Having work with both Cisco PIX and Checkpoint Firewall running Nokia
platforms, even though I am NOT an expert in both, let me make a few
comments:

1) Checkpoint Firewall, even though it is an application, if you run
Checkpoint
on Nokia Platforms which uses IPSO (netBSD kernel-like), it is very robust,
powerful and secure.  The Nokia platform is a NAP, just like Cisco PIX.  Let
me also add that the BSD platform is the most secure platform is the most
secure
platform one can find.  Now, if someone is stupid running Firewall on a
general-
purpose platform such as Solaris and NT, then he/she should not be in the
Firewall
business in the first place,

2) Configure Checkpoint/IPSO on Nokia platform is very easy. I use
Perl/Expect scripts
to setup the nokia ipso box.  This task takes less than 10 minutes and very
robust.
As far as checkpoint is concerns, the point-and-click makes it very easy,

3) If you are working in an Enterprise environment and you have a few PIXes
to manage,
that might not be so bad.  However, if you have at least twenty PIXes to
manage, good
luck.  There is no good management software for PIXes at the moment.  Don't
talk to me
about the CSPM crap running on Windows platforms.  May be Cisco will
incorporate
PIX support in the next release of its Hosting Solution Engine.  On the
other hand,
Checkpoint MDS is second to none.   It allows you to manage up to 200
Checkpoint
per MDS,

4) You can create VPN between Checkpoint and other vendors such as
Netscreen,
PIX and other vendors out there and tunnel PPTP and L2TP VPN clients as
well.
Again, if you are using PPTP as VPN then you should NOT be a Firewall
Engineer
in the first place,

5) With Cisco PIX, you can not use RSA key authentication, only password is
supported.
Furthermore, since we are talking about security, PIX uses tftp to
upload/download
configuration file (clear text).  Now tell me if that is good security
practices.  Furthemore,
if you read security bulletin lately, there are lot of holes in version 1 of
Secure Shell which
PIX supports (Pix does NOT support version 2).  With Nokia platforms, you
can
Secure Copy (scp) to upload/download configuration.  The new version of
Nokia even
supports DSA and SSH version 2 which is very secure,

4) Cisco PIX is pretty much a packet-filtering firewall to me (I don't care
what anyone
might say otherwise).  It is using the same access-list just like Cisco
routers.  It does have
"some" stateful inspection capabilities but not as much as Checkpoint.  If
you are looking
for a firewall with sheer performance in term of packet-filtering and
limited 'stateful'
inspection, then PIX might be the right choice.  I like the PIX-535 model a
lot in term
of performance,

5) Yes, support from Checkpoint sucks.  Support from Cisco is much better,

6) One thing I like about the PIXes is that it takes about 2 minutes to
restore PIX firewall
if one happens to crash (due to hardware).  It takes about 10 mins to do so
with
Nokia/Checkpoint,

7) PIX Firewall version 6.0(1) and 6.1(1) and pdm1.1(2) have quite a few
security
holes especially with the Secure Shell and Secure Socket Layer (SSL) for its
Pix
Device Manager (PDM).

I am saying that PIX is a bad product and Nokia/Checkpoint is a good one.
If you
are familiar with Unix, you will like Nokia/Checkpoint.  On the other hand,
if you are
already familiar with routers/switches and come from a Windows background,
then you will like Cisco PIX.

Contact me off-line if you want to discuss this further.

----- Original Message -----
From: "Tim O'Brien" 
To: 
Sent: Wednesday, January 02, 2002 7:42 AM
Subject: Re: OT - Firewall performance Comparisons - is it quitting time
[7:30658]


> A couple of points, and I will then get off of my soapbox...
>
> Checkpoint NG is STILL an application running on UNIX or NT, not a self
> contained appliance. Personally I love Microsoft (let the flames begin!),
> however, with the critical updates that I see getting installed on my 2000
> and XP workstations I am POSITIVE that I would not want to trust my
company
> security to it. Another point.. Have you ever installed and configured a
> Checkpoint firewall? You can have the PIX up and running with failover
even
> before you get the OS half installed on the new server that you need to
buy
> for it, thus raising the cost for an already more expensive solution in
> man-hours and equipment. The PIX is also very interoperable with other
> devices in the network. You can create PIX to PIX or PIX to IOS or PIX to
> 3000VPN site-to-site with other offices or home offices with built in
56bit
> DES or available 3DES . You can tunnel in VPN clients (free Cisco VPN
client
> available). You can tunnel in Microsoft PPTP or L2TP sessions. And one
last
> point, Have you ever had to get support from Checkpoint??? enough said
about
> that one...
>
> If you would like to discuss further contact me offline...
>
> Tim
>
> ----- Original Message -----
> From: "[EMAIL PROTECTED]"
>
> To:
> Sent: Wednesday, January 02, 2002 4:05 AM
> Subject: Re: OT - Firewall performance Comparisons - is it quitting time
> [7:30652]
>
>
> > For quite a while CheckPoint is out performing every single Firewall in
> the
> > market a specially in the CheckPoint Next Generation Firewall version
> > and with the release of there SecureXL API.
> > It is important to remember that performance is not everything that need
> to
> > be compared while testing a Firewall.
> > I love the Cisco PIX but the CheckPoint NG is amazing.
> >
> > Gil




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=30682&t=30682
--------------------------------------------------
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

Reply via email to