The high-performance Cisco PIX (Private Internet Exchange) Firewall reliably isolates a company's internal network from the outside world. Unlike standard UNIX proxy servers, which are computationally intensive for each packet of data, taking away CPU resources, the Cisco PIX Firewall uses built-in real-time security. As a result, the performance of the Cisco PIX Firewall (over 16,000 concurrent connections) significantly outperforms UNIX-based firewalls.
The built-in Java-based Firewall Manager configuration tool in the Cisco PIX Firewall simplifies management. Its graphical interface allows a simple click on the PIX Firewall icon on the central control console to call, edit and configure security rules. Based on the reports received, network administrators can analyze statistics, track unauthorized users, and monitor traffic volume. Event logging allows you to take into account how users use network resources.
Network administrators can use Internet Uniform Resource Locator (URL) accounting to control which Web sites their users visit. If the thresholds set by the administrator are exceeded, the Cisco PIX Firewall will alert you in real time to an attempt to break into the firewall by email or pager. The Cisco PIX Firewall is capable of filtering out unwanted Java applets.
Key Benefits
The Cisco PIX Firewall has the following benefits:Less complexity and more robustness compared to packet filteringInstallation does not require network shutdownNo daily management requiredNo need to upgrade host machines and routersHost machines on the internal network that do not have registered IP addresses have full access to the Internet.No additional registered IP addresses are needed to expand the networkAllowed to use Address Allocation for Private Internets (RFC 1918) or registered IP addressesDoes not degrade the performance of local network usersInteroperability with Cisco IOS Software Routers
For more information about: cisco meaning