I don't see much reason,. but if there is a feature on those products which you feel would add additional protection mechanisms and would therefore improve your security policy, then you can go for it.
If you practice good security policies (SSH / ASDM with AAA), then only authorized users will have access to your PIX. Any security issues related to Cisco's products are publicly disclosed at: www.cisco.com/go/psirt
I personally do not see the value of placing another security device in front of the PIX, mearly to attempt to protect the PIX.
Login to the FXOS chassis manager.
Direct your browser to https://hostname/, and log-in using the user-name and password.
Go to Help > About and check the current version:
Check the current version availa...
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...