What are difference between Juniper and checkpoint firewall?
and Can you explain me about the difference between checkpoint
and Cisco pix firewall ?
Answer Posted / vineeth mukundan
Below are the difference between Checkpoint and Juniper Firewall from my view and understand.
Difference between Checkpoint and Juniper Firewalls:
Juniper follows two-tier architecture whereas Checkpoint follows three-tier architecture.
Juniper uses the concept of Deep inspection process where as the checkpoint uses the stateful inspection process.
Juniper uses the concept of Zones whereas Checkpoint do not use.
Netscreen firewalls can be administered locally or from a central management station, Checkpoint firewalls really can't be administered locally without connectivity to a SmartCentre.
Netscreens are appliances, you can't put any vendor's network interfaces in it, and you don't have the driver issues to deal with when Dell/HP/Intel/Broadcom/etc. change chipsets.
Netscreens firewalls require the policies to be written as "from trusted-zone to untrusted-zone" so the definition of "any" is different to Checkpoint.
Is This Answer Correct ? | 19 Yes | 4 No |
Post New Answer View All Answers
What is terminal emulation, in which layer it comes
What is kerberos protocol?
What is difference between arp & rarp? How both of these protocols will work, and where it will use?
What protocol is used by DNS name servers
How long can a ddos attack last?
What is ospf protocol
How do we use rsa for both authentication and secrecy?
How does network security work?
In context of public key encryption, if you are using both signature and encryption features, what key will you use for encryption and which one will you use for signing?
What is the sense of a fingerprint?
Explain how does traceroute work? Now how does traceroute make sure that the packet follows the same path that a previous (with ttl - 1) probe packet went in?
How does ransomware work?
explain what is meant by port blocking within lan?
What are the types of LAN cables used? What is a cross cable?
What is the role of single sign on in authentication technologies?