason is that a linux
> > > > firewall can provide everything a Cisco PIX does and even more.
> > > > In term of hardware, the linux Firewall/ VPN/IPSec box will be
> > > > running a dual-processor (800MHz) with 1GB of RAM. I just feel
> > > > that I can get a lot more for the amount that we are going to
> > > > spend with linux than with Cisco PIX.  I also feel that I tweak
> > > > the source code on the LINUX kernel to increase the performance
> > > > and security. Also, instead of purchasing the Cisco web-caching
> > > > engine, I am thinking of building another linux box that will be
> > > > running squid (web-caching) server.  Don't get me wrong, I think
> > > > Cisco has a lot of good products in the area of routing; however,
> > > > I just don't think it is necessary to throw away money at Cisco
> > > > when I know that Linux or BSD can do the same job that PIX and
> > > > Cisco web-caching engine do but for much less and also I can
> > > > control the source cod

Re: Performance Comparision between Linux OS Firewall and Cisco PIX 525

2001-03-24 Thread kent . hundley

Sean,

Comments imbedded:

On 23 Mar 2001, at 16:12, Stuart Brockwell wrote:

> Hi Sean,
>   I am a Linux head my self, and one of our firewalls is in fact
>   running
> on a Linux box.  The only problem with this type of firewall is that
> you inherit all of the known bugs that the software has.  Given that
> the source code to Linux is widely available, you have a lot of very
> talented people out there who know these holes and are able to exploit
> them very easily.

It also means that there are a lot of talented people who are looking 
at the code to make sure that any holes are patched.  In fact, when 
new exploits are found, Linux is usually the fastest platform to have 
a patch available.  Compare this to having to wait weeks for vendor 
patches or having to prove to a vendor that a problem exists.

Also, a service can only be exploited if it is running.  A properly 
configured firewall doesn't run unecessary services, this makes it 
very difficult to exploit.  Essentially, it would come down to trying to 
DoS it or running a password guessing program against it to get 
remote access.


   If you
> maintain your own Linux firewall, you will need to continuously look
> for the latest bug fixes to install on your Linux box to address the
> latest round of holes that have been released.

If the Linux firewall is properly setup, the only services running on it 
are ipchains and SSH.  This means that you have to be aware of 2 
services.  While there could always be a local exploit, if only 
trusted admins have access, the trouble with keeping up patches 
is minimal.  It is certainly no more trouble than keeping up with 
bugs on a vendor platform.

> 
> Cisco and companies such as Watch Guard closely guard their source
> code, often you can elect to take on a maintenance contract with the
> firewall where you recieve all the latest fixes for a 12 month period
> (this is what we did).  As this is their bread and butter, they spend
> a lot of time looking for holes and fixes to known bugs.
> 

While true, this doesn't mean that their code will have fewer bugs 
or that the bugs will be patched quicker.  There is a very large 
support community for Linux that is very technical.  Most bugs are 
patched in a matter of days, sometimes hours.


> the main plus for each of
> the commercial packages is that there is large support base, where as
> skilled Linux admin staff who can lock down a firewall are very few
> and far between.

This is simply not true.  There is a very large community of Linux 
developers and admins, and most of them are very knowledgable.  
There are good mailing lists and _plenty_ of good Linux 
security/firewall books, articles, web sites, etc. available.  

Locking down a Linux box is not rocket science.  That is FUD that 
is propagated by vendors who want to sell product.  It's not hard to 
configure a Linux box to be secure, the difficulty comes in running 
lots of services and providing access to users.  If you have a box 
that runs web, ftp, smtp, nfs, etc., then it becomes much harder to 
secure, but none of these services should be running on a firewall.

The bottom line is that there are several good commercial firewalls, 
but that doesn't mean that a Linux box cannot serve as a good, low-
end alternative.  Especially if cost is one of the main decision 
factors.

-Kent

  


_
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



Re: Performance Comparision between Linux OS Firewall and Cisco PIX 525

2001-03-24 Thread kent . hundley

While I agree that for an enterprise I would choose PIX over Linux 
for firewall purposes, if your friends configured a Linux firewall and 
ran other services on it, they may be good Linux admins but they 
don't know much about security. 

There is _no_ good reason to run unnecessary services on a 
firewall. Period.  Wintel hardware is too inexpensive to use any 
argument that a box serving as a firewall needs to run DNS, FTP, 
SMTP, etc.

The only service other than ipchains that a Linux firewall should run 
is SSH.  This gives you all the remote administration of the box 
you need and makes the box very secure.  

-Kent


On 23 Mar 2001, at 9:24, Rik wrote:

> I have seen way too many Linux firewalls hacked as a result of
> mis-administration.  Now, I'm not assuming anything about your
> abilities as the last confirmed hack that I was notified about was a
> Linux FW setup by 2 guys that I know to be excellent Linux admins. 
> The problem is the inherent nature of the beast.  A PIX is totally
> secure right out of the box.  The last Linux hack I speak of was
> hacked based on an exploit within BIND and had nothing to do with the
> FW policy.
> 
> I also find the PIX to be MUCH easier to configure and setup.  I can
> do in only a few lines of code what could possibly take pages and
> pages of code in Linux.  When talking about firewalls, simplicity is a
> critically important concern.  One compromise could easily remove any
> upfront cost advantage Linux has over Cisco.  Also, you don't have to
> be concerned with shutting down unused services on a PIX as you would
> on Linux.
> 
> Go with the PIX.  It was designed from the ground up to do just what
> it does: protect your network.  Cisco claims that a properly
> configured PIX has never been compromised.  I believe them.
> 
> Rik
> 
> 
> ""Sean Young"" <[EMAIL PROTECTED]> wrote in message
> [EMAIL PROTECTED]">news:[EMAIL PROTECTED]...
> > Hi Everyone,
> >
> > My company is putting me in charge in implementing a Firewall for
> > our company.  One guy in my networking group is recommending PIX
> > Firewall. Furthermore, he also recommends a Cisco Web-caching
> > engine.  His reason is that not only Cisco is good Firewall but it
> > also provides VPN connectivity to our remote sites.  Myself, on the
> > other hand, would like to implement Linux-based OS firewall along
> > with FreeS/WAN VPN features set.  My reason is that a linux firewall
> > can provide everything a Cisco PIX does and even more.  In term of
> > hardware, the linux Firewall/ VPN/IPSec box will be running a
> > dual-processor (800MHz) with 1GB of RAM. I just feel that I can get
> > a lot more for the amount that we are going to spend with linux than
> > with Cisco PIX.  I also feel that I tweak the source code on the
> > LINUX kernel to increase the performance and security. Also, instead
> > of purchasing the Cisco web-caching engine, I am thinking of
> > building another linux box that will be running squid (web-caching)
> > server.  Don't get me wrong, I think Cisco has a lot of good
> > products in the area of routing; however, I just don't think it is
> > necessary to throw away money at Cisco when I know that Linux or BSD
> > can do the same job that PIX and Cisco web-caching engine do but for
> > much less and also I can control the source code.  Has anyone has
> > experiences with both the Linux/BSD, Squid and Cisco PIX, Cisco
> > web-caching engine so that you can give advice on what I should do. 
> > I am open to your suggestions.
> >
> > Many thanks.
> > Sean
> > _
> > Get your FREE download of MSN Explorer at http://explorer.msn.com
> >
> > _
> > FAQ, list archives, and subscription info:
> http://www.groupstudy.com/list/cisco.html
> > Report misconduct and Nondisclosure violations to
> > [EMAIL PROTECTED]
> >
> 
> 
> _
> FAQ, list archives, and subscription info:
> http://www.groupstudy.com/list/cisco.html Report misconduct and
> Nondisclosure violations to [EMAIL PROTECTED]


_
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



Re: Performance Comparision between Linux OS Firewall and Cisco PIX 525

2001-03-24 Thread kent . hundley

Priscilla,

You can get a PIX 506 for about $1,400 from www.provantage.com. 
This may still be a little pricey for a school though. 

I wouldn't worry too much about someone breaking into a properly 
configured Linux firewall.  First, if you have a box acting as a 
firewall, it shouldn't be running _any_ unecessary services, i.e. 
DNS, SMTP, FTP, etc.  When I configure Unix/Linux to act as a 
firewall, the only services I leave running is SSH and the firewall 
software itself. Period.  All other services are disabled and removed.

There is no good reason to run any other traditional service on the 
firewall.  You can pick up wintel boxes that will run fine for a couple 
of hundred bucks.  If you need additional services they should be 
run on different boxes, not the firewall. 

 Pick a good password for use with SSH, something with several 
special characters, or use S/Key and you should be fine.  Course, 
that doesn't mean someone couldn't get _through_ the firewall, only 
that the firewall itself is secured.

Regards,
Kent

On 23 Mar 2001, at 9:37, Priscilla Oppenheimer wrote:

> How about if the customer is strapped for money. I work at a school.
> Luckily our students haven't gotten sophisticated enough to break into
> the Linux firewall but I don't the think that day is too far away.
> Some of them are very smart and they are learning Linux and networking
> in their classes. But PIX is too expensive, I think??
> 
> Priscilla
> 
> At 09:24 AM 3/23/01, Rik wrote:
> >I have seen way too many Linux firewalls hacked as a result of
> >mis-administration.  Now, I'm not assuming anything about your
> >abilities as the last confirmed hack that I was notified about was a
> >Linux FW setup by 2 guys that I know to be excellent Linux admins. 
> >The problem is the inherent nature of the beast.  A PIX is totally
> >secure right out of the box.  The last Linux hack I speak of was
> >hacked based on an exploit within BIND and had nothing to do with the
> >FW policy.
> >
> >I also find the PIX to be MUCH easier to configure and setup.  I can
> >do in only a few lines of code what could possibly take pages and
> >pages of code in Linux.  When talking about firewalls, simplicity is
> >a critically important concern.  One compromise could easily remove
> >any upfront cost advantage Linux has over Cisco.  Also, you don't
> >have to be concerned with shutting down unused services on a PIX as
> >you would on Linux.
> >
> >Go with the PIX.  It was designed from the ground up to do just what
> >it does: protect your network.  Cisco claims that a properly
> >configured PIX has never been compromised.  I believe them.
> >
> >Rik
> >
> >
> >""Sean Young"" <[EMAIL PROTECTED]> wrote in message
> >[EMAIL PROTECTED]">news:[EMAIL PROTECTED]...
> > > Hi Everyone,
> > >
> > > My company is putting me in charge in implementing a Firewall for
> > > our company.  One guy in my networking group is recommending PIX
> > > Firewall. Furthermore, he also recommends a Cisco Web-caching
> > > engine.  His reason is that not only Cisco is good Firewall but it
> > > also provides VPN connectivity to our remote sites.  Myself, on
> > > the other hand, would like to implement Linux-based OS firewall
> > > along with FreeS/WAN VPN features set.  My reason is that a linux
> > > firewall can provide everything a Cisco PIX does and even more. 
> > > In term of hardware, the linux Firewall/ VPN/IPSec box will be
> > > running a dual-processor (800MHz) with 1GB of RAM. I just feel
> > > that I can get a lot more for the amount that we are going to
> > > spend with linux than with Cisco PIX.  I also feel that I tweak
> > > the source code on the LINUX kernel to increase the performance
> > > and security. Also, instead of purchasing the Cisco web-caching
> > > engine, I am thinking of building another linux box that will be
> > > running squid (web-caching) server.  Don't get me wrong, I think
> > > Cisco has a lot of good products in the area of routing; however,
> > > I just don't think it is necessary to throw away money at Cisco
> > > when I know that Linux or BSD can do the same job that PIX and
> > > Cisco web-caching engine do but for much less and also I can
> > > control the source code.  Has anyone has experiences with both the
> > > Linux/BSD, Squid and Cisco PIX, Cisco web-caching engine so that
> > > you can give advice on what I should do.  I am open to your
> > > suggestions.
> > >
> > > Many thanks.
> > > Sean
> > > _
> > > Get your FREE download of MSN Explorer at http://explorer.msn.com
> > >
> > > _
> > > FAQ, list archives, and subscription info:
> >http://www.groupstudy.com/list/cisco.html
> > > Report misconduct and Nondisclosure violations to
> > > [EMAIL PROTECTED]
> > >
> >
> >
> >_
> >FAQ, list archives, and subscription info: 
> >http://www.groupstudy.com/list/cisco.html
> >Report misconduct and Nondi

Re: Performance Comparision between Linux OS Firewall and Cisco PIX 525

2001-03-23 Thread Moe Tavakoli

It was assumed that the question was a result of an
implementation in an enterpise system.  Of course in a
school or a small comapny where uptime does not = $
there is no issue, use Linux, use MS Proxy for all
that matters.  But in an enterprise where uptime is
Essentail, there is money at stake and information has
lots of value, I would sleep easier at night knowing
that I have an enterprise level platform with a solid
proven track record, backed by a company who is
focused on producing and supporting systems to enable
me to focus on doing what I'm good at...

Moe.

--- Priscilla Oppenheimer <[EMAIL PROTECTED]> wrote:
> How about if the customer is strapped for money. I
> work at a school. 
> Luckily our students haven't gotten sophisticated
> enough to break into the 
> Linux firewall but I don't the think that day is too
> far away. Some of them 
> are very smart and they are learning Linux and
> networking in their classes. 
> But PIX is too expensive, I think??
> 
> Priscilla
> 
> At 09:24 AM 3/23/01, Rik wrote:
> >I have seen way too many Linux firewalls hacked as
> a result of
> >mis-administration.  Now, I'm not assuming anything
> about your abilities as
> >the last confirmed hack that I was notified about
> was a Linux FW setup by 2
> >guys that I know to be excellent Linux admins.  The
> problem is the inherent
> >nature of the beast.  A PIX is totally secure right
> out of the box.  The
> >last Linux hack I speak of was hacked based on an
> exploit within BIND and
> >had nothing to do with the FW policy.
> >
> >I also find the PIX to be MUCH easier to configure
> and setup.  I can do in
> >only a few lines of code what could possibly take
> pages and pages of code in
> >Linux.  When talking about firewalls, simplicity is
> a critically important
> >concern.  One compromise could easily remove any
> upfront cost advantage
> >Linux has over Cisco.  Also, you don't have to be
> concerned with shutting
> >down unused services on a PIX as you would on
> Linux.
> >
> >Go with the PIX.  It was designed from the ground
> up to do just what it
> >does: protect your network.  Cisco claims that a
> properly configured PIX has
> >never been compromised.  I believe them.
> >
> >Rik
> >
> >
> >""Sean Young"" <[EMAIL PROTECTED]> wrote in
> message
> >[EMAIL PROTECTED]">news:[EMAIL PROTECTED]...
> > > Hi Everyone,
> > >
> > > My company is putting me in charge in
> implementing a Firewall for our
> > > company.  One guy in my networking group is
> recommending PIX Firewall.
> > > Furthermore, he also recommends a Cisco
> Web-caching engine.  His reason
> > > is that not only Cisco is good Firewall but it
> also provides VPN
> > > connectivity to our remote sites.  Myself, on
> the other hand, would
> > > like to implement Linux-based OS firewall along
> with FreeS/WAN VPN
> > > features set.  My reason is that a linux
> firewall can provide everything
> > > a Cisco PIX does and even more.  In term of
> hardware, the linux Firewall/
> > > VPN/IPSec box will be running a dual-processor
> (800MHz) with 1GB of RAM.
> > > I just feel that I can get a lot more for the
> amount that we are going
> > > to spend with linux than with Cisco PIX.  I also
> feel that I tweak the
> > > source code on the LINUX kernel to increase the
> performance and security.
> > > Also, instead of purchasing the Cisco
> web-caching engine, I am thinking
> > > of building another linux box that will be
> running squid (web-caching)
> > > server.  Don't get me wrong, I think Cisco has a
> lot of good products
> > > in the area of routing; however, I just don't
> think it is necessary to
> > > throw away money at Cisco when I know that Linux
> or BSD can do the same
> > > job that PIX and Cisco web-caching engine do but
> for much less and also
> > > I can control the source code.  Has anyone has
> experiences with both
> > > the Linux/BSD, Squid and Cisco PIX, Cisco
> web-caching engine so that
> > > you can give advice on what I should do.  I am
> open to your suggestions.
> > >
> > > Many thanks.
> > > Sean
> > >
>
_
> > > Get your FREE download of MSN Explorer at
> http://explorer.msn.com
> > >
> > > _
> > > FAQ, list archives, and subscription info:
> >http://www.groupstudy.com/list/cisco.html
> > > Report misconduct and Nondisclosure violations
> to [EMAIL PROTECTED]
> > >
> >
> >
> >_
> >FAQ, list archives, and subscription info: 
> >http://www.groupstudy.com/list/cisco.html
> >Report misconduct and Nondisclosure violations to
> [EMAIL PROTECTED]
> 
> 
> 
> 
> Priscilla Oppenheimer
> http://www.priscilla.com
> 
> _
> FAQ, list archives, and subscription info:
> http://www.groupstudy.com/list/cisco.html
> Report misconduct and Nondisclosure violations to
[EMAIL PROTECTED]


=
_
Moe Tavakoli

___

RE: Performance Comparision between Linux OS Firewall and Cisco PIX 525

2001-03-23 Thread Chris Lemagie

On the performance front, a Pix 525 will sustain just under 400MB of
throughput, most if any Linux based firewalls will not touch that...  On the
Price front, correct, the Pix 525 is a fairly expensive unit, but you are
able to drop to a 515 which will support 172 MB sustained throughput and 6
interfaces if you purchase the un-restricted version.  The 515 restricted
version comes in at about $5300 with three interfaces and will still support
the same throughput numbers and 65K sessions.

Chris Lemagie

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of
Priscilla Oppenheimer
Sent: Friday, March 23, 2001 9:38 AM
To: [EMAIL PROTECTED]
Subject: Re: Performance Comparision between Linux OS Firewall and Cisco
PIX 525


How about if the customer is strapped for money. I work at a school.
Luckily our students haven't gotten sophisticated enough to break into the
Linux firewall but I don't the think that day is too far away. Some of them
are very smart and they are learning Linux and networking in their classes.
But PIX is too expensive, I think??

Priscilla

At 09:24 AM 3/23/01, Rik wrote:
>I have seen way too many Linux firewalls hacked as a result of
>mis-administration.  Now, I'm not assuming anything about your abilities as
>the last confirmed hack that I was notified about was a Linux FW setup by 2
>guys that I know to be excellent Linux admins.  The problem is the inherent
>nature of the beast.  A PIX is totally secure right out of the box.  The
>last Linux hack I speak of was hacked based on an exploit within BIND and
>had nothing to do with the FW policy.
>
>I also find the PIX to be MUCH easier to configure and setup.  I can do in
>only a few lines of code what could possibly take pages and pages of code
in
>Linux.  When talking about firewalls, simplicity is a critically important
>concern.  One compromise could easily remove any upfront cost advantage
>Linux has over Cisco.  Also, you don't have to be concerned with shutting
>down unused services on a PIX as you would on Linux.
>
>Go with the PIX.  It was designed from the ground up to do just what it
>does: protect your network.  Cisco claims that a properly configured PIX
has
>never been compromised.  I believe them.
>
>Rik
>
>
>""Sean Young"" <[EMAIL PROTECTED]> wrote in message
>[EMAIL PROTECTED]">news:[EMAIL PROTECTED]...
> > Hi Everyone,
> >
> > My company is putting me in charge in implementing a Firewall for our
> > company.  One guy in my networking group is recommending PIX Firewall.
> > Furthermore, he also recommends a Cisco Web-caching engine.  His reason
> > is that not only Cisco is good Firewall but it also provides VPN
> > connectivity to our remote sites.  Myself, on the other hand, would
> > like to implement Linux-based OS firewall along with FreeS/WAN VPN
> > features set.  My reason is that a linux firewall can provide everything
> > a Cisco PIX does and even more.  In term of hardware, the linux
Firewall/
> > VPN/IPSec box will be running a dual-processor (800MHz) with 1GB of RAM.
> > I just feel that I can get a lot more for the amount that we are going
> > to spend with linux than with Cisco PIX.  I also feel that I tweak the
> > source code on the LINUX kernel to increase the performance and
security.
> > Also, instead of purchasing the Cisco web-caching engine, I am thinking
> > of building another linux box that will be running squid (web-caching)
> > server.  Don't get me wrong, I think Cisco has a lot of good products
> > in the area of routing; however, I just don't think it is necessary to
> > throw away money at Cisco when I know that Linux or BSD can do the same
> > job that PIX and Cisco web-caching engine do but for much less and also
> > I can control the source code.  Has anyone has experiences with both
> > the Linux/BSD, Squid and Cisco PIX, Cisco web-caching engine so that
> > you can give advice on what I should do.  I am open to your suggestions.
> >
> > Many thanks.
> > Sean
> > _
> > Get your FREE download of MSN Explorer at http://explorer.msn.com
> >
> > _
> > FAQ, list archives, and subscription info:
>http://www.groupstudy.com/list/cisco.html
> > Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]
> >
>
>
>_
>FAQ, list archives, and subscription info:
>http://www.groupstudy.com/list/cisco.html
>Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]




Priscilla Oppenheimer
http://www.priscilla.com

_
FAQ, list archives, and subscription info:
http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

_
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



Re: Performance Comparision between Linux OS Firewall and Cisco PIX 525

2001-03-23 Thread Priscilla Oppenheimer

How about if the customer is strapped for money. I work at a school. 
Luckily our students haven't gotten sophisticated enough to break into the 
Linux firewall but I don't the think that day is too far away. Some of them 
are very smart and they are learning Linux and networking in their classes. 
But PIX is too expensive, I think??

Priscilla

At 09:24 AM 3/23/01, Rik wrote:
>I have seen way too many Linux firewalls hacked as a result of
>mis-administration.  Now, I'm not assuming anything about your abilities as
>the last confirmed hack that I was notified about was a Linux FW setup by 2
>guys that I know to be excellent Linux admins.  The problem is the inherent
>nature of the beast.  A PIX is totally secure right out of the box.  The
>last Linux hack I speak of was hacked based on an exploit within BIND and
>had nothing to do with the FW policy.
>
>I also find the PIX to be MUCH easier to configure and setup.  I can do in
>only a few lines of code what could possibly take pages and pages of code in
>Linux.  When talking about firewalls, simplicity is a critically important
>concern.  One compromise could easily remove any upfront cost advantage
>Linux has over Cisco.  Also, you don't have to be concerned with shutting
>down unused services on a PIX as you would on Linux.
>
>Go with the PIX.  It was designed from the ground up to do just what it
>does: protect your network.  Cisco claims that a properly configured PIX has
>never been compromised.  I believe them.
>
>Rik
>
>
>""Sean Young"" <[EMAIL PROTECTED]> wrote in message
>[EMAIL PROTECTED]">news:[EMAIL PROTECTED]...
> > Hi Everyone,
> >
> > My company is putting me in charge in implementing a Firewall for our
> > company.  One guy in my networking group is recommending PIX Firewall.
> > Furthermore, he also recommends a Cisco Web-caching engine.  His reason
> > is that not only Cisco is good Firewall but it also provides VPN
> > connectivity to our remote sites.  Myself, on the other hand, would
> > like to implement Linux-based OS firewall along with FreeS/WAN VPN
> > features set.  My reason is that a linux firewall can provide everything
> > a Cisco PIX does and even more.  In term of hardware, the linux Firewall/
> > VPN/IPSec box will be running a dual-processor (800MHz) with 1GB of RAM.
> > I just feel that I can get a lot more for the amount that we are going
> > to spend with linux than with Cisco PIX.  I also feel that I tweak the
> > source code on the LINUX kernel to increase the performance and security.
> > Also, instead of purchasing the Cisco web-caching engine, I am thinking
> > of building another linux box that will be running squid (web-caching)
> > server.  Don't get me wrong, I think Cisco has a lot of good products
> > in the area of routing; however, I just don't think it is necessary to
> > throw away money at Cisco when I know that Linux or BSD can do the same
> > job that PIX and Cisco web-caching engine do but for much less and also
> > I can control the source code.  Has anyone has experiences with both
> > the Linux/BSD, Squid and Cisco PIX, Cisco web-caching engine so that
> > you can give advice on what I should do.  I am open to your suggestions.
> >
> > Many thanks.
> > Sean
> > _
> > Get your FREE download of MSN Explorer at http://explorer.msn.com
> >
> > _
> > FAQ, list archives, and subscription info:
>http://www.groupstudy.com/list/cisco.html
> > Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]
> >
>
>
>_
>FAQ, list archives, and subscription info: 
>http://www.groupstudy.com/list/cisco.html
>Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]




Priscilla Oppenheimer
http://www.priscilla.com

_
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



Re: Performance Comparision between Linux OS Firewall and Cisco PIX 525

2001-03-23 Thread Rik

I have seen way too many Linux firewalls hacked as a result of
mis-administration.  Now, I'm not assuming anything about your abilities as
the last confirmed hack that I was notified about was a Linux FW setup by 2
guys that I know to be excellent Linux admins.  The problem is the inherent
nature of the beast.  A PIX is totally secure right out of the box.  The
last Linux hack I speak of was hacked based on an exploit within BIND and
had nothing to do with the FW policy.

I also find the PIX to be MUCH easier to configure and setup.  I can do in
only a few lines of code what could possibly take pages and pages of code in
Linux.  When talking about firewalls, simplicity is a critically important
concern.  One compromise could easily remove any upfront cost advantage
Linux has over Cisco.  Also, you don't have to be concerned with shutting
down unused services on a PIX as you would on Linux.

Go with the PIX.  It was designed from the ground up to do just what it
does: protect your network.  Cisco claims that a properly configured PIX has
never been compromised.  I believe them.

Rik


""Sean Young"" <[EMAIL PROTECTED]> wrote in message
[EMAIL PROTECTED]">news:[EMAIL PROTECTED]...
> Hi Everyone,
>
> My company is putting me in charge in implementing a Firewall for our
> company.  One guy in my networking group is recommending PIX Firewall.
> Furthermore, he also recommends a Cisco Web-caching engine.  His reason
> is that not only Cisco is good Firewall but it also provides VPN
> connectivity to our remote sites.  Myself, on the other hand, would
> like to implement Linux-based OS firewall along with FreeS/WAN VPN
> features set.  My reason is that a linux firewall can provide everything
> a Cisco PIX does and even more.  In term of hardware, the linux Firewall/
> VPN/IPSec box will be running a dual-processor (800MHz) with 1GB of RAM.
> I just feel that I can get a lot more for the amount that we are going
> to spend with linux than with Cisco PIX.  I also feel that I tweak the
> source code on the LINUX kernel to increase the performance and security.
> Also, instead of purchasing the Cisco web-caching engine, I am thinking
> of building another linux box that will be running squid (web-caching)
> server.  Don't get me wrong, I think Cisco has a lot of good products
> in the area of routing; however, I just don't think it is necessary to
> throw away money at Cisco when I know that Linux or BSD can do the same
> job that PIX and Cisco web-caching engine do but for much less and also
> I can control the source code.  Has anyone has experiences with both
> the Linux/BSD, Squid and Cisco PIX, Cisco web-caching engine so that
> you can give advice on what I should do.  I am open to your suggestions.
>
> Many thanks.
> Sean
> _
> Get your FREE download of MSN Explorer at http://explorer.msn.com
>
> _
> FAQ, list archives, and subscription info:
http://www.groupstudy.com/list/cisco.html
> Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]
>


_
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



Re: Performance Comparision between Linux OS Firewall and Cisco PIX 525

2001-03-22 Thread Stuart Brockwell

Hi Sean,
  I am a Linux head my self, and one of our firewalls is in fact running
on a Linux box.  The only problem with this type of firewall is that you
inherit all of the known bugs that the software has.  Given that the source
code to Linux is widely available, you have a lot of very talented people
out there who know these holes and are able to exploit them very easily.  If
you are really keen on a Linux firewall, I would suggest you look at some of
the firewalls running on a cut down version of Linux.  One such firewall is
Watch Guard, (there are many around).  We also use one of these in our
office.  The plus to one of these firewalls is that these guys do it for a
living.  If you maintain your own Linux firewall, you will need to
continuously look for the latest bug fixes to install on your Linux box to
address the latest round of holes that have been released.

Cisco and companies such as Watch Guard closely guard their source code,
often you can elect to take on a maintenance contract with the firewall
where you recieve all the latest fixes for a 12 month period (this is what
we did).  As this is their bread and butter, they spend a lot of time
looking for holes and fixes to known bugs.

We do not use a PIX firewall, but we have used Novel Boarder manager, Watch
Guard, Linux and one of the Nokia firewalls (I do not know which).  All have
their good and bad points, the main plus for each of the commercial packages
is that there is large support base, where as skilled Linux admin staff who
can lock down a firewall are very few and far between.

Good luck with your firewall, hope this is of some assistance.

Stuart Brockwell
Engineer - Network Planning
Primus Telecom (Aust)
MCSE, CCNA, CCDA




""Sean Young"" <[EMAIL PROTECTED]> wrote in message
[EMAIL PROTECTED]">news:[EMAIL PROTECTED]...
> Hi Everyone,
>
> My company is putting me in charge in implementing a Firewall for our
> company.  One guy in my networking group is recommending PIX Firewall.
> Furthermore, he also recommends a Cisco Web-caching engine.  His reason
> is that not only Cisco is good Firewall but it also provides VPN
> connectivity to our remote sites.  Myself, on the other hand, would
> like to implement Linux-based OS firewall along with FreeS/WAN VPN
> features set.  My reason is that a linux firewall can provide everything
> a Cisco PIX does and even more.  In term of hardware, the linux Firewall/
> VPN/IPSec box will be running a dual-processor (800MHz) with 1GB of RAM.
> I just feel that I can get a lot more for the amount that we are going
> to spend with linux than with Cisco PIX.  I also feel that I tweak the
> source code on the LINUX kernel to increase the performance and security.
> Also, instead of purchasing the Cisco web-caching engine, I am thinking
> of building another linux box that will be running squid (web-caching)
> server.  Don't get me wrong, I think Cisco has a lot of good products
> in the area of routing; however, I just don't think it is necessary to
> throw away money at Cisco when I know that Linux or BSD can do the same
> job that PIX and Cisco web-caching engine do but for much less and also
> I can control the source code.  Has anyone has experiences with both
> the Linux/BSD, Squid and Cisco PIX, Cisco web-caching engine so that
> you can give advice on what I should do.  I am open to your suggestions.
>
> Many thanks.
> Sean
> _
> Get your FREE download of MSN Explorer at http://explorer.msn.com
>
> _
> FAQ, list archives, and subscription info:
http://www.groupstudy.com/list/cisco.html
> Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]
>


_
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]