1 OVERVIEW Cisco Secure PIX Firewall Series Formerly known as the PIX Firewall, the Cisco Secure PIX Firewall series is the highest-performance, enterprise-class firewall product line within the Cisco firewall family. The integrated hardware/software PIX Firewall series delivers high security without impacting network performance, scaling to meet the entire range of customer requirements. The Cisco Secure PIX Firewall series is a key element in the overall Cisco end-to-end security solution set and is the leading product line in its segment of the firewall market. The Internet s growth has resulted in increased security risks to corporate and government networks. Existing solutions such as proxy-based firewalls that run at the application level have many limitations, including slow performance, the need for high-end, costly, general-purpose platforms running a UNIX operating system, and the security risks inherent in using an open system such as UNIX. The Cisco Secure PIX Firewall series overcomes these limitations with its unique combination of high performance and strong security, backed by Cisco s worldwide 7x24 service and support organization. Key Features of the Cisco Secure PIX Firewall Series Non-UNIX, Secure, Real-Time, Embedded System This design eliminates the risks associated with a generalpurpose operating system and allows the Cisco Secure PIX Firewall series to deliver outstanding performance up to 256,000 simultaneous connections, dramatically greater than any UNIX-based firewall. Adaptive Security Algorithm The heart of the Cisco Secure PIX Firewall series is the Adaptive Security Algorithm (ASA), which is less complex and more robust than packet filtering. It also offers higher performance and is more scalable than application-level proxy firewalls. ASA maintains the secure perimeters between the networks controlled by the firewall. The stateful, connection- oriented ASA design creates session flows based on source and destination addresses, randomized TCP sequence numbers, port numbers, and additional TCP flags. All inbound and outbound traffic is controlled by applying the security policy to these connection table entries. User Authentication and Authorization with Cut-Through Proxy The Cisco Secure PIX Firewall series gains further dramatic performance advantages through cut-through proxy, a patent-pending method of transparently verifying the identity of users at the firewall and permitting or denying access to any TCP- or UDP-based application. This method eliminates the price/performance impact that UNIX system-based firewalls impose in similar configurations, and leverages the authentication and authorization services of the CiscoSecure Access Control Server. Simplified Installation The PIX Firewall Setup Wizard speeds initial firewall setup. This Windows application guides the installer through the process with both on-screen descriptions and associated help files. Centralized Configuration and Management The PIX Firewall Manager is a Java-based, graphical user interface (GUI) configuration tool that lets administrators click on a PIX Firewall icon to retrieve, edit, and centrally manage firewall Page 1 of 6
2 security policies. Separate tabs provide access to configuration information common to all the PIX Firewalls being managed. They also provide access to built-in reports for user-based accounting for Web sites visited and volume of files transferred. The PIX Firewall Manager can automatically provide real-time alerts through or pager notification when anyone attempts a firewall breach. Standards-Based Virtual Private Network Option The PIX Firewall IPSec encryption card, due out in release 5.0 (Q3 FY1999), enables administrators to reduce the costs of connecting mobile users and remote sites to the corporate network over the Internet or other public IP networks. Based on the new Internet Security (IPSec) and Internet Key Exchange (IKE) standards, the PIX VPN implementation is fully interoperable with the corresponding Cisco Internetwork Operating System (Cisco IOS ) software capability. The PIX IPSec solution will include Windows 95 and Windows NT 4.0 client software to enable mobile and remote users to connect securely to the PIX Firewall. URL Filtering PIX Firewall URL filtering is provided in partnership with NetPartners WebSENSE server software. The PIX Firewall will check outgoing URL requests with the policy defined on the WebSENSE server running either on Windows NT or UNIX. Based on responses from the NetPartners server, which matches requests against Web-site characteristics deemed inappropriate for business use, the PIX Firewall either permits or denies connections. Because URL filtering is handled on a separate platform, no additional performance burden is placed on the PIX Firewall. Failover/Hot Standby Upgrade Option The PIX Firewall failover option ensures high availability and eliminates a single point of failure. With two PIX Firewalls running in parallel, if one malfunctions, the second PIX Firewall automatically maintains security operations. Please refer to the Cisco Secure PIX Firewall data sheet for a detailed list of PIX Firewall hardware and software features. Figure 1 When you deploy the Cisco Secure PIX Firewall series with four interfaces, you experience the strongest security available. Public Web and DNS servers can be placed on one network segment, while proxy servers and URL blocking servers are located on another network segment. The inside network is also isolated on a separate interface. Internet Outside Network Java Cage URL Block Proxy Server WWW DNS Perimeter Networks Inside Network Cisco Secure NT RAS Key Benefits of the PIX Firewall Series Strongest Security The Cisco Secure PIX Firewall series adds an unrivaled measure of security to corporate networks. When deployed in a four interface configuration with Cisco router access control lists (ACLs) for packet filtering, the PIX Firewall series provides a strong barrier to unauthorized users. The heart of the PIX Firewall series is a protection scheme based on ASA, which offers stateful connection-oriented Page 2 of 6
3 security. ASA tracks the source and destination address, TCP sequence numbers, port numbers, and additional TCP flags of each packet. This information is stored in a table, and all inbound and outbound packets are compared against entries in the table. Access is permitted through the Cisco Secure PIX Firewall series only if an appropriate connection exists to validate passage. This setup gives organizations transparent access for internal and authorized external users, while protecting internal networks from unauthorized access. It also offers an unprecedented level of security protection. The Cisco Secure PIX Firewall series relies on a real-time embedded system that is many times more secure than an open, standards-based operating system such as UNIX. Platform Extensibility The strong security provided by this real-time embedded system is now complemented by its platform extensibility features. The new, fourth network interface and support in version 4.4 of a four-port 10/100 Ethernet interface card expands the total PIX Firewall security solution while retaining the performance and security attributes. As shown in Figure 1, multiple network interfaces allows publicly accessible Web, mail, and Domain Name System (DNS) servers to be protected by your security policy. Web-based and traditional electronic data interchange (EDI) applications that link vendors and customers are also more secure and scalable when implemented using a physically separate network. As the trend toward building these extranet applications accelerates, the Cisco Secure PIX Firewall is already prepared to accommodate these applications. The many network interfaces could also host a URL filtering server today, and other content filtering servers as they become available. Locating these processing-intensive applications on separate platforms, each on a distinct, secure, and high-performing network segment, provides both performance and security benefits. Greatest Authentication Performance The Cisco Secure PIX Firewall series offers performance that is dramatically greater than competing firewalls. It gains speed through a patent-pending process called cut-through proxy, which is the fastest method for a firewall to authenticate a user. Unlike a proxy server, which must analyze every data packet at the application layer of the Open System Interconnection (OSI) model (a time- and process-intensive function), a PIX Firewall first queries a TACACS+ or RADIUS database server for authentication. When a user is approved and policy is checked, the Cisco Secure PIX Firewall series shifts the session flow, and all traffic thereafter flows directly and quickly between the two parties while session state information is maintained. This cut-through proxy capability allows the Cisco Secure PIX Firewall series to perform dramatically faster than proxy servers. Figure 2 Cut-Through Proxy 1. User makes request to another IS resource 2. PIX Firewall intercepts connection IS Resource 3. PIX Firewall then authenticates user and checks security policy on RADIUS or TACACS+ server 5. PIX Firewall directly connects internal/external user directly to IS resource 4. PIX Firewall then initiates connection from the PIX Firewall to the destination IS resource Typical proxy servers also offer limited performance because the server must initiate a process for each TCP connection. With 300 users, 300 processes could be required, and this procedure is CPU intensive. With its real-time embedded system, the Cisco Secure PIX Firewall series can handle over a quarter of a million simultaneous sessions, a level of performance that is dramatically higher than an application proxy firewall. Fully loaded, the PIX model 520 operates at 170 megabits per second, supporting multiple T3 lines. Page 3 of 6
4 Lowest Cost of Ownership The Cisco Secure PIX Firewall series offers the lowest cost of ownership of any security device, including proxy servers. It is simple to install and configure using the Setup Wizard and Firewall Manager software tools, resulting in little network downtime. Competitive offerings are more complex to configure, and they require the network to be down for longer periods. In addition, the Cisco Secure PIX Firewall series permits transparent support of Internet multimedia applications, eliminating the need to physically modify and reconfigure each client workstation or PC a tremendous administrative burden required by competing firewalls. Enhanced accounting features help you understand and control usage costs. With the GUI-based Firewall Manager tool, you can analyze PIX Firewall activity and generate graphical, easy-to-read accounting reports that provide information such as the date and time of a connection, total time connected, per-user throughput (bytes and packets), and application mix (port numbers). Use these reports for planning purposes or to charge back costs to various departments. For more sophisticated reporting and analysis requirements, the PIX Firewall supports several third-party applications, including Private I from Open Systems Solutions and Telemate.Net from Telemate Software. Support of the IETF IPSec standard allows you to scale your VPNs with much lower administrative costs. Part of IPSec includes the use of public digital keys that are administered by a Certificate Authority a third-party vendor that registers public keys. Beyond allowing much greater scalability, this use of a Certificate Authority dramatically reduces the administrative time and cost now associated with manual key administration. The Cisco Secure PIX Firewall series is also less expensive to maintain. Because proxy servers are typically based on UNIX, companies must hire costly specialists to maintain these complex systems. In addition, because most Computer Emergency Response Team (CERT) advisories pertain to UNIX, companies must commit continuous resources to tracking these advisories and installing UNIX patches. The Cisco Secure PIX Firewall series, on the other hand, has a small, real-time, secure and embedded system that requires little ongoing maintenance. Also, because all the software runs from Flash memory, no hard drives are required, providing a much higher network uptime and mean time between failure (MTBF). The Cisco Secure PIX Firewall series is scalable, supporting from 64,000 to 256,000 simultaneous connections. This scenario protects the user s investment in Cisco technology, because the Cisco Secure PIX Firewall series can scale as companies needs grow. The cut-through proxy feature of the Cisco Secure PIX Firewall series further reduces the cost of ownership. It saves time and money by leveraging a company s CiscoSecure or other network access server database based on TACACS+ or RADIUS. This savings is significant compared to proxy-based firewalls that may require companies to maintain separate databases--incurring additional installation and maintenance costs. Cisco offers a cost-effective maintenance program, called SMARTnet maintenance. The SMARTnet program offers customers high value because, unlike competitors who typically cover either firewall hardware or software, SMARTnet covers both hardware and software of the Cisco Secure PIX Firewall series. The maintenance price is significantly lower than the combined costs of the hardware and software support from other firewall manufacturers. Page 4 of 6
5 Availability and Orderability The Cisco Secure PIX Firewall series products are available now. The following table lists the Cisco Secure PIX Firewall series ordering information. Table 1 Cisco Secure PIX Firewall Series Product Product Name/Description Order Number PIX 515 Firewall, 2 integrated ethernet interfaces, 200MHz processor, 32 MB memory, two expansion slots PIX-515 PIX 515 Firewall Restricted Software Supports only two ethernet interfaces, 8MB Flash storage, 32MB RAM. Does not PIX-515-SW-R support Failover feature PIX 515 Firewall Unrestricted Software Supports up to 6 ethernet interfaces and all PIX features. Requires PIX-515-SW-UR PIX-515-MEM MB RAM upgrade for the PIX 515 Firewall PIX-515-MEM-32 PIX 515 Firewall Restricted to Unrestricted software upgrade. Requires PIX-515-MEM-32 PIX-515-SW-UPG= PIX 515; PIX-515-SW-R PIX-515-R-BUN PIX 515; PIX-515-SW-R; PIX-515-MEM-32 PIX-515-UR-BUN PIX 520 Firewall w/extra memory Max 6 interfaces, 233-MHz processor, 170-Mbps performance, 128 MB memory, four PIX-520 expansion slots PIX 520 Firewall 233-MHz processor, >90-Mbps performance, -48VDC power PIX-520-DC PIX 520 Firewall Entry level license (Up to 100 users, 128 connections) PIX-CONN-128 PIX 520 Midrange license (100 to 500 users, 1024 connections) PIX-CONN-1K PIX 520 Unrestricted license (500+ users, 16,384+ connections) PIX-CONN-UR PIX 520 license upgrade from 1024 to unlimited PIX-CONN-1K-UR= PIX 520 license upgrade from 128 to 1024 connections PIX-CONN-128-1K= PIX 520 license upgrade from 128 to unlimited PIX-CONN-128-UR= Failover cable/upgrade kit software version 3.0 or later PIX-FO= PIX software version upgrade for non-support customers PIX-CONN-VER= PIX complete documentation set DOC-PIX= PIX 10/100 single-port Ethernet card PIX-1FE PIX 10/100 single-port Ethernet card, spare PIX-1FE= PIX Token Ring card PIX-1TR PIX Token Ring card, spare PIX-1TR= Private Link 2 56-bit DES encryption card PIX-PL2 Private Link 2 56-bit DES encryption card, spare PIX-PL2= Memory Upgrade to 128MB for PIX Firewalls prior to the 5XX Series PIX-MEM-UPG-128= Memory Upgrade to 128MB for PIX 510 and 520 Firewalls (prior to the PIX 520-XM) PIX-MEM-5XX-128= Service and Support Direct PIX SMARTnet maintenance all versions CON-SNT-PIX PIX SMARTnet enhanced maintenance all versions CON-SNTE-PIX PIX SMARTnet premium maintenance all versions CON-SNTP-PIX PIX onsite maintenance all versions CON-OS-PIX PIX onsite enhanced maintenance all versions CON-OSE-PIX PIX onsite premium maintenance all versions CON-OSP-PIX Service and Support Two-Tier Products PIX SMARTnet maintenance---all versions CON-SNT-PKG12 Page 5 of 6
6 Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA USA Tel: NETS (6387) Fax: European Headquarters Cisco Systems Europe s.a.r.l. Parc Evolic, Batiment L1/L2 16 Avenue du Quebec Villebon, BP Courtaboeuf Cedex France Tel: Fax: Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA USA Tel: Fax: Asia Headquarters Nihon Cisco Systems K.K. Fuji Building, 9th Floor Marunouchi Chiyoda-ku, Tokyo 100 Japan Tel: Fax: Cisco Systems has more than 200 offices in the following countries. Addresses, phone numbers, and fax numbers are listed on the Cisco Connection Online Web site at Argentina Australia Austria Belgium Brazil Canada Chile China Colombia Costa Rica Croatia Czech Republic Denmark Dubai, UAE Finland France Germany Greece Hong Kong Hungary India Indonesia Ireland Israel Italy Japan Korea Luxembourg Malaysia Mexico The Netherlands New Zealand Norway Peru Philippines Poland Portugal Puerto Rico Romania Russia Saudi Arabia Singapore Slovakia Slovenia South Africa Spain Sweden Switzerland Taiwan Thailand Turkey Ukraine United Kingdom United States Venezuela Copyright 1999 Cisco Systems, Inc. All rights reserved. Printed in USA. Access Registrar, AccessPath, Any to Any, AtmDirector, CCDA, CCDE, CCDP, CCIE, CCNA, CCNP, CCSI, CD-PAC, Centri, Cisco Certified Internetwork Expert logo, CiscoLink, the Cisco Management Connection logo, the Cisco NetWorks logo, the Cisco Powered Network logo, Cisco Systems Capital, the Cisco Systems Capital logo, the Cisco Technologies logo, ControlStream, Fast Step, FireRunner, Gigastack, IGX, JumpStart, Kernel Proxy, LoopRunner, MGX, Natural Network Viewer, NetSonar, Network Registrar, Packet, PIX, Point and Click Internetworking, Policy Builder, Precept, RouteStream, Secure Script, SMARTnet, SpeedRunner, Stratm, StreamView, The Cell, TrafficDirector, TransPath, ViewRunner, VirtualStream, VlanDirector, Workgroup Director, and Workgroup Stack are trademarks; Changing the Way We Work, Live, Play, and Learn, Empowering the Internet Generation, The Internet Economy, and The New Internet Economy are service marks; and BPX, Catalyst, Cisco, Cisco IOS, the Cisco IOS logo, Cisco Systems, the Cisco Systems logo, the Cisco Systems Cisco Press logo, Enterprise/Solver, EtherChannel, FastHub, ForeSight, FragmentFree, IOS, IP/TV, IPX, LightStream, LightSwitch, MICA, NetRanger, Phase/IP, Registrar, StrataSphere, and StrataView Plus are registered trademarks of Cisco Systems, Inc. in the U.S. and certain other countries. All other trademarks mentioned in this document are the property of their respective owners. 4/99 SP
OVERVIEW CISCO SMALL AND MEDIUM BUSINESS CLASS VOICE SOLUTIONS: CISCO CALLMANAGER EXPRESS BUNDLES COMPANY PROFILE Cisco CallManager Express (CME) promotional bundles are appropriate for small businesses
Phone Guide Customizing Your Cisco Unified IP Phone on the Web Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS
Cisco VPN Client User Guide for Linux and Solaris Release 4.0 Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS
Cisco Unified Communications Brochure Cisco Unified Communications To effectively excel in today s fast-paced world, employees must communicate and collaborate in every imaginable way, including mobile
Symantec Backup Exec 12 for Windows Small Business Server Premium and Standard Editions Comprehensive data protection and system recovery for Microsoft Windows Small Business Server Today s small businesses
Cisco Registered Envelope Service 4.4 Recipient Guide March 21, 2015 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800
WHITE PAPER Unified Communications: Comparing Cisco and Solutions Side-by-side comparison is conclusive: unlike Cisco, s all-in-one UC solution is designed to deliver lower total cost of ownership (TCO).
Siebel Security Guide Siebel Innovation Pack 2013 Version 8.1/8.2 September 2013 Copyright 2005, 2013 Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided
Symantec Encryption Management Server Administrator's Guide 3.3 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.
VMware Horizon 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this
IP TELEPHONY POCKET GUIDE BY BARRY CASTLE 2nd Edition September 2004 ShoreTel, Inc. 960 Stewart Drive Sunnyvale, CA 94085 408.331.3300 1.800.425.9385 www.shoretel.com email@example.com TABLE OF CONTENTS
This design guide provides guidelines and best practices for customer deployments of IP Security (IPsec) direct encapsulation VPNs. It is assumed that the reader has a basic understanding of IPsec. Contents
Proven Infrastructure Guide EMC VSPEX PRIVATE CLOUD VMware vsphere 5.5 for up to 1,000 Virtual Machines Enabled by Microsoft Windows Server 2012 R2, EMC VNX Series, and EMC Powered Backup EMC VSPEX Abstract
vshield Manager 5.0.1 vshield App 5.0.1 vshield Edge 5.0.1 vshield Endpoint 5.0.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
M86 MailMarshal Exchange USER GUIDE Software Version: 7.1 M86 MAILMARSHAL EXCHANGE USER GUIDE 2011 M86 Security All rights reserved. Published November 2011 for software release 7.1 No part of this Documentation
Microsoft System Center 2012 R2 Why Microsoft? For Virtualizing & Managing SharePoint July 2014 v1.0 2014 Microsoft Corporation. All rights reserved. This document is provided as-is. Information and views
Unitronics (1989) (R G) Ltd Periodic and Annual Report for 2013 On January 22, 2014 the Knesset s Finance Committee approved the small companies reporting reliefs in the framework of the Amendment of Securities
VISUAL PRODUCT MODELING SYSTEM (VP/MS) CRACK THE CODE FOR ADMINISTERING CALCULATIONS AND BUSINESS RULES CRACK THE CODE FOR ADMINISTERING CALCULATIONS AND BUSINESS RULES INCREASE SPEED WHILE REDUCING COSTS
IBM Storage Networking June 2001 Demystifying Storage Networking DAS, SAN, NAS, NAS Gateways, Fibre Channel, and iscsi by David Sacks IBM Storage Consultant Page 2 Contents 3 In a Nutshell 6 Introducing
Document Scope This solutions document describes how to deploy and manage SonicWALL s integrated VoIP security features to enable the secure deployment of VoIP communications in a variety of network environments.
Document Scope This solutions document describes how to deploy and manage SonicWALL s integrated VoIP security features to enable the secure deployment of VoIP communications in a variety of network environments.
Introduction By leveraging the inherent benefits of a virtualization based platform, a Microsoft Exchange Server 2007 deployment on VMware Infrastructure 3 offers a variety of availability and recovery