cc/td/doc
hometocprevnextglossaryfeedbacksearchhelp

Table of Contents

Cisco PIX Firewall Series

Cisco PIX Firewall Series

Product Overview

Cisco's PIX Firewall series delivers high security and fast performance to corporate networks. The firewalls allow you to thoroughly conceal your internal network from the outside world--providing full firewall security protection. Unlike typical CPU-intensive proxy servers that perform extensive processing on each data packet, the Cisco PIX Firewalls use a non-UNIX, secure, real-time, embedded system. This setup allows the Cisco PIX Firewall series to deliver the outstanding performance of more than 16,000 simultaneous connections, dramatically greater than any UNIX-based firewall.

For simplified management, the Cisco PIX Firewall series includes the Firewall Manager, a Java-based graphical user interface (GUI) configuration tool that lets you click on a PIX Firewall icon to retrieve, edit, and centrally manage security policies. With management reports, network managers can perform statistical analysis on unauthorized users, amounts of traffic, and event logging for potential cost accounting. Network managers can also use Universal Resource Locator (URL) accounting to monitor which Web sites their users visit most. And by setting thresholds, the Cisco PIX Firewall series can automatically provide real-time alerts of any attempted firewall breaches through e-mail or page notification. The Cisco PIX Firewall series can also block out unwanted Java applets.

The Cisco PIX Firewall series provides the following benefits:

The heart of the high performance of the Cisco PIX Firewall series is a protection scheme based on the adaptive security algorithm (ASA), which effectively protects access to an internal host network. The stateful, connection-oriented ASA approach to security builds session flows based on source and destination addresses, TCP sequence numbers (which are randomized), port numbers, and additional TCP flags. This information is stored in a table, and all inbound and outbound packets are compared against entries in the table. Access is permitted through the Cisco PIX Firewall series only if an appropriate connection exists to validate passage. This provides internal users and authorized external users transparent access to an organization, while protecting the internal network from unauthorized access.

Cisco's PIX Firewall series gains further dramatic performance advantage through a new feature called cut-though proxy. Whereas UNIX-based proxy servers are an ideal platform and can provide user authentication and maintain "state" (information about a packet's origin and destination) to offer good security, their performance suffers because they process all packets at the application layer (Layer 7) of the OSI model, which is highly CPU-intensive.

The cut-through proxy feature of the Cisco PIX Firewall, on the other hand, challenges a user initially at the application layer, like a proxy server. But once the user is authenticated against an industry-standard database based on Terminal Access Controller Access Control System (TACACS)+ or Remote Authentication Dial-In User Service (RADIUS), and access policy is checked, the Cisco PIX Firewall series shifts the session flow, and all traffic thereafter flows directly and quickly between the two parties, while maintaining session state without compromising any security over traditional proxy-based firewalls. This cut-through capability allows the Cisco PIX Firewall series to perform dramatically faster than proxy servers.

Cut-through proxy also saves installation and maintenance costs by leveraging an already-existing authorization database (based on TACACS+ or RADIUS) used for the dial-in communications server. Cisco Systems offers such an enterprise management authorization database/server called CiscoSecure Access Control Server. For more information on CiscoSecure Access Control Server, see "CiscoSecure Access Control Server v2.2 for UNIX (Solaris)" in the "CiscoSecure Access Control Server Software" chapter.

Beyond this high level of performance, the real-time embedded system also enhances the security of the Cisco PIX Firewall series. Although UNIX-based proxy servers are an ideal open development platform with widely available source code, such general-purpose operating systems provide less-than-optimum performance and security. The dedicated Cisco PIX Firewall series is designed specifically for secure, high-performance protection.

For even higher reliability, the Cisco PIX Firewall series is available with a failover/hot standby upgrade option, which eliminates a single point of failure. With two PIX Firewalls running in parallel, if one malfunctions, the second Cisco PIX Firewall transparently maintains security operations.

The Cisco PIX Firewall series also provides a feature to expand and reconfigure IP networks without being concerned about a shortage of IP addresses. Network address translation (NAT) makes it possible to use either existing IP addresses or the addresses set aside in the Internet Assigned Numbers Authority's (IANA's) reserve pool (RFC 1918). The PIX Firewall series can also selectively allow a mix of addresses to be translated or not translated, as needed.

Figure 12-3 shows a front view of the PIX Firewall, and Figure 12-4 shows a rear view.


Figure 12-3: PIX Firewall Front View




Figure 12-4:
PIX Firewall Rear View



Standard Features

The PIX Firewall series includes the following features:

Table 12-10 summarizes the PIX Firewall series features, and Table 12-11 lists the environmental specifications.


Table 12-10: Cisco PIX Firewall Series Summary of Features
Characteristic Description
Available software sessions: 64, 1024, 16,384
(based on simultaneous TCP/IP connections)
Network support 10/100BaseT Ethernet

4- to 16-Mbps Token Ring

Internet Protocol standards: IP, TCP, User Datagram Protocol (UDP), Internet Control Message Protocol (ICMP)

RJ-45

Hardware 19-in. rack-mount enclosure

DB-9 EIA/TIA-232 console port

3.5-in. diskette drive

Lockable front panel

Dimensions (H x W x D) 7 x 19 x 18.5 in. (17.8 x 48.3 x 47 cm)
Weight 21 lb (9.5 kg)
Power requirements 115 VAC ±10%, 47-63 Hz, 4.2A maximum

230 VAC ±10%, 47-63 Hz, 2.0A maximum

Agency approvals UL-1950 standard

CSA-EB-1402C standard

IEC-380/VDE-0806 standard

IEC-950/VDE-0805 EN-60-950 standard


Table 12-11: Cisco PIX Firewall Series Environmental Specifications
Description Specification
Temperature Operating: 32° to 113°F (0° to 45°C)

Storage: 14° to 167°F (-10° to 75°C)

Humidity Operating: 85%, maximum at 131°F (55°C)

Storage: 92%, maximum at 131°F (55°C)

Altitude Operating: 10,000 ft (3048 m)

Storage: 50,000 ft (15,240 m)

Hardware

The Cisco PIX Firewall series includes two hardware platforms: the original PIX Firewall and the high-end model 10000 Cisco PIX Firewall for higher network performance demands. Both platforms include Cisco's ASA software.

Also available is the Cisco PIX Private Link encryption card. With this card, companies can dramatically reduce telecommunications costs by having options to dedicated leased lines and sending encrypted IP packets over any public IP-based network, such as the Internet. With a Cisco PIX Private Link encryption card at each PIX Firewall site, companies can be assured of secure communications through the Internet. The encryption card uses the Data Encryption Standard (DES) algorithm and the Internet Engineering Task Force's (IETF's) Authentication Header/Encapsulating Security Payload (AH/ESP) protocols (RFCs 1826 and 1827, respectively).

Other products included in the Cisco PIX Firewall series are a 10/100-Mbps Ethernet network interface card (NIC), and a 4/16-Mbps Token Ring NIC. An optional cable supports a failover/hot standby firewall to eliminate a single point of failure.

Product Numbers

Table 12-12 lists the product numbers you can use to order the Cisco PIX Firewall series or upgrade an existing configuration. If a product number ends with an equal sign (=), the item can be ordered only as a spare. If a product number does not end with an equal sign, the item can be ordered as a spare or as a configurable part of a system order.

For documentation product numbers, refer to "Internet Products Documentation" in the "Documentation" chapter.


Table 12-12: Cisco PIX Firewall Series Product Numbers
Description Product Number
Base System
PIX Firewall, 133-MHz processor PIX
PIX Firewall, 200-MHz processor PIX10000
Software and Documentation, Version 4.0
64 simultaneous sessions SWPIX-64
1024 simultaneous sessions SWPIX-1K
16,384 simultaneous sessions SWPIX-UR
Software Upgrades and Updates, 4.0 Software
PIX software upgrade, 64 to 1024 sessions SWPIX-64-1K=
PIX software upgrade, 64 to 16,384 sessions SWPIX-64-UR=
PIX software upgrade, 1024 to 16,384 sessions SWPIX-1K-UR=
PIX software version update SWPIX-VER=
PIX Firewall documentation set DOC-PIX=
PIX Firewall Network Interfaces
10/100-Mbps Ethernet interface, RJ-45 PIX-1FE
4- or 16-Mbps Token Ring interface PIX-1TR
Memory Options
2-MB Flash upgrade kit--software V3.0 or later PIX-2FM-UPG=
Accessories
Private Link encryption PIX-PL
Failover upgrade kit--software V3.0 or later PIX-FO=
Service and Support
PIX SMARTnet maintenance

PIX On-Site maintenance

See the "Service and Support" chapter.

hometocprevnextglossaryfeedbacksearchhelp
Copyright 1989-1998 © Cisco Systems Inc.