[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [FW-1] comparison between Pix and FW-1
We've just put in several new pix's here (535's, 515's et al). We use Checkpoint, PIX, Netscreen, FWTK, and some others. I personally wouldn't use pix in an enterprise environment if given the choice. It has very limited functionality and troubleshooting options. I would even go so far as to say look at cisco routers with FW/IDS IOS versions on them you'll get more out of it than a PIX. (and a lot cheaper). Steve -----Original Message----- From: Tim Holman [mailto:[email protected]] Sent: Friday, November 02, 2001 09:13 To: [email protected] Subject: Re: [FW-1] comparison between Pix and FW-1 PIX is optimised for firewalling, but then so is every other hardware based firewall device ! I'd be careful about putting in PIX instead of FW-1 in a datacenter environment - you'll lose the ease of management / logging ability of Check Point if you do this. However, you can integrate PIX's syslog into something like Webtrends Firewall Suite to make up for the logging, and go on a few PIX courses to make up for the intuitive Check Point bits that you'll be leaving behind.... If datacenter, are you looking for gigabit solutions ? Take a look at: http://www.checkpoint.com/products/security/platforms/platforms_matrix.html for a list of supported Check Point platforms - there are some interesting 'new' developments. Tim -----Original Message----- From: Mailing list for discussion of Firewall-1 [mailto:[email protected]]On Behalf Of John Castillo Sent: 31 October 2001 20:05 To: [email protected] Subject: [FW-1] comparison between Pix and FW-1 can anyone highlight the differences, advantage/disadvantage of each FW solution? my boss is looking into replacing FW-1 with a Pix in a datacenter environment. no one has done much research except for the common argument that "the pix is a hardware accelerated firewall, therefore its better and faster". opinions? =============================================== To unsubscribe from this mailing list, please see the instructions at http://www.checkpoint.com/services/mailing.html =============================================== ********************************************************************** This email and any files transmitted with it are confidential and intended solely for the use of the individual or entity to whom they are addressed. If you have received this email in error please notify the system manager. This footnote also confirms that this email message has been swept by Dimension Data mail system for the presence of computer viruses. www.uk.didata.com ********************************************************************** =============================================== To unsubscribe from this mailing list, please see the instructions at http://www.checkpoint.com/services/mailing.html =============================================== =============================================== To unsubscribe from this mailing list, please see the instructions at http://www.checkpoint.com/services/mailing.html ===============================================
|