<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA vs PIX in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-vs-pix/m-p/472030#M428487</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Marcus,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;May be my response is bit late but I think you might find it useful in your context. Some time back I wrote some comments on nww and they are given below:-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NETWORK WORLD NEWSLETTER: M. E. KABAY ON SECURITY&lt;/P&gt;&lt;P&gt;12/06/05&lt;/P&gt;&lt;P&gt;Today's focus:  Is Cisco's ASA a headache-in-waiting?&lt;/P&gt;&lt;P&gt;_______________________________________________________________&lt;/P&gt;&lt;P&gt;Today's focus:  Is Cisco's ASA a headache-in-waiting?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By M. E. Kabay&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Reader Noman Bari wrote to me some time ago from Karachi, &lt;/P&gt;&lt;P&gt;Pakistan, with a thoughtful comment on Cisco's new &lt;/P&gt;&lt;P&gt;multifunctional ASA security appliance.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Bari has a B.S. in Electronics and has the certifications CCNA, &lt;/P&gt;&lt;P&gt;CCDA, CCNP, CCDP, CCSA,CIW Security Analyst, CompTIA Linux+ &lt;/P&gt;&lt;P&gt;Certified and MCSE. With his kind permission and collaboration, &lt;/P&gt;&lt;P&gt;here are his thoughts:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;* * *&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am writing this e-mail to learn your views on a new security &lt;/P&gt;&lt;P&gt;box from Cisco. Adaptive Security Appliance (ASA) is a &lt;/P&gt;&lt;P&gt;multi-function security appliance which integrates firewall, &lt;/P&gt;&lt;P&gt;IPSec and SSL VPN, intrusion prevention, virus filtering and &lt;/P&gt;&lt;P&gt;network quarantine in a single device.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have been thinking about this development from Cisco. Surely &lt;/P&gt;&lt;P&gt;putting all the eggs in one basket is never a good idea.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If all the functionality of security is taken care of by one &lt;/P&gt;&lt;P&gt;single box and if that box gets compromised then it will be a &lt;/P&gt;&lt;P&gt;serious problem. It is widely known that there is no such thing &lt;/P&gt;&lt;P&gt;as 100% security. At some time in the near or distant future we &lt;/P&gt;&lt;P&gt;will hear that there are security holes found in the working of &lt;/P&gt;&lt;P&gt;ASA and they can lead to a security breach.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There will be critics who will say that since ASA comes with all &lt;/P&gt;&lt;P&gt;the bells and whistles it will be extremely hard if not &lt;/P&gt;&lt;P&gt;impossible to compromise its security. But what if a person with &lt;/P&gt;&lt;P&gt;malicious intent is able to do it? And this will happen - it's &lt;/P&gt;&lt;P&gt;just a matter of time.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The job of the marketing guys is to show everyone a rosy &lt;/P&gt;&lt;P&gt;picture. I am not blaming them; it's what they get paid for. But &lt;/P&gt;&lt;P&gt;it's our job as techies to filter out useful stuff from what &lt;/P&gt;&lt;P&gt;they say.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My analysis is that ASA is an excellent device for small to &lt;/P&gt;&lt;P&gt;midsize companies to save costs, for ease of management and so &lt;/P&gt;&lt;P&gt;on, depending upon the nature of their mission-critical work. &lt;/P&gt;&lt;P&gt;However, for enterprise-level security, I would rather go with a &lt;/P&gt;&lt;P&gt;layered approach with multiple defenses to protect my network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Although I am here in Karachi I believe that effective security &lt;/P&gt;&lt;P&gt;requirements are valid for every organization in any part of the &lt;/P&gt;&lt;P&gt;world. What you and Bruce Schneier write in your security &lt;/P&gt;&lt;P&gt;newsletters is equally useful for me here in Pakistan. My vision &lt;/P&gt;&lt;P&gt;gets broadened.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;* * *&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Need I [MK] say more? My only comment is "Wow! I got mentioned &lt;/P&gt;&lt;P&gt;in the same sentence as Bruce Schneier! Cool!" Well, OK, that's &lt;/P&gt;&lt;P&gt;not very useful for readers, so here's a link &lt;/P&gt;&lt;P&gt;&amp;lt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/ps6120/index.html" target="_blank"&gt;http://www.cisco.com/en/US/products/ps6120/index.html&lt;/A&gt;&amp;gt; to the &lt;/P&gt;&lt;P&gt;Cisco page describing their ASA 5500 product.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now take two of those and a glass of water and I'm sure you'll &lt;/P&gt;&lt;P&gt;be fine in the morning.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;_______________________________________________________________&lt;/P&gt;&lt;P&gt;To contact: M. E. Kabay&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;M. E. Kabay, Ph.D., CISSP-ISSMP, is Associate Professor in the &lt;/P&gt;&lt;P&gt;Division of Business and Management at Norwich University in &lt;/P&gt;&lt;P&gt;Northfield, Vt. Mich. and his Web site is&lt;/P&gt;&lt;P&gt;&amp;lt;&lt;A class="jive-link-custom" href="http://www2.norwich.edu/mkabay/index.htm" target="_blank"&gt;http://www2.norwich.edu/mkabay/index.htm&lt;/A&gt;&amp;gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;New information assurance journal - Norwich University Journal &lt;/P&gt;&lt;P&gt;of Information Assurance (NUJIA). See &lt;/P&gt;&lt;P&gt;&amp;lt;&lt;A class="jive-link-custom" href="http://nujia.norwich.edu/" target="_blank"&gt;http://nujia.norwich.edu/&lt;/A&gt;&amp;gt; &lt;/P&gt;&lt;P&gt;___________________________________________&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Noman Bari&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 09 Dec 2005 05:37:05 GMT</pubDate>
    <dc:creator>nomanbari</dc:creator>
    <dc:date>2005-12-09T05:37:05Z</dc:date>
    <item>
      <title>ASA vs PIX</title>
      <link>https://community.cisco.com/t5/network-security/asa-vs-pix/m-p/472025#M428475</link>
      <description>&lt;P&gt;We are in the process of building out our infrastucture to support 3rd parties.  In the design we will be adding either 525s for asa's.  I am interested in hearing peoples experiences with the ASA, being they are a new product.  Specifically the kinds of problems you may have run into.  &lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;marcus&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 08:29:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-vs-pix/m-p/472025#M428475</guid>
      <dc:creator>mgaysek</dc:creator>
      <dc:date>2020-02-21T08:29:49Z</dc:date>
    </item>
    <item>
      <title>Re: ASA vs PIX</title>
      <link>https://community.cisco.com/t5/network-security/asa-vs-pix/m-p/472026#M428477</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Marcus,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I dont think you will have any problems using ASA. ASA's are replicas of PIX V7.0 products. The biggest advantage of ASA will be a converged/scalable solution for your network, with the same box doing multiple functionalities. You can definitely save cost if you have an ASA box with SSM , instead of having a PIX and an IPS appliance...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would advice you to go to ASA. The only drawback i could see in ASA is the cost of the secondary box. YOu need to invest the same money as the primary box, which isnt the case in PIX. The positive side of this is, in case of emergencies, you can plug off the secondary ASA and use it as a fully functional box in any other network, unlike PIX failover unit (which cannot be used as a primary box)&lt;/P&gt;&lt;P&gt;Hope this helps.. all the best..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Raj&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Nov 2005 05:51:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-vs-pix/m-p/472026#M428477</guid>
      <dc:creator>sachinraja</dc:creator>
      <dc:date>2005-11-03T05:51:49Z</dc:date>
    </item>
    <item>
      <title>Re: ASA vs PIX</title>
      <link>https://community.cisco.com/t5/network-security/asa-vs-pix/m-p/472027#M428481</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;one more quesiton on ASA. We are planning to setup one small dedicated network in datacenter. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can we use ASA appliace without need of border router device? our datacetner provides fast ethernet feed to our cage and no intelligent routing needed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;regards&lt;/P&gt;&lt;P&gt;Rakesh&lt;/P&gt;&lt;P&gt;======&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Nov 2005 23:49:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-vs-pix/m-p/472027#M428481</guid>
      <dc:creator>egain.com</dc:creator>
      <dc:date>2005-11-04T23:49:47Z</dc:date>
    </item>
    <item>
      <title>Re: ASA vs PIX</title>
      <link>https://community.cisco.com/t5/network-security/asa-vs-pix/m-p/472028#M428482</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Rakesh,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes you can use it as a border device since your just accepting an ethernet connection and are basically a stub network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Patrick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Nov 2005 01:14:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-vs-pix/m-p/472028#M428482</guid>
      <dc:creator>Patrick Laidlaw</dc:creator>
      <dc:date>2005-11-11T01:14:58Z</dc:date>
    </item>
    <item>
      <title>Re: ASA vs PIX</title>
      <link>https://community.cisco.com/t5/network-security/asa-vs-pix/m-p/472029#M428484</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Actually, if you compare the price of a primary PIX 525 to an ASA 5540, the PIX is quite a bit more, but the secondary unit is much less. Whereas the ASA is less expensive but there is no 'Primary/Secondary' pricing. It ends up about the same for a redundant PIX or ASA (without the SSM).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Nov 2005 17:53:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-vs-pix/m-p/472029#M428484</guid>
      <dc:creator>fernandess</dc:creator>
      <dc:date>2005-11-14T17:53:43Z</dc:date>
    </item>
    <item>
      <title>Re: ASA vs PIX</title>
      <link>https://community.cisco.com/t5/network-security/asa-vs-pix/m-p/472030#M428487</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Marcus,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;May be my response is bit late but I think you might find it useful in your context. Some time back I wrote some comments on nww and they are given below:-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NETWORK WORLD NEWSLETTER: M. E. KABAY ON SECURITY&lt;/P&gt;&lt;P&gt;12/06/05&lt;/P&gt;&lt;P&gt;Today's focus:  Is Cisco's ASA a headache-in-waiting?&lt;/P&gt;&lt;P&gt;_______________________________________________________________&lt;/P&gt;&lt;P&gt;Today's focus:  Is Cisco's ASA a headache-in-waiting?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By M. E. Kabay&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Reader Noman Bari wrote to me some time ago from Karachi, &lt;/P&gt;&lt;P&gt;Pakistan, with a thoughtful comment on Cisco's new &lt;/P&gt;&lt;P&gt;multifunctional ASA security appliance.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Bari has a B.S. in Electronics and has the certifications CCNA, &lt;/P&gt;&lt;P&gt;CCDA, CCNP, CCDP, CCSA,CIW Security Analyst, CompTIA Linux+ &lt;/P&gt;&lt;P&gt;Certified and MCSE. With his kind permission and collaboration, &lt;/P&gt;&lt;P&gt;here are his thoughts:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;* * *&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am writing this e-mail to learn your views on a new security &lt;/P&gt;&lt;P&gt;box from Cisco. Adaptive Security Appliance (ASA) is a &lt;/P&gt;&lt;P&gt;multi-function security appliance which integrates firewall, &lt;/P&gt;&lt;P&gt;IPSec and SSL VPN, intrusion prevention, virus filtering and &lt;/P&gt;&lt;P&gt;network quarantine in a single device.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have been thinking about this development from Cisco. Surely &lt;/P&gt;&lt;P&gt;putting all the eggs in one basket is never a good idea.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If all the functionality of security is taken care of by one &lt;/P&gt;&lt;P&gt;single box and if that box gets compromised then it will be a &lt;/P&gt;&lt;P&gt;serious problem. It is widely known that there is no such thing &lt;/P&gt;&lt;P&gt;as 100% security. At some time in the near or distant future we &lt;/P&gt;&lt;P&gt;will hear that there are security holes found in the working of &lt;/P&gt;&lt;P&gt;ASA and they can lead to a security breach.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There will be critics who will say that since ASA comes with all &lt;/P&gt;&lt;P&gt;the bells and whistles it will be extremely hard if not &lt;/P&gt;&lt;P&gt;impossible to compromise its security. But what if a person with &lt;/P&gt;&lt;P&gt;malicious intent is able to do it? And this will happen - it's &lt;/P&gt;&lt;P&gt;just a matter of time.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The job of the marketing guys is to show everyone a rosy &lt;/P&gt;&lt;P&gt;picture. I am not blaming them; it's what they get paid for. But &lt;/P&gt;&lt;P&gt;it's our job as techies to filter out useful stuff from what &lt;/P&gt;&lt;P&gt;they say.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My analysis is that ASA is an excellent device for small to &lt;/P&gt;&lt;P&gt;midsize companies to save costs, for ease of management and so &lt;/P&gt;&lt;P&gt;on, depending upon the nature of their mission-critical work. &lt;/P&gt;&lt;P&gt;However, for enterprise-level security, I would rather go with a &lt;/P&gt;&lt;P&gt;layered approach with multiple defenses to protect my network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Although I am here in Karachi I believe that effective security &lt;/P&gt;&lt;P&gt;requirements are valid for every organization in any part of the &lt;/P&gt;&lt;P&gt;world. What you and Bruce Schneier write in your security &lt;/P&gt;&lt;P&gt;newsletters is equally useful for me here in Pakistan. My vision &lt;/P&gt;&lt;P&gt;gets broadened.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;* * *&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Need I [MK] say more? My only comment is "Wow! I got mentioned &lt;/P&gt;&lt;P&gt;in the same sentence as Bruce Schneier! Cool!" Well, OK, that's &lt;/P&gt;&lt;P&gt;not very useful for readers, so here's a link &lt;/P&gt;&lt;P&gt;&amp;lt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/ps6120/index.html" target="_blank"&gt;http://www.cisco.com/en/US/products/ps6120/index.html&lt;/A&gt;&amp;gt; to the &lt;/P&gt;&lt;P&gt;Cisco page describing their ASA 5500 product.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now take two of those and a glass of water and I'm sure you'll &lt;/P&gt;&lt;P&gt;be fine in the morning.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;_______________________________________________________________&lt;/P&gt;&lt;P&gt;To contact: M. E. Kabay&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;M. E. Kabay, Ph.D., CISSP-ISSMP, is Associate Professor in the &lt;/P&gt;&lt;P&gt;Division of Business and Management at Norwich University in &lt;/P&gt;&lt;P&gt;Northfield, Vt. Mich. and his Web site is&lt;/P&gt;&lt;P&gt;&amp;lt;&lt;A class="jive-link-custom" href="http://www2.norwich.edu/mkabay/index.htm" target="_blank"&gt;http://www2.norwich.edu/mkabay/index.htm&lt;/A&gt;&amp;gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;New information assurance journal - Norwich University Journal &lt;/P&gt;&lt;P&gt;of Information Assurance (NUJIA). See &lt;/P&gt;&lt;P&gt;&amp;lt;&lt;A class="jive-link-custom" href="http://nujia.norwich.edu/" target="_blank"&gt;http://nujia.norwich.edu/&lt;/A&gt;&amp;gt; &lt;/P&gt;&lt;P&gt;___________________________________________&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Noman Bari&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Dec 2005 05:37:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-vs-pix/m-p/472030#M428487</guid>
      <dc:creator>nomanbari</dc:creator>
      <dc:date>2005-12-09T05:37:05Z</dc:date>
    </item>
  </channel>
</rss>

