Cisco PIX (Private Internet eXchange) was a popular
IP firewall
Firewall may refer to:
* Firewall (computing), a technological barrier designed to prevent unauthorized or unwanted communications between computer networks or hosts
* Firewall (construction), a barrier inside a building, designed to limit the spr ...
and
network address translation (NAT)
appliance. It was one of the first products in this market segment.
In 2005,
Cisco
Cisco Systems, Inc., commonly known as Cisco, is an American-based multinational digital communications technology conglomerate corporation headquartered in San Jose, California. Cisco develops, manufactures, and sells networking hardware, ...
introduced the newe
Cisco Adaptive Security Appliance(
Cisco ASA In computer networking, Cisco ASA 5500 Series Adaptive Security Appliances, or simply Cisco ASA, is Cisco's line of network security devices introduced in May 2005. It succeeded three existing lines of popular Cisco products:
* Cisco PIX, which prov ...
), that inherited many of the PIX features, and in 2008 announced PIX end-of-sale.
The PIX technology was sold in a
blade
A blade is the portion of a tool, weapon, or machine with an edge that is designed to puncture, chop, slice or scrape surfaces or materials. Blades are typically made from materials that are harder than those they are to be used on. Histor ...
, the
FireWall Services Module (FWSM), for the Cisco
Catalyst 6500
The Cisco Catalyst 6500 is a modular chassis network switch manufactured by Cisco Systems from 1999 to 2015, capable of delivering speeds of up to "400 million packets per second".
A 6500 comprises a chassis, power supplies, one or two superv ...
switch series and the
7600 Router series, but has reached end of support status as of September 26, 2007.
PIX
History
PIX was originally conceived in early 1994 by John Mayes of Redwood City, California and designed and coded by
Brantley Coile
Brantley Coile is an inventor and founder of network technology companies, he worked for John Mayes as a programmer whose companies products include PIX Firewall, the first stateful-inspection firewall and Cisco Systems' first load-balancer, Loca ...
of Athens, Georgia. The PIX name is derived from its creators' aim of creating the functional equivalent of an
IP PBX
An IP PBX ("Internet Protocol private branch exchange") is a system that connects telephone extensions to the public switched telephone network (PSTN) and provides internal communication for a business. An IP PBX is a PBX system with IP connectivi ...
to solve the then-emerging registered
IP address
An Internet Protocol address (IP address) is a numerical label such as that is connected to a computer network that uses the Internet Protocol for communication.. Updated by . An IP address serves two main functions: network interface ident ...
shortage. At a time when NAT was just being investigated as a viable approach, they wanted to conceal a block or blocks of IP addresses behind a single or multiple registered IP addresses, much as PBXs do for internal phone extensions. When they began, RFC 1597 and RFC 1631 were being discussed, but the now-familiar
RFC 1918 had not yet been submitted.
The design, and testing were carried out in 1994 by John Mayes, Brantley Coile and Johnson Wu of Network Translation, Inc., with Brantley Coile being the sole software developer. Beta testing of PIX serial number 000000 was completed and first customer acceptance was on December 21, 1994 at KLA Instruments in San Jose, California. The PIX quickly became one of the leading enterprise firewall products and was awarded the Data Communications Magazine "Hot Product of the Year" award in January 1995.
Shortly before Cisco acquired Network Translation in November 1995, Mayes and Coile hired two longtime associates, Richard (Chip) Howes and Pete Tenereillo, and shortly after acquisition 2 more longtime associates, Jim Jordan and Tom Bohannon. Together they continued development on Finesse OS and the original version of the Cisco PIX Firewall, now known as the PIX "Classic". During this time, the PIX shared most of its code with another Cisco product, the
LocalDirector.
On January 28, 2008, Cisco announced the end-of-sale and
end-of-life dates for all Cisco PIX Security Appliances, software, accessories, and licenses. The last day for purchasing Cisco PIX Security Appliance platforms and bundles was July 28, 2008. The last day to purchase accessories and licenses was January 27, 2009. Cisco ended support for Cisco PIX Security Appliance customers on July 29, 2013.
In May 2005, Cisco introduced the ASA which combines functionality from the PIX, VPN 3000 series and
IPS
IPS, ips, or iPS may refer to:
Science and technology Biology and medicine
* ''Ips'' (genus), a genus of bark beetle
* Induced pluripotent stem cell or iPS cells
* Intermittent photic stimulation, a neuroimaging technique
* Intraparietal sulcus, ...
product lines. The ASA series of devices run PIX code 7.0 and later. Through PIX OS release 7.x the PIX and the ASA use the same software images. Beginning with PIX OS version 8.x, the operating system code diverges, with the ASA using a Linux kernel and PIX continuing to use the traditional Finesse/PIX OS combination.
Software
The PIX runs a custom-written proprietary
operating system
An operating system (OS) is system software that manages computer hardware, software resources, and provides common services for computer programs.
Time-sharing operating systems schedule tasks for efficient use of the system and may also i ...
originally called Finese (''Fast Internet Service Executive''), but the software is known simply as PIX OS. Though classified as a
network-layer firewall with
stateful inspection, technically the PIX would more precisely be called a Layer 4, or Transport Layer Firewall, as its access is not restricted to Network Layer routing, but socket-based connections (a port and an IP Address: port communications occur at Layer 4). By default it allows internal connections out (outbound traffic), and only allows inbound traffic that is a response to a valid request or is allowed by an
Access Control List
In computer security, an access-control list (ACL) is a list of permissions associated with a system resource (object). An ACL specifies which users or system processes are granted access to objects, as well as what operations are allowed on gi ...
(ACL) or by a ''conduit''. Administrators can configure the PIX to perform many functions including
network address translation (NAT) and
port address translation (PAT), as well as serving as a
virtual private network (VPN) endpoint appliance.
The PIX became the first commercially available firewall product to introduce protocol specific filtering with the introduction of the "fixup" command. The PIX "fixup" capability allows the firewall to apply additional security policies to connections identified as using specific protocols. Protocols for which specific fixup behaviors were developed include DNS and SMTP. The DNS fixup originally implemented a very simple but effective security policy; it allowed just one DNS response from a DNS server on the Internet (known as ''outside'' interface) for each DNS request from a client on the protected (known as ''inside'') interface. "Inspect" has superseded "fixup" in later versions of PIX OS.
The Cisco PIX was also one of the first commercially available security appliances to incorporate
IPSec
In computing, Internet Protocol Security (IPsec) is a secure network protocol suite that authenticates and encrypts packets of data to provide secure encrypted communication between two computers over an Internet Protocol network. It is used in ...
VPN gateway functionality.
Administrators can manage the PIX via a
command line interface (CLI) or via a
graphical user interface
The GUI ( "UI" by itself is still usually pronounced . or ), graphical user interface, is a form of user interface that allows users to interact with electronic devices through graphical icons and audio indicator such as primary notation, inst ...
(GUI). They can access the CLI from the serial console, telnet and
SSH
The Secure Shell Protocol (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network. Its most notable applications are remote login and command-line execution.
SSH applications are based on ...
. GUI administration originated with version 4.1, and it has been through several incarnations:
* PIX Firewall Manager (PFM) for PIX OS versions 4.x and 5.x, which runs locally on a Windows NT client
* PIX Device Manager (PDM) for PIX OS version 6.x, which runs over
and requires
Java (programming language), Java
* Adaptive Security Device Manager (ASDM) for PIX OS version 7 and greater, which can run locally on a client or in reduced-functionality mode over HTTPS.
Because Cisco acquired the PIX from Network Translation, the CLI originally did not align with the
Cisco IOS
The Internetworking Operating System (IOS) is a family of proprietary network operating systems used on several router and network switch models manufactured by Cisco Systems. The system is a package of routing, switching, internetworking, and ...
syntax. Starting with version 7.0, the configuration became much more IOS-like.
Hardware
The original NTI PIX and the PIX Classic had cases that were sourced from
OEM
An original equipment manufacturer (OEM) is generally perceived as a company that produces non-aftermarket parts and equipment that may be marketed by another manufacturer. It is a common industry term recognized and used by many professional or ...
provider Appro. All flash cards and the early encryption acceleration cards, the PIX-PL and PIX-PL2, were sourced from Productivity Enhancement Products (PEP). Later models had cases from Cisco OEM manufacturers.
The PIX was constructed using
Intel
Intel Corporation is an American multinational corporation and technology company headquartered in Santa Clara, California. It is the world's largest semiconductor chip manufacturer by revenue, and is one of the developers of the x86 seri ...
-based/Intel-compatible motherboards; the PIX 501 used an
Am5x86
The Am5x86 processor is an x86-compatible CPU announced in November of 1995 by AMD for use in 486-class computer systems. It began shipping in December of 1995, with a base price of $93 per unit in bulk quantities. Before being released, it wa ...
processor, and all other standalone models used Intel
80486 through Pentium III processors.
The PIX
boots
A boot is a type of footwear.
Boot or Boots may also refer to:
Businesses
* Boot Inn, Chester, Cheshire, England
* Boots (company), a high-street pharmacy chain and manufacturer of pharmaceuticals in the United Kingdom
* The Boot, Cromer St ...
off a proprietary
ISA flash memory daughtercard
In computing, an expansion card (also called an expansion board, adapter card, peripheral card or accessory card) is a printed circuit board that can be inserted into an electrical connector, or expansion slot (also referred to as a bus slo ...
in the case of the NTI PIX, PIX Classic, 10000, 510, 520, and 535, and it boots off integrated flash memory in the case of the PIX 501, 506/506e, 515/515e, 525, and WS-SVC-FWM-1-K9. The latter is the part code for the PIX technology implemented in the Fire Wall Services Module, for the Catalyst 6500 and the 7600 Router.
Adaptive Security Appliance (ASA)
The Adaptive Security Appliance is a network
firewall
Firewall may refer to:
* Firewall (computing), a technological barrier designed to prevent unauthorized or unwanted communications between computer networks or hosts
* Firewall (construction), a barrier inside a building, designed to limit the spr ...
made by Cisco. It was introduced in 2005 to replace the Cisco PIX line. Along with stateful firewall functionality another focus of the ASA is Virtual Private Network (VPN) functionality. It also features Intrusion Prevention and Voice over IP. The ASA 5500 series was followed up by the 5500-X series. The 5500-X series focuses more on virtualization than it does on hardware acceleration security modules.
History
In 2005 Cisco released the 5510, 5520, and 5540 models.
Software
The ASA continues using the PIX codebase but, when the ASA OS software transitioned from major version 7.X to 8.X, it moved from the Finesse/Pix OS
operating system
An operating system (OS) is system software that manages computer hardware, software resources, and provides common services for computer programs.
Time-sharing operating systems schedule tasks for efficient use of the system and may also i ...
platform to the
Linux
Linux ( or ) is a family of open-source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991, by Linus Torvalds. Linux is typically packaged as a Linux distribution, w ...
operating system platform. It also integrates features of the Cisco IPS 4200 Intrusion prevention system, and the Cisco VPN 3000 Concentrator.
Hardware
The ASA continues the PIX lineage of Intel 80x86 hardware.
Security vulnerabilities
The Cisco PIX VPN product was hacked by the
NSA
The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collecti ...
-tied group
Equation Group
The Equation Group, classified as an advanced persistent threat, is a highly sophisticated threat actor suspected of being tied to the Tailored Access Operations (TAO) unit of the United States National Security Agency (NSA). Kaspersky Labs de ...
somewhere before 2016. Equation Group developed a tool code-named BENIGNCERTAIN that reveals the pre-shared password(s) to the attacker (). Equation Group was later hacked by another group called
The Shadow Brokers
The Shadow Brokers (TSB) is a hacker group who first appeared in the summer of 2016. They published several leaks containing hacking tools, including several zero-day exploits, from the "Equation Group" who are widely suspected to be a branch of ...
, which published their
exploit
Exploit means to take advantage of something (a person, situation, etc.) for one's own end, especially unethically or unjustifiably.
Exploit can mean:
*Exploitation of natural resources
*Exploit (computer security)
* Video game exploit
*Exploitat ...
publicly, among others. According to
Ars Technica, the NSA likely used this vulnerability to wiretap VPN-connections for more than a decade, citing the
Snowden leaks.
The Cisco ASA-brand was also hacked by Equation Group. The vulnerability requires that both
SSH
The Secure Shell Protocol (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network. Its most notable applications are remote login and command-line execution.
SSH applications are based on ...
and
SNMP
Simple Network Management Protocol (SNMP) is an Internet Standard protocol for collecting and organizing information about managed devices on IP networks and for modifying that information to change device behaviour. Devices that typically ...
are accessible to the attacker. The codename given to this exploit by NSA was EXTRABACON. The bug and exploit () was also leaked by The ShadowBrokers, in the same batch of exploits and backdoors. According to Ars Technica, the exploit can easily be made to work against more modern versions of Cisco ASA than what the leaked exploit can handle.
On the 29th of January 2018 a security problem at the Cisco ASA-brand was disclosed by
Cedric Halbronn from the NCC Group. A
use after free-bug in the
Secure Sockets Layer
Transport Layer Security (TLS) is a cryptographic protocol designed to provide communications security over a computer network. The protocol is widely used in applications such as email, instant messaging, and voice over IP, but its use in securi ...
(SSL) VPN functionality of the Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated remote attacker to cause a reload of the affected system or to remotely execute code. The bug is listed as .
See also
*
Cisco LocalDirector
Cisco LocalDirector was a server load balancing appliance, discontinued in 2003, based on the Network Address Translation (NAT) technology Cisco Systems acquired when they bought Network Translation, Inc. The LocalDirector was conceived by John ...
References
{{Cisco Systems
Pix
Computer network security
Server appliance