[c-nsp] OT: Check Point v Cisco PIX (ASA 5500 Series)

Javier Liendo javier at liendo.net
Fri Apr 4 10:31:30 EDT 2008


>> don't send out RSTs to denied connections, and other such fun stuff.

for a firewall, not sending an RST for a denied connection, isn´t it
the "Right Thing" to do?

regards

javier

On 4/4/08, nick.nauwelaerts at thomson.com <nick.nauwelaerts at thomson.com> wrote:
> > -----Original Message-----
>  > From: cisco-nsp-bounces at puck.nether.net
>  > [mailto:cisco-nsp-bounces at puck.nether.net] On Behalf Of
>  > Jarrod Friedland
>  > Sent: Friday, April 04, 2008 03:18
>  > To: cisco-nsp at puck.nether.net
>  > Subject: [c-nsp] OT: Check Point v Cisco PIX (ASA 5500 Series)
>  >
>  > Hi All
>  >
>  > I wonder if anyone can offer me some sound professional
>  > opinion in terms of
>  > using a Check Point FW device v Cisco PIX (ASA 5500 Series) Devices.
>  >
>  > Currently we are using Checkpoint Devices however, I have an
>  > opportunity to
>  > possible include a pix device in our mix, however all my
>  > reading thus far
>  > seems to be more based on personal opinion than operational
>  > pro's and con's.
>  >
>  > Im looking for info in relation to can do's and cannots -
>  > Administration
>  > comparisons etc.
>  >
>  > If you are able to offer some insight but would like to take
>  > this offline,
>  > please let me know and I can send you my direct contact details.
>
>
> Since we're using both checkpoint & asas, here's what I think about
>  them. We only use them for ipsec (enduser & site to site) and packet
>  filtering. All kinds of protocol inspection run on seperate proxies,
>  where they belong.
>
>  Checkpoint has a great log viewer, but that's just about all I can say
>  in their favor. They don't know how to apply rulesets to interfaces,
>  just globally. Setting up vpns is a pain because they like to send out
>  strange subnet configs. They're horribly expensive (we ran them on
>  Nokia's, whose network cards do not support autoneg btw). Their support
>  is pretty terrible as well. They also need arcane changes to their
>  backend firewall database whenever something doesn't go as expected.
>
>  Cisco ASAs are pretty cheap and have reasonable performance, but has
>  lots of strange quirks. They don't decrement TTL by default (and I still
>  haven't found a way to decrement it over vpn connections), handling icmp
>  errors is a black art (still haven't gotten mtr working through asa's),
>  do strange things with your tcp MSS, don't send out RSTs to denied
>  connections, and other such fun stuff. Most of there can be configured
>  to work correctly, but they're far from the default. Cisco's central
>  management tool (Cisco Security Manager) is pretty horrible, I guess the
>  lag is about 1 year between when the ASA gets a new feature and when
>  Security Manager learns how to use it. On the other hand, the free gui
>  (asdm) is pretty decent, and unliky checkpoint it comes with a cli.
>  Software updates & fixes don't get released as often as checkpoint,
>  which I consider a downside for the ASAs.
>
>  I still think ASAs are a step up from checkpoint gear, but neither are
>  great. I'm seriously considering netscreens for my next rollouts.
>
>  If I ever manage to convince the upper echelons here, I'd go with pf on
>  either openbsd & freebsd.
>
>  // nick
>
> _______________________________________________
>  cisco-nsp mailing list  cisco-nsp at puck.nether.net
>  https://puck.nether.net/mailman/listinfo/cisco-nsp
>  archive at http://puck.nether.net/pipermail/cisco-nsp/
>


More information about the cisco-nsp mailing list