<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Difference between PIX and Checkpoint Firewall in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/difference-between-pix-and-checkpoint-firewall/m-p/34506#M680436</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you, it helped me alot&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 05 Nov 2001 22:20:04 GMT</pubDate>
    <dc:creator>vkartik</dc:creator>
    <dc:date>2001-11-05T22:20:04Z</dc:date>
    <item>
      <title>Difference between PIX and Checkpoint Firewall</title>
      <link>https://community.cisco.com/t5/network-security/difference-between-pix-and-checkpoint-firewall/m-p/34504#M680434</link>
      <description>&lt;P&gt;Can somebody please tell the difference between the &lt;/P&gt;&lt;P&gt;PIX Firewall and CheckPoint Firewall? &lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;P&gt;Kartik&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 05:53:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/difference-between-pix-and-checkpoint-firewall/m-p/34504#M680434</guid>
      <dc:creator>vkartik</dc:creator>
      <dc:date>2020-02-21T05:53:45Z</dc:date>
    </item>
    <item>
      <title>Re: Difference between PIX and Checkpoint Firewall</title>
      <link>https://community.cisco.com/t5/network-security/difference-between-pix-and-checkpoint-firewall/m-p/34505#M680435</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Kartik,&lt;/P&gt;&lt;P&gt;   Let me give you a textbook answer.  For reference, this info comes directly from the book "Firewalls 24seven" by Sybex press.&lt;/P&gt;&lt;P&gt;Checkpoint Firewall-1 Major Feature set:&lt;/P&gt;&lt;P&gt;1.  Stateful packet filter&lt;/P&gt;&lt;P&gt;2.  Protocol specific content filters (HTTP, SMTP)&lt;/P&gt;&lt;P&gt;3.  NAT&lt;/P&gt;&lt;P&gt;4.  VPN firewall-to-firewall and firewall-to-remote client&lt;/P&gt;&lt;P&gt;5.  User authentication handled transparently throught the various protocol content filters&lt;/P&gt;&lt;P&gt;Some of the minor features:&lt;/P&gt;&lt;P&gt;1.  Policy-based configuration and management&lt;/P&gt;&lt;P&gt;2.  Content vectoring protocol (Lets you strip e-mail attachments, block URL's, etc.)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX Major Feature Set:&lt;/P&gt;&lt;P&gt;1.  Stateful inspection filter&lt;/P&gt;&lt;P&gt;2.  NAT&lt;/P&gt;&lt;P&gt;3.  Authentication&lt;/P&gt;&lt;P&gt;4.  VPN&lt;/P&gt;&lt;P&gt;5.  Probably the fastest firewall on the market&lt;/P&gt;&lt;P&gt;6.  Support for external security proxies and content filters&lt;/P&gt;&lt;P&gt;PIX Minor features&lt;/P&gt;&lt;P&gt;1.  High availability&lt;/P&gt;&lt;P&gt;2.  Support for four security zones&lt;/P&gt;&lt;P&gt;3.  Java filter.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just to add one thing -- I have used both software firewalls and now have a PIX.  I will never go back to the software firewall.  The PIX is quite a bit harder to configure (lack of GUI, you know), but I like it a lot better (SPEEEEEEED).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope I have helped a little.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 Nov 2001 21:30:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/difference-between-pix-and-checkpoint-firewall/m-p/34505#M680435</guid>
      <dc:creator>edmonds_robert</dc:creator>
      <dc:date>2001-11-05T21:30:44Z</dc:date>
    </item>
    <item>
      <title>Re: Difference between PIX and Checkpoint Firewall</title>
      <link>https://community.cisco.com/t5/network-security/difference-between-pix-and-checkpoint-firewall/m-p/34506#M680436</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you, it helped me alot&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 Nov 2001 22:20:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/difference-between-pix-and-checkpoint-firewall/m-p/34506#M680436</guid>
      <dc:creator>vkartik</dc:creator>
      <dc:date>2001-11-05T22:20:04Z</dc:date>
    </item>
    <item>
      <title>Re: Difference between PIX and Checkpoint Firewall</title>
      <link>https://community.cisco.com/t5/network-security/difference-between-pix-and-checkpoint-firewall/m-p/34507#M680437</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What about CheckPoint running on Nokia IP xxx (not sure about the number)?  What is your opinion on that?  Does it work better than Cisco VPN Concetrator?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Nov 2001 00:48:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/difference-between-pix-and-checkpoint-firewall/m-p/34507#M680437</guid>
      <dc:creator>leo.vaughn</dc:creator>
      <dc:date>2001-11-06T00:48:40Z</dc:date>
    </item>
    <item>
      <title>Re: Difference between PIX and Checkpoint Firewall</title>
      <link>https://community.cisco.com/t5/network-security/difference-between-pix-and-checkpoint-firewall/m-p/34508#M680438</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;VPN concentrator is not a firewall and so it's not comparable.&lt;/P&gt;&lt;P&gt;I installed PIX and VPN concentrator in parallel inn order to get one secure access point to Internet (PIX) and two secure VPN access points from Internet (PIX and VPN c'r).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Furthermore, an operation of two such different companies (Nokia and Checkpoint) does not convince me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;P&gt;Maurizio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Nov 2001 09:09:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/difference-between-pix-and-checkpoint-firewall/m-p/34508#M680438</guid>
      <dc:creator>murriware</dc:creator>
      <dc:date>2001-11-06T09:09:17Z</dc:date>
    </item>
    <item>
      <title>Re: Difference between PIX and Checkpoint Firewall</title>
      <link>https://community.cisco.com/t5/network-security/difference-between-pix-and-checkpoint-firewall/m-p/34509#M680439</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Robert ,&lt;/P&gt;&lt;P&gt;I would like ask you about some information/experience with PIX workinf with a AntiVirus throw Content Vectoring Protocol.&lt;/P&gt;&lt;P&gt;Thank you advance, Tomas  [&lt;A href="mailto:kudtom@hotmail.com"&gt;kudtom@hotmail.com&lt;/A&gt;]&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Nov 2001 10:38:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/difference-between-pix-and-checkpoint-firewall/m-p/34509#M680439</guid>
      <dc:creator>mmensik</dc:creator>
      <dc:date>2001-11-07T10:38:39Z</dc:date>
    </item>
  </channel>
</rss>

