Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

What are difference between Juniper and checkpoint firewall?
and Can you explain me about the difference between checkpoint
and Cisco pix firewall ?

Answer Posted / vineeth mukundan

Context based mode in Cisco has the following limitations:
1.VPN Services will not work such as Remote access or Site
to Site VPN Tunnels
2.In context mode dynamic routing protocols not supported,
you have to use static routes only
3. Threat Detection ( IDS/IPS) not supported
4.QOS not supported
5.ASA Resources are shared for various contexts within the
Hardware platform

Checkpoint will not have his limitation since you can scale
up the base hardware based on requirement on number of
Virtual firewalls you would want to implement and also
easily portable to new hardware

Is This Answer Correct ?    15 Yes 5 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What is cybersecurity?

1080


congestion at network due to buffer overflows and packet dropping leads to a message confidentiality threat named.....

1670


What does cia stand for in security management?

1142


Explain for a small lan which class of addressing is used?

1010


How do we do authentication with message digest(md5)?

1017


What is the role of single sign on in authentication technologies?

1077


What is a Smart Card or Chip Card or Integrated Circuit Card (ICC)?

1034


What factors would you consider before deploying a web intrusion detection system?

1024


Diff bet ripv1 & ripv2?

1027


Difference between bit rate and baud rate.

1173


explain how do we do authentication with message digest(md5)? (Usually md is used for finding tampering of data)

972


Explain how does traceroute work? Now how does traceroute make sure that the packet follows the same path that a previous (with ttl - 1) probe packet went in?

1000


What are the data units at different layers of the TCP / IP protocol suite

1099


What are manageable and non manageable switches?

1123


What is malware?

1076