Cisco PIX Firewall 500 Series



Similar documents
Cisco Secure PIX Firewall Series

Cisco PIX Firewall Series

Cisco PIX Firewall Series

Security Threats VPNs and IPSec AAA and Security Servers PIX and IOS Router Firewalls. Intrusion Detection Systems

Cisco PIX vs. Checkpoint Firewall

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

Cisco Secure PIX Firewall Series

Stateful Inspection Technology

Securing Networks with PIX and ASA

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.

SonicWALL Advantages Over WatchGuard

CiscoWorks Resource Manager Essentials 4.3

- Introduction to PIX/ASA Firewalls -

INTRODUCTION TO FIREWALL SECURITY

TABLE OF CONTENTS NETWORK SECURITY 1...1

TABLE OF CONTENTS NETWORK SECURITY 2...1

ACL Compliance Director FAQ

Print4 Solutions fully comply with all HIPAA regulations

ASA 8.3 and Later: Enable FTP/TFTP Services Configuration Example

Cisco SR 520-T1 Secure Router

Cisco ASA, PIX, and FWSM Firewall Handbook

Cisco VPN 3000 Concentrator Series

PIX/ASA 7.x and above: Mail (SMTP) Server Access on the DMZ Configuration Example

CiscoWorks Resource Manager Essentials 4.1

Flexible, Secure Operation

Chapter 1 Introduction

Cisco Application Networking Manager Version 2.0

Introduction to Network Address Translation

APV9650. Application Delivery Controller

Network Security 1. Module 8 Configure Filtering on a Router

Output Interpreter. SHOW RUNNING-CONFIG SECURITY Analysis SHOW RUNNING-CONFIG - FW Analysis. Back to top

Integrated Cisco Products

How Cisco IT Uses Firewalls to Protect Cisco Internet Access Locations

Load Balance Router R258V

PIX/ASA 7.x: Enable FTP/TFTP Services Configuration Example

The Cisco IOS Firewall feature set is supported on the following platforms: Cisco 2600 series Cisco 3600 series

Cisco Secure PIX Firewall Frequently Asked Questions

Network Defense Tools

CheckPoint FireWall-1 Version 3.0 Highlights Contents

Understanding the Cisco VPN Client

Cisco Certified Security Professional (CCSP) 50 Cragwood Rd, Suite 350 South Plainfield, NJ 07080

PIX/ASA 7.x and above : Mail (SMTP) Server Access on Inside Network Configuration Example

GFI Product Manual. Deployment Guide

Cisco Adaptive Security Device Manager Version 5.2F for Cisco Firewall Services Module Software Version 3.2

Firewall Architectures of E-Commerce

NETWORK MANAGEMENT SOLUTIONS

Cisco Secure PIX Firewall with Two Routers Configuration Example

Expertcity GoToMyPC and GraphOn GO-Global XP Enterprise Edition

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

FIREWALLS & CBAC. philip.heimer@hh.se

Cisco Secure ACS. By Igor Koudashev, Systems Engineer, Cisco Systems Australia 2006 Cisco Systems, Inc. All rights reserved.

Prisma IP Element Management System

Chapter 2 Introduction

Temperature Alert. LAN-based Temperature and Humidity Data Logger

Introduction of Intrusion Detection Systems

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD SEGURIDAD EN REDES. NIVEL I. VERSION 2.0

OS/390 Firewall Technology Overview

Using a Firewall General Configuration Guide

Cisco ACE 4710 Application Control Engine

Technical White Paper BlackBerry Enterprise Server

Classic IOS Firewall using CBACs Cisco and/or its affiliates. All rights reserved. 1

Tridium, Inc Westerre Parkway Suite 350 Richmond, Virginia USA Tridium, Inc. IT Manager s FREQUENTLY ASKED QUESTIONS

Cisco Nexus 7000 Series Supervisor Module

Technical White Paper

Stateful Inspection Technology

v Installation Guide for Websense Enterprise v Embedded on Cisco Content Engine with ACNS v.5.4

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

How To Monitor Cisco Secure Pix Firewall Using Ipsec And Snmp Through A Pix Tunnel

Emerson Smart Firewall

iguring an IPSec Tunnel Cisco Secure PIX Firewall to Checkp

IBM. Vulnerability scanning and best practices

Volume SYSLOG JUNCTION. User s Guide. User s Guide

ASA 8.3 and Later: Mail (SMTP) Server Access on Inside Network Configuration Example

Table of Contents. Cisco Configuring an IPSec LAN to LAN Tunnel for Cisco VPN 5000 Concentrator to Cisco Secure PIX Firewall

v5.2 Installation Guide for Websense Enterprise v5.2 Embedded on Cisco Content Engine

Gigabit Multi-Homing VPN Security Router

Proxy Server, Network Address Translator, Firewall. Proxy Server

Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)

PROTECTING NETWORKS WITH FIREWALLS

Firewall VPN Router. Quick Installation Guide M73-APO09-380

VPN. Date: 4/15/2004 By: Heena Patel

How To Use The Cisco Wide Area Application Services (Waas) Network Module

QuickSpecs. Overview. Compaq Remote Insight Lights-Out Edition

What is a Firewall? Computer Security. Firewalls. What is a Firewall? What is a Firewall?

Cisco 2600 Series Modular Access Routers

Firewalls (IPTABLES)

Job Aid Pre-Installation Information S8500 Media Server

Step-by-Step Configuration

Centralized Orchestration and Performance Monitoring

Bridgit Conferencing Software: Security, Firewalls, Bandwidth and Scalability

P and FTP Proxy caching Using a Cisco Cache Engine 550 an

Cisco RV 120W Wireless-N VPN Firewall

Placing the BlackBerry Enterprise Server for Microsoft Exchange in a demilitarized zone

Stateful Firewalls. Hank and Foo

Overview. Alarm console supports simultaneous viewing of both live and recorded video when alarm events are selected

INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM

Niagara IT Manager s Guide

The information in this document is based on these software and hardware versions:

Load Balancing for Microsoft Office Communication Server 2007 Release 2

District of Columbia Courts Attachment 1 Video Conference Bridge Infrastructure Equipment Performance Specification

Transcription:

Cisco PIX Firewall 500 Series Product Overview Cisco PIX Firewall is the high-performance, enterprise-class integrated hardware/software firewall within Cisco s firewall family. PIX Firewall delivers high security without impacting network performance. The product line scales to meet a range of customer requirements, with three capacity license levels accommodating more than 256,000 concurrent connections. PIX Firewall is a key element in the overall Cisco security solution set and, at the same time, it is the leading product in its segment of the firewall market. Figure 1 Figure 11-1: PIX Firewall Front View Figure 2 Figure 11-2: PIX Firewall Rear View Key Features and Benefits Non-UNIX, secure, real-time, embedded system This design eliminates the risks associated with a general purpose operating system and allows the Cisco PIX Firewall series to deliver outstanding performance more than 256,000 simultaneous connections[mdash]dramatically greater than any UNIX-based firewall. Less complex and more robust than packet-filtering; higher performance and more scalable than application proxy firewalls The heart of the PIX Firewall series is the adaptive security algorithm (ASA), which maintains the secure perimeters between the networks controlled by the firewall. The stateful, connection-oriented ASA design creates session flows based on source and destination addresses, TCP sequence numbers (which are non-predictable), port numbers, and additional TCP flags. All inbound and outbound traffic is controlled by applying security policy to connection table entries. User authentication and authorization with cut-through proxy Cisco s PIX Firewall series gains further dramatic performance advantage through its patented method of transparently verifying the identity of users at the firewall and permitting or denying access to any TCP- or UDP-based application. This method eliminates the price/performance impact UNIX-based firewalls impose in similar configurations, and leverages the authentication and authorization services of CiscoSecure Access Control Server. For more information on CiscoSecure Access Control Server, available for both Windows NT and UNIX (Solaris), see the chapter CiscoSecure Access Control Server Software. Centralized configuration and management with the PIX Firewall Manager This Java-based graphical user interface (GUI) configuration tool lets the administrator use a Web browser to retrieve, edit, and centrally manage security policies. Separate tabs provide access to configuration information common to all PIX Firewalls being managed and to built-in reports for user-based accounting for web sites visited and volume of files transferred. The PIX Firewall Manager can automatically provide real-time alerts of any attempted firewall breaches through e-mail or pager notification. Failover/hot standby upgrade option The PIX Firewall failover option ensures high availability and eliminates a single point of failure. With two PIX Firewalls running in parallel, if one malfunctions, the second PIX Firewall transparently maintains security operations. Synchronized configurations for effective recovery from hardware failure Simplified TFTP boot function allows consistent synchronization of multiple device configurations. 1

Specifications Hardware PIX Firewall Software Connection licenses available for 128, 1024, and Unrestricted (more than 256,000) simultaneous connections Adaptive security algorithm (ASA) Cut-through proxy authenticates, authorizes, and enhances performance Multiple interface support (10/100 Mbps ethernet, Token Ring, FDDI) Up to 4 interfaces Failover/hot standby; synchronized configurations True Network Address Translation (NAT) as specified in RFC 1631 Port Address Translation (PAT) further expands a company s address pool-one IP address supports more than 64,000 hosts Mail Guard removes need for external mail relay server in perimeter network TACACS+, Radius authentication DNS Guard transparently protects outbound name and address lookups Flood Guard and Fragmentation Guard protect against denial of service attacks Java blocking eliminates potentially dangerous Java applets (not compressed or archived) Extremely high-performance URL filtering that surpasses the competition in any enterprise-scale network Cisco IOS-style command-line interface Extended authentication, authorization, and accounting capabilities Net Aliasing transparently merges overlapping networks with the same IP address space Enhanced granularity of inbound access (conduits) No translation choice allows use of existing registered IP addresses Extended access lists Ability to customize protocol ports Support for private networking of virtual sites at greater than 45MB using Cisco proprietary Private Link 2. Enhanced customization of syslog messages Simple Network Management Protocol (SNMP) and syslog for remote management Reliable syslogging using either TCP or UDP Extended transparent application support (both with and without NAT enabled) includes: -Sun remote procedure call (RPC) -Microsoft Networking client and server communication (NetBIOS over IP) using NAT -Multimedia, including Progressive Networks RealAudio, Xing Technologies Streamworks, White Pines CuSeeMe, Vocal Tec s Internet Phone, VDOnet s VDOLive, Microsoft s NetShow, VXtreme Web Theatre 2; and Intel s Internet Video Phone and Microsoft s NetMeeting (based on H.323 standards) -Oracle SQL*Net client and server communication 2 Cisco Product Catalog, February 1999

PIX Firewall Manager Specifications Hosted on a Windows NT 4.0 platform (required) Service Pack 4 compliant Each PIX Firewall Manager supports up to 10 PIX Firewalls for full logging, and configuration for up to 256 PIX Firewalls E-mail and pager alarms can be set based on single events or after a threshold is reached Built-in reports to display FTP and URL activity per user on a daily basis All configuration information sent between PIX Firewalls and PIX Firewall Manager are protected by a shared secret/ secure hash algorithm (MD5) Strong authentication (one-time password) support for PIX Firewall management sessions can be provided by CiscoSecure or other TACACS+ or RADIUS server Table 1 Table 11-3: PIX Firewall 520 Characteristic Flash Memory DRAM Processor Type Software options Dimensions: (H x W x D) Weight Network Interface Cards (NICs) Encryption Card Performance Description 2 MB 32 MB upgrade to 128 MB available Intel Pentium II-based PIX Firewall v4.3 (Version 4.0 and later are supported) 5.22 inches x 6.75 inches x 17.675 inches 21 pounds (average shipping) Up to four single port 10/100 Ethernet NICs Up to three 4/16 Token Ring NICs Private Link 2 encryption card (56-bit DES) (45 MB) Up to 170 megabits per second, up to 256,000+ simultaneous connections, and up 5,000+ connections per second Table 2 Characteristic Table 11-4: PIX Firewall 520 Environmental Specifications Description AC input voltage/dc input voltage/amps Frequency Operating temperature range Nonoperating temperature range Operating humidity 100 to 240 VAC / -48 VDC, 4 amps / 4 to 2 amps 50-60 Hz 32 to 113 F (0 to 45 C) 14 to 167 F (-10 to 75 C) 95%, maximum at 131 F (55 C) Software Table 3 Model Table 11-5: Software Options for the Cisco PIX Firewall Series Software Options Cisco PIX Firewall 520 PIX Firewall v. 4.3 (Version 4.0 and later are supported) 3

Ordering Information Ordering Information For documentation product numbers, refer to Internet Products Documentation in the Documentation chapter. 4 Cisco Product Catalog, February 1999

Product and Part Numbers Table 0-4 Part Description Part Numbers for the PIX Firewall Part Number PIX Firewall, >170-Mbps performance PIX Firewall, >170-Mbps performance, -48VDC power PIX-520 PIX-520-DC PIX Firewall, >170-Mbps performance, spare PIX Firewall, >170-Mbps performance, -48VDC power, spare PIX Entry level license (recommended for up to 100 users. Allows 128 connections) PIX Midrange license (Recommended for between 100 and 500 users. Allows 1024 connections) PIX Unrestricted license (Recommended for 500 or more users. Allows from 32,768 to 256,000 connections) Failover cable PIX license upgrade from 128 to 1024 connections PIX license upgrade from 128 to 256,000 or more connections PIX license upgrade from 1024 to 256,000 or more connections PIX software version upgrade PIX 10/100 single port Ethernet card PIX-520= PIX-520-DC= PIX-CONN-128 PIX-CONN-1K PIX-CONN-UR PIX-FO= PIX-CONN-128-1K= PIX-CONN-128-UR= PIX-CONN-1K-UR= PIX-CONN-VER= PIX-1FE PIX Token Ring Card PIX 10/100 single port Ethernet card, spare PIX Token Ring Card, spare Private Link 2 56-bit DES encryption card Private Link 2 56-bit DES encryption card, spare Memory Upgrades Memory Upgrade to 128 MB for PIX Firewalls prior to the 5XX Series Memory Upgrade to 128 MB for 5XX Series PIX Firewalls PIX1TR PIX-1FE= PIX1TR= PIX-PL2 PIX-PL2= PIX-MEM-UPG-128= PIX-MEM-5XX-128= 5

Part Description Entry level PIX Firewall 520 with two 10/ 100 Ethernet NICs. Allows 128 connections, recommended for up to 100 users Midrange PIX Firewall 520 with two 10/ 100 Ethernet NICs. Allows 1024 connections, recommended for between 100 and 500 users Unrestricted PIX Firewall 520 with two 10/ 100 Ethernet NICs. Allows 256,000 connections, recommended for more than 500 users PIX software version to update inventory Part Number PIX-520-128-CH PIX-520-1K-CH PIX-520-UR-CH PIX-SW-SC= Services and Support Table 5 Table 11-6: Available Support Contracts for the Cisco PIX Firewall Series Description PIX Enhanced SMARTnet Maintenance-all versions PIX Premium SMARTnet Maintenance-all versions PIX On-site Standard Maintenance-all versions PIX On-site Enhanced Maintenance-all versions PIX On-site Premium Maintenance-all versions Product Number CON-SNTE-PIX CON-SNTP-PIX CON-OS-PIX CON-OSE-PIX CON-OSP-PIX The PIX Firewall series includes the following documentation: PIX Firewall Configuration Guide PIX Firewall Installation Guides PIX Firewall Quick Reference Guide PIX Firewall Release Notes PIX Firewall Manager Release Notes Regulatory Compliance and Safety Information 6 Cisco Product Catalog, February 1999