![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() |
Cisco's PIX Firewall series delivers high security and fast performance to corporate networks. The firewalls allow you to thoroughly conceal your internal network from the outside world--providing full firewall security protection. Unlike typical CPU-intensive proxy servers that perform extensive processing on each data packet, the Cisco PIX Firewalls use a non-UNIX, secure, real-time, embedded system. This setup allows the Cisco PIX Firewall series to deliver the outstanding performance of more than 16,000 simultaneous connections, dramatically greater than any UNIX-based firewall.
For simplified management, the Cisco PIX Firewall series includes the Firewall Manager, a Java-based graphical user interface (GUI) configuration tool that lets you click on a PIX Firewall icon to retrieve, edit, and centrally manage security policies. With management reports, network managers can perform statistical analysis on unauthorized users, amounts of traffic, and event logging for potential cost accounting. Network managers can also use Universal Resource Locator (URL) accounting to monitor which Web sites their users visit most. And by setting thresholds, the Cisco PIX Firewall series can automatically provide real-time alerts of any attempted firewall breaches through e-mail or page notification. The Cisco PIX Firewall series can also block out unwanted Java applets.
The Cisco PIX Firewall series provides the following benefits:
The heart of the high performance of the Cisco PIX Firewall series is a protection scheme based on the adaptive security algorithm (ASA), which effectively protects access to an internal host network. The stateful, connection-oriented ASA approach to security builds session flows based on source and destination addresses, TCP sequence numbers (which are randomized), port numbers, and additional TCP flags. This information is stored in a table, and all inbound and outbound packets are compared against entries in the table. Access is permitted through the Cisco PIX Firewall series only if an appropriate connection exists to validate passage. This provides internal users and authorized external users transparent access to an organization, while protecting the internal network from unauthorized access.
Cisco's PIX Firewall series gains further dramatic performance advantage through a new feature called cut-though proxy. Whereas UNIX-based proxy servers are an ideal platform and can provide user authentication and maintain "state" (information about a packet's origin and destination) to offer good security, their performance suffers because they process all packets at the application layer (Layer 7) of the OSI model, which is highly CPU-intensive.
The cut-through proxy feature of the Cisco PIX Firewall, on the other hand, challenges a user initially at the application layer, like a proxy server. But once the user is authenticated against an industry-standard database based on Terminal Access Controller Access Control System (TACACS)+ or Remote Authentication Dial-In User Service (RADIUS), and access policy is checked, the Cisco PIX Firewall series shifts the session flow, and all traffic thereafter flows directly and quickly between the two parties, while maintaining session state without compromising any security over traditional proxy-based firewalls. This cut-through capability allows the Cisco PIX Firewall series to perform dramatically faster than proxy servers.
Cut-through proxy also saves installation and maintenance costs by leveraging an already-existing authorization database (based on TACACS+ or RADIUS) used for the dial-in communications server. Cisco Systems offers such an enterprise management authorization database/server called CiscoSecure Access Control Server. For more information on CiscoSecure Access Control Server, see "CiscoSecure Access Control Server v2.2 for UNIX (Solaris)" in the "CiscoSecure Access Control Server Software" chapter.
Beyond this high level of performance, the real-time embedded system also enhances the security of the Cisco PIX Firewall series. Although UNIX-based proxy servers are an ideal open development platform with widely available source code, such general-purpose operating systems provide less-than-optimum performance and security. The dedicated Cisco PIX Firewall series is designed specifically for secure, high-performance protection.
For even higher reliability, the Cisco PIX Firewall series is available with a failover/hot standby upgrade option, which eliminates a single point of failure. With two PIX Firewalls running in parallel, if one malfunctions, the second Cisco PIX Firewall transparently maintains security operations.
The Cisco PIX Firewall series also provides a feature to expand and reconfigure IP networks without being concerned about a shortage of IP addresses. Network address translation (NAT) makes it possible to use either existing IP addresses or the addresses set aside in the Internet Assigned Numbers Authority's (IANA's) reserve pool (RFC 1918). The PIX Firewall series can also selectively allow a mix of addresses to be translated or not translated, as needed.
Figure 12-3 shows a front view of the PIX Firewall, and Figure 12-4 shows a rear view.
The PIX Firewall series includes the following features:
Table 12-10 summarizes the PIX Firewall series features, and Table 12-11 lists the environmental specifications.
Characteristic | Description |
---|---|
Available software sessions: | 64, 1024, 16,384 (based on simultaneous TCP/IP connections) |
Network support | 10/100BaseT Ethernet
4- to 16-Mbps Token Ring Internet Protocol standards: IP, TCP, User Datagram Protocol (UDP), Internet Control Message Protocol (ICMP) RJ-45 |
Hardware | 19-in. rack-mount enclosure
DB-9 EIA/TIA-232 console port 3.5-in. diskette drive Lockable front panel |
Dimensions (H x W x D) | 7 x 19 x 18.5 in. (17.8 x 48.3 x 47 cm) |
Weight | 21 lb (9.5 kg) |
Power requirements | 115 VAC ±10%, 47-63 Hz, 4.2A maximum
230 VAC ±10%, 47-63 Hz, 2.0A maximum |
Agency approvals | UL-1950 standard
CSA-EB-1402C standard IEC-380/VDE-0806 standard IEC-950/VDE-0805 EN-60-950 standard |
Description | Specification |
---|---|
Temperature | Operating: 32° to 113°F (0° to 45°C)
Storage: 14° to 167°F (-10° to 75°C) |
Humidity | Operating: 85%, maximum at 131°F (55°C)
Storage: 92%, maximum at 131°F (55°C) |
Altitude | Operating: 10,000 ft (3048 m)
Storage: 50,000 ft (15,240 m) |
The Cisco PIX Firewall series includes two hardware platforms: the original PIX Firewall and the high-end model 10000 Cisco PIX Firewall for higher network performance demands. Both platforms include Cisco's ASA software.
Also available is the Cisco PIX Private Link encryption card. With this card, companies can dramatically reduce telecommunications costs by having options to dedicated leased lines and sending encrypted IP packets over any public IP-based network, such as the Internet. With a Cisco PIX Private Link encryption card at each PIX Firewall site, companies can be assured of secure communications through the Internet. The encryption card uses the Data Encryption Standard (DES) algorithm and the Internet Engineering Task Force's (IETF's) Authentication Header/Encapsulating Security Payload (AH/ESP) protocols (RFCs 1826 and 1827, respectively).
Other products included in the Cisco PIX Firewall series are a 10/100-Mbps Ethernet network interface card (NIC), and a 4/16-Mbps Token Ring NIC. An optional cable supports a failover/hot standby firewall to eliminate a single point of failure.
Table 12-12 lists the product numbers you can use to order the Cisco PIX Firewall series or upgrade an existing configuration. If a product number ends with an equal sign (=), the item can be ordered only as a spare. If a product number does not end with an equal sign, the item can be ordered as a spare or as a configurable part of a system order.
For documentation product numbers, refer to "Internet Products Documentation" in the "Documentation" chapter.
Description | Product Number |
---|---|
Base System | |
PIX Firewall, 133-MHz processor | PIX |
PIX Firewall, 200-MHz processor | PIX10000 |
Software and Documentation, Version 4.0 | |
64 simultaneous sessions | SWPIX-64 |
1024 simultaneous sessions | SWPIX-1K |
16,384 simultaneous sessions | SWPIX-UR |
Software Upgrades and Updates, 4.0 Software | |
PIX software upgrade, 64 to 1024 sessions | SWPIX-64-1K= |
PIX software upgrade, 64 to 16,384 sessions | SWPIX-64-UR= |
PIX software upgrade, 1024 to 16,384 sessions | SWPIX-1K-UR= |
PIX software version update | SWPIX-VER= |
PIX Firewall documentation set | DOC-PIX= |
PIX Firewall Network Interfaces | |
10/100-Mbps Ethernet interface, RJ-45 | PIX-1FE |
4- or 16-Mbps Token Ring interface | PIX-1TR |
Memory Options | |
2-MB Flash upgrade kit--software V3.0 or later | PIX-2FM-UPG= |
Accessories | |
Private Link encryption | PIX-PL |
Failover upgrade kit--software V3.0 or later | PIX-FO= |
Service and Support | |
PIX SMARTnet maintenance
PIX On-Site maintenance | See the "Service and Support" chapter. |
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() |