Cisco PIX 501 to a Cayman Router/firewall

Posted on 2004-11-08
Last Modified: 2013-11-29
I wanted to purchase a better firewall than the Cayman 3546.  So I ordered a Cisco PIX 501 firewall.

I have two questions.

1) Can any manufacturer's router be used in the place of antoher?

2) Can a Cisco PIX 501 firewall be connected to Cayman 3546 router/firewall?

3) Should I just buy a Cisco router/firewall?

Thanks in advance,
Question by:MikeSievers
    LVL 43

    Accepted Solution

    1.  Yes, as long as it supports the physical interfaces and provides the features you need.

    2.  Yes, the PIX can be connected to the Cayman 3546 router/firewall.  The PIX will connect via ethernet.

    3.  No, I'd recommend the PIX over a Cisco router running the firewall feature set.
    LVL 79

    Expert Comment

    Agree with my esteemed colleague JFrederick29..with some additional comments:

    1. Basically, yes, as long as the only function needed is to pass packets from the WAN interface to the LAN interface, or provides other basic functions. If you are doing some advanced routing like dual WAN ports for failover/load balancing, or using route-maps, advanced NAT, VPN features, BGP routing updates, connecting to T1/Et, ISDN dial backup, etc, then in this case not just any router can replace it. Routers are not generic by any means and you must pick the one that suits your needs and your physical connectivity.
    2. You may not need the Cayman at all. What type physical interface is your WAN feed? If it is Ethernet to a broadband modem, then there is no reason to have it there at all
    3. No. The PIX was designed ground up to be a great firewall - to block unwanted packets. A router was designed for one purpose - to pass packets from one interface to another as fast as possible. Adding the firewall features to the router makes it a kludge--in my opinion..

    Featured Post

    Why You Should Analyze Threat Actor TTPs

    After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

    Join & Write a Comment

    #Citrix #Citrix Netscaler #HTTP Compression #Load Balance
    If your business is like most, chances are you still need to maintain a fax infrastructure for your staff. It’s hard to believe that a communication technology that was thriving in the mid-80s could still be an essential part of your team’s modern I…
    Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
    After creating this article (, I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

    728 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    18 Experts available now in Live!

    Get 1:1 Help Now