What is the difference between cisco pix and cisco ASA ?
Answers were Sorted based on User's Feedback
Answer / lingam
6. Difference between PIX and ASA
Cisco PIX:
Ø Is a dedicated hardware firewall appliance
Ø Act as a Stateful packet filtering firewall.
Ø Use PIX operating system similar in interface to
Cisco IOS .
Ø Use PIX Device Manager (PDM) for a graphical
interface.
Ø Provide stateful firewall protection and IP Security
(IPSec) VPN capabilities
Ø To ensure the security PIX use inside interface ,
outside interface etc concepts
Ø Pix running in 6.3 v
Ø Not supported WebVPN
Ø Not support Transparent Firewall, Security Context
and Modular Policy
Ø 16 MB RAM
Cisco ASA:
Ø Is firewall and anti-malware security appliance
Ø The Enterprise Editions include four versions:
Firewall, IPS, Anti-X, and VPN.
Ø ASA can also serve as an intrusion prevention system
(IPS) and VPN concentrator.
Ø Also covers new threats to a network like viruses,
worms, unwanted applications (e.g., P2P, games, instant
messaging), phishing, and application-layer attacks.
Ø Act as an “all-in-one” device—or a unified threat
management (UTM) device
Ø ASA running in 7.2 v
Ø Supporting Web VPN
Ø Supporting Transparent Firewall, Security Context and
Modular Policy
Ø 64 MB RAM
| Is This Answer Correct ? | 45 Yes | 4 No |
Answer / shankar
PIX works with PIX OS,ASA works with cisco IOS(7.2.2)
both are stateful firewalls only.by default PIX support
stateful inspection,but ASA needs CSC-SSM Module to support .
| Is This Answer Correct ? | 27 Yes | 30 No |
I have cleared Informatica certification Designer. if anybody need dumps, can contact at sonal360@gmail.com
Hi All, I am preparing for Informatica Certification can anybody guide me.I am preparing for PowerCenter 8 Mapping Design.I would really appreciate if somebody share the dumps with me. Regards Piya
hi i done IBM AS/400 course .....i want to certification any one can information about that and material of soft copy for that....please its urgent
What is difference between PIX and ASA firewall
How to get ADS backup in windows 2003 server? What is deferent between internet and intranet?
The transfer function is y = x1 + 5x2, where X1 ~ N(5,12) and X2 ~ N(5,22). Which statement is true about the shape of y? [QID 809] 1) It must be a normal distribution since the means of the inputs are identical. 2) It will be a normal distribution. 3) It cannot be a normal distribution since the standard deviations of the inputs are different. 4) It is not normal.
write a prog to count and print the no of negative and positive nos in a given set of nos. Test your prog with suitable set of nos. Use scanf to read the nos. Reading should be terminated when the value 0 is encountered.
If you want a subroutine U to have a formal parameter P that is used to return a value to the actual parameter . Which of the following definitions of U would you use to ensure that the value is passed back to the calling program only if the processing of U ends normally and is not terminated with a message statement ? a) Form U changing P. b) Form U using P. c) Form U changing value(P). d) Form U using value(P). e) Form U using P local P.
I have Informatica certification dumps for designer and amdin.If anyone requires, please contact me at rohitsingh15@gmail.com
218 Answers Accenture, ADP, BirlaSoft, Cognizant, Informatica,
When using the Nutanix Command Line Interface, which key is used to display a list of command options?
I am a B.B.A (Hons) as a topper of RIMS rourlela, thand did my PGDCRM from Symi Pune.Now I want to go for PMP. Right now am working with IBM as a service management guy and supporting Tata Steel.Can you suggest that shall i go fpr PMP first ot ITIL foundation V2?
Can somebody please send me the TERADATAv12 Dumps on my mail id: mushahid.qureishi@gmail.com