Cisco PIX vs. Checkpoint Firewall



Similar documents
Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

Stateful Inspection Technology

Securing Networks with PIX and ASA

INTRODUCTION TO FIREWALL SECURITY

FIREWALLS & CBAC. philip.heimer@hh.se

Polycom. RealPresence Ready Firewall Traversal Tips

Security Technology: Firewalls and VPNs

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Firewalls. Chapter 3

- Introduction to PIX/ASA Firewalls -

Configuring the BIG-IP and Check Point VPN-1 /FireWall-1

8. Firewall Design & Implementation

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

Distributed Systems. Firewalls: Defending the Network. Paul Krzyzanowski

Firewalls. Network Security. Firewalls Defined. Firewalls

Firewall Design Principles

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

SFWR ENG 4C03 Class Project Firewall Design Principals Arash Kamyab March 04, 2004

Network Defense Tools

Securizarea Calculatoarelor și a Rețelelor 13. Implementarea tehnologiei firewall CBAC pentru protejarea rețelei

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall

OS/390 Firewall Technology Overview

CSCI Firewalls and Packet Filtering

Security threats and network. Software firewall. Hardware firewall. Firewalls

Firewalls. Ahmad Almulhem March 10, 2012

Firewalls and System Protection

CMPT 471 Networking II

What is a Firewall? Computer Security. Firewalls. What is a Firewall? What is a Firewall?

Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)

CSCE 465 Computer & Network Security

Firewall Configuration. Firewall Configuration. Solution Firewall Principles

Firewalls. Ola Flygt Växjö University, Sweden Firewall Design Principles

NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9

Network Services Internet VPN

Firewalls. Ingress Filtering. Ingress Filtering. Network Security. Firewalls. Access lists Ingress filtering. Egress filtering NAT

Chapter 5. Figure 5-1: Border Firewall. Firewalls. Figure 5-1: Border Firewall. Figure 5-1: Border Firewall. Figure 5-1: Border Firewall

Application Note. Stateful Firewall, IPS or IDS Load- Balancing

Security Threats VPNs and IPSec AAA and Security Servers PIX and IOS Router Firewalls. Intrusion Detection Systems

How To Build A Network Security Firewall

Firewalls P+S Linux Router & Firewall 2013

Cisco Firewall Technology

Internet Security Firewalls

CheckPoint FireWall-1 Version 3.0 Highlights Contents

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

12. Firewalls Content

Cisco Secure PIX Firewall with Two Routers Configuration Example

Firewalls. ITS335: IT Security. Sirindhorn International Institute of Technology Thammasat University ITS335. Firewalls. Characteristics.

Firewalls. Contents. ITS335: IT Security. Firewall Characteristics. Types of Firewalls. Firewall Locations. Summary

Overview - Using ADAMS With a Firewall

Overview - Using ADAMS With a Firewall

Check Point FireWall-1 White Paper

Troubleshooting BlackBerry Enterprise Service 10 version Instructor Manual

Cisco Certified Security Professional (CCSP) 50 Cragwood Rd, Suite 350 South Plainfield, NJ 07080

ΕΠΛ 674: Εργαστήριο 5 Firewalls

How To Protect Your Network From Attack

CSE 4482 Computer Security Management: Assessment and Forensics. Protection Mechanisms: Firewalls

ANNEXURE TO TENDER NO. MRPU/IGCAR/COMP/5239

Chapter 7. Firewalls

Niagara IT Manager s Guide

A Prevention & Notification System By Using Firewall. Log Data. Pilan Lin

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Firewalls (IPTABLES)

CSE331: Introduction to Networks and Security. Lecture 12 Fall 2006

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

Deploying Firewalls Throughout Your Organization

FIREWALL AND NAT Lecture 7a

Introduction to Firewalls

Application Firewalls

Basic Network Configuration

How Cisco IT Uses Firewalls to Protect Cisco Internet Access Locations

NEFSIS DEDICATED SERVER

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP

Enterprise Security Management CheckPoint SecuRemote VPN v4.0 for pcanywhere

Firewalls. Pehr Söderman KTH-CSC

Ford ANX Troubleshooting Procedure for use by Trading Partners

ΕΠΛ 475: Εργαστήριο 9 Firewalls Τοίχοι πυρασφάλειας. University of Cyprus Department of Computer Science

Chapter 9 Firewalls and Intrusion Prevention Systems

Internetwork Expert s CCNA Security Bootcamp. IOS Firewall Feature Set. Firewall Design Overview

Technical Note. ForeScout CounterACT: Virtual Firewall

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Firewalls. Firewalls. Idea: separate local network from the Internet 2/24/15. Intranet DMZ. Trusted hosts and networks. Firewall.

Agenda. Understanding of Firewall s definition and Categorization. Understanding of Firewall s Deployment Architectures

OLD DOMINION UNIVERSITY Router-Switch Best Practices. (last updated : )

Building Your Firewall Rulebase Lance Spitzner Last Modified: January 26, 2000

ACL Compliance Director FAQ

Cisco Certified Security Professional (CCSP)

Cisco ASA, PIX, and FWSM Firewall Handbook

Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 22 Firewalls.

Firewall Defaults, Public Server Rule, and Secondary WAN IP Address

Transcription:

Cisco PIX vs. Checkpoint Firewall Introduction Firewall technology ranges from packet filtering to application-layer proxies, to Stateful inspection; each technique gleaning the benefits from its predecessor. Stateful inspection works at the network layer and does not require a separate proxy for each application. This technology does not suffer from the same degradation in performance as application-level technology (proxies), which involves the extra overhead of transporting data up to the application layer. And on the contrary of packet filters it has the ability to maintain session state and therefore increase the security level of a network transaction. Checkpoint Firewall-1 Checkpoint FW-1 has been the firewall market leader since shortly after its introduction in 1994/95. Its well-designed GUI interface was, and still is, the best visual interface to any firewall product. This intuitive interface makes FW-1 easy to work with even for those new to firewalls. FireWall-1 is based upon Stateful Inspection technology, the de facto standard for firewalls. Invented by Check Point, Stateful Inspection provides the highest level of security. FireWall-1 s scalable, modular architecture enables an organization to define and implement a single, centrally managed Security Policy. The enterprise Security Policy is defined on a central management server trough a GUI and downloaded to multiple enforcement points (Inspection Modules) throughout the network. The FireWall-1 Inspection Module is located in the operating system (NT or UNIX operating systems) kernel at the lowest software level. The Inspection Module analyzes all packets before they reach the gateway operating systems. Packets are not processed by any of the higher protocol layers unless FireWall-1 verifies that they comply with the Inspection Module security policy (it examines communications from any IP protocol or application, including stateless protocols, such as UDP and RPC) PIX Firewall Originally designed to be a network address translator, Cisco introduced the Private Internet Exchange (PIX) Firewall series in 1994. The PIX Firewall is a high-performance firewall that uses Stateful packet filtering. The PIX Firewall is essentially a firewall appliance"--it has its own integrated hardware/software solution (Intel hardware / proprietary OS). The PIX Firewall is not Unix or NT-based, but is based on a secure, real-time embedded system, known as the Adaptive Security Algorithm (ASA), which offers Stateful inspection technology. ASA tracks the source and destination address,

TCP sequence numbers, port numbers, and additional TCP flags. All inbound and outbound traffic is controlled by applying the security policy to connection table entries, which house the information. Access is permitted through the PIX Firewall only if a connection has been validated or if it has been explicitly configured. Comparison PIX and checkpoint FW-1 are using similar technologies in that both use smart packet filtering technologies (Stateful technology). There are several key differences: one is that FW1 uses a general-purpose operating system while Cisco's PIX uses an embedded operating system. Another is that the PIX is essentially a "diode": you define a security level for an interface, and anything from a higher (internal=100) to a lower (external=0) is allowed while lower (external) to higher (internal) is blocked (with coding for exception); with FW1 there are no native directions, and everything must be coded. (For this reason, FW1 can be found much more flexible) The license structure on the PIX is per-connection; the license structure on FW1 is per protected host. All other things being equal, maintenance is much easier on the PIX, and performance is higher on the PIX. Cisco has recently released a host-to-lan encryption solution; FW1 has such a solution for a long time now (SecuRemote for windows boxes). FW1 has extra features such as bandwidth management (floodgate) or content vectoring servers and others (see OPSEC products). Note that FW1 is developed in a Unix environment. The Unix implementation is more efficient, more mature, and more stable. It is wrong to go with NT unless the client swears he can support NT and is afraid of Unix. Also, comparing FW1 on a switch or on a NOKIA box versus the PIX could be kind of an interesting comparison.

PIX Pros: 1) Minimal configuration if you have few or zero internal devices that needs to be accessed directly from the Internet (i.e. web servers on a protected DMZ) and want to allow everything outbound. 2) Complete hardware/software solution, no additional OS vulnerabilities or boot-time errors to worry about. 3) Cisco support, which is generally very good. 4) Performance, probably the best in the business. 5) No special client side software other than telnet, tftp or serial port terminal software. 6) Lots of detailed documentation. 7) Free upgrades PIX Cons: 1) Difficult to manage if you have many servers on a protected DMZ (lots and lots of conduit statements) or many firewalls to manage. 2) Routing limitation in complex network architectures (Need to add a router for EACH segment). 3) Command line (IOS style) based. Cisco GUI manager (PIX Firewall Manager) is currently in its early releases and not as functional as FW-1's. 4) No ability to off-load layer 7 services like: virus scanning, URL filtering, etc. You can filter on outgoing traffic, but the process is not dynamic. 5) Requires a separate syslog server for logging. 6) No source port filtering. 8) No clear documentation (Cisco's documentation is often conflicting, fails to explain which version of the PIX OS a certain configuration will or will not work under, and seems to be constantly changing).

FW-1 Pros: 1) Very functional GUI interface. 2) Based on Stateful inspection like PIX, but can off-load layer 7 inspection to other servers if required. 3) Lots of features for complex environments like: large protected DMZ, Windows VPN support, firewall synchronization, bi-directional NAT, etc. 4) Can be used to control bi-directional traffic. 5) Complex logging provided on management station. FW-1 Cons: 1) Must account for OS vulnerabilities as well as FW-1 vulnerabilities. 2) Performance on NT not as good as on Unix or the PIX. 3) Support is only through re-sellers, very expensive (Contracts start at 50% of the price of the original software per year) and needed for products upgrades. 4) OS boot-time errors possibilities. NB: PIX can filter java but no ActiveX or JavaScript filtering yet. (Although FW-1 can) Conclusion In the simplest terms, FW-1 can be considered much more functional than the PIX, while the PIX has better performance and support. If your particular environment requires a lot of functionality, the best choice is the FW-1 solution, although you might want to consider running it on a Unix platform rather than a NT platform. If your environment is pretty simple, PIX is a solid solution with very good performance.

Checkpoint Firewall-1 links Main site: http://www.checkpoint.com/products/firewall-1/ Public Support: http://www.checkpoint.com/techsupport/ Unofficial FAQ: http://www.phoneboy.com/fw1/ http://www.deathstar.ch/security/fw1/ Unofficial mailing list archive: http://msgs.securepoint.com/fw1/ Cisco PIX firewall links Main site: http://www.cisco.com/warp/public/cc/pd/fw/sqfw500/ FAQ: http://www.cisco.com/warp/public/110/pixfaq.html Several useful papers: http://www.cisco.com/warp/public/110/index.shtml#pix Documentation: http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/ Top issues: http://www.cisco.com/warp/public/110/top_issues/pix/pix_index.shtml