Solved

Cisco Pix, ASA, FWSM or Checkpoint????

Posted on 2007-04-11
6
1,670 Views
Last Modified: 2013-11-16
Can anyone tell me what the basic differences are between Cisco's Pix firewall, ASA device, and it's FWSM card?  I'm evaluating the replacement of my checkpoint firewall (very old) with a Cisco solution.  It's the classic argument between networking and security of speed vs. security. Can anyone offer any advice on the matter?
0
Comment
Question by:sunny10
  • 2
6 Comments
 
LVL 79

Accepted Solution

by:
lrmoore earned 500 total points
ID: 18896798
ASA is the next-generation PIX with a modular architecture that allows you to add things like content filter (Websense on a card) to the appliance.
FWSM is a PIX firewall on a Catalyst 6500 switch blade. Designed for very high speed firewall features for data center more than for edge firewall.
I'm very partial to Cisco ASA for ease of use, performance, support and feature set for the price.
If I'm not mistaken, Checkpoint is a software firewal that you can now get pre-installed in an appliance. I have no direct experience with it, so I can't really comment on pros/cons.
0
 
LVL 6

Expert Comment

by:Dooglave
ID: 18902639
Why do you want to replace the Check Point Firewall?  They have made some extraordinary advancements in the past few years that no one can even come close to.  Download the R65 version of SmartConsole and check it out in demo mode.
0
 
LVL 6

Expert Comment

by:Dooglave
ID: 18902653
Oh you can get Check Point pre installed on the UTM-1 Server or you can install in on any platform you want. Windows, Solaris, Red Hat, Nokia IPSO, and Check Points OS SecurePlatform.
0
 

Author Comment

by:sunny10
ID: 18903316
I don't necessarily want to replace the Checkpoint.  I need to understand the firewall feature of each solution so I can formulate an argument on why we should keep CP.  The ones we have now are old, they will have to be upgraded or replaced.  Network wants throughput, hence the Cisco solution.
0

Featured Post

Maximize Your Threat Intelligence Reporting

Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.

Join & Write a Comment

If you have an ASA5510 then this sort of thing would be better handled with a CSC Module, however on an ASA5505 thats not an option, and if you want to throw in a quick solution to stop your staff going to facebook during work time, then this is the…
This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…
Illustrator's Shape Builder tool will let you combine shapes visually and interactively. This video shows the Mac version, but the tool works the same way in Windows. To follow along with this video, you can draw your own shapes or download the file…

757 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now