It depends on what your requirements are and what features of the PIX you use. What's your security policy look like? How will you implement it on PIX?
It also depends on your own comfort with the PIX. V6.x features include PIX Device Manager, a GUI tool for configuring and managing the PIX.
Liberty for All,
Brian
Brian Ford | brford@cisco.com | brford@yahoo.com | 51 75 61 6c 69 74 79 20 6d 65 61 6e 73 20 64 6f 69 6e 67 20 69 74 20 72 69 67 68 74 20 77 68 65 6e 20 6e 6f 20 6f 6e 65 20 69 73 20 6c 6f 6f 6b 69 6e 67 2e | Email me when you figure this out.