:: Home Page            
 Advertise your Business Here     
Browse  |   Placement Papers  |   Company  |   Code Snippets  |   Certifications  |   Visa Questions
Post Question  |   Post Answer  |   My Panel  |   Search  |   Articles  |   Topics  |   ERRORS new
   Refer this Site  Refer This Site to Your Friends  Site Map  Bookmark this Site  Set it as your HomePage  Contact Us     Login  |  Sign Up                      
Categories >> Certifications >> Certifications AllOther


 Cisco Certifications interview questions  Cisco Certifications Interview Questions (1971)
 Microsoft Certifications interview questions  Microsoft Certifications Interview Questions (166)
 Sun Certifications interview questions  Sun Certifications Interview Questions (41)
 CISA Certification interview questions  CISA Certification Interview Questions (722)
 Oracle Certifications interview questions  Oracle Certifications Interview Questions (57)
 ISTQB Certification interview questions  ISTQB Certification Interview Questions (105)
 Certifications AllOther interview questions  Certifications AllOther Interview Questions (260)
What is the difference between cisco pix and cisco ASA ?
 Question Submitted By :: Certifications-AllOther
I also faced this Question!!     Answer Posted By  
# 1
6. Difference between PIX and ASA

Cisco PIX:

Is a dedicated hardware firewall appliance

Act as a Stateful packet filtering firewall.

Use PIX operating system similar in interface to
Cisco IOS .

Use PIX Device Manager (PDM) for a graphical

Provide stateful firewall protection and IP Security
(IPSec) VPN capabilities

To ensure the security PIX use inside interface ,
outside interface etc concepts

Pix running in 6.3 v

Not supported WebVPN

Not support Transparent Firewall, Security Context
and Modular Policy


Cisco ASA:

Is firewall and anti-malware security appliance

The Enterprise Editions include four versions:
Firewall, IPS, Anti-X, and VPN.

ASA can also serve as an intrusion prevention system
(IPS) and VPN concentrator.

Also covers new threats to a network like viruses,
worms, unwanted applications (e.g., P2P, games, instant
messaging), phishing, and application-layer attacks.

Act as an all-in-one deviceor a unified threat
management (UTM) device

ASA running in 7.2 v

Supporting Web VPN

Supporting Transparent Firewall, Security Context and
Modular Policy

Is This Answer Correct ?    37 Yes 4 No
# 2
PIX works with PIX OS,ASA works with cisco IOS(7.2.2)
both are stateful firewalls default PIX support
stateful inspection,but ASA needs CSC-SSM Module to support .
Is This Answer Correct ?    25 Yes 27 No

Other Certifications AllOther Interview Questions
  Question Asked @ Answers
Dear Friends, Currently i m working as Business Analyst in a Bangalore based organization. Can you anyone tell what are the certifications available for a Business Analyst? I got few, but i m not sure how to proceed further. Please help tech geeks. Thanks in advance. Cheers, Ganesh email: GalaxE 1
What is the Effect of not Typing Formal parameters in a Form? a) Conversion always occurs b) Conversion never occurs c) Forms are more flexible but prone to a short dump if conversion does not work d) No effect e) Forms are less flexible and are guaranteed no chance of a run time error Note: Please answer only if you are very sure. Else pls ignore. SAP-Labs 1
I am Raghu, I want 2 know about Redhat certification and 2days scop.   1
What is difference between PIX and ASA firewall HCL 1
how to answer in an interview?when they asking me tell about your self?hobbies?year gape?strength?weaknees? HCL 1
can i see the hindi sahitya sammelan 2010 papers plz   1
Is it Possible to Create Asset Classes Automatically?   1
Hi, I want to join in best training center for Informatica course in Chennai. Who really teaches well So please let me know. Thanks, Raji   18
i am planning to give cognos cerification exam can u please help me question guide   1
Reg:Online E-learning Professional Programs   1
Which statements are allowed if you are working with an internal table of type sorted? More than one answer is correct. a) Append b) Collect c) Sort d) Read e) Modify Note: I checked the and i came to know that we can use Collect, read , Append, Modify. Just "Sort" alone cannot be used. But if you are going to say we cant append, and we cant modify then double check your answers . Also post a link from where you got the information. SAP-Labs 1
For more Certifications AllOther Interview Questions Click Here 

Copyright Policy  |  Terms of Service  |  Articles  |  Site Map  |  RSS Site Map  |  Contact Us
Copyright 2013  All Rights Reserved.   ::