Eicon Networks S92 Manual de usuario Pagina 58

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 209
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 57
YuChakTinMichael‘sGIACGCFWProjectAssignment
Page 58
Vulnerabilities
SameasforNortonFirewall,wehavenotbeenabletoidentifyanyvulnerabilityfor
thisproduct.Thisislikelyduetothefactthatthisproductisnotaspopularastheir
highendcounterparts,thusisnotthecommontargetofattack(orthattheattacksare
notworthtobepublicized).
MicrosoftISASe rver
AccordingtoMicrosoft,
“MicrosoftInternetSecurityandAcceleration(ISA)Server2000isanextensible
enterprisefirewallandWebcache serverthatintegrateswiththeMicrosoftWindows®
2000operatingsystemforpolicybasedsecurity,aswellasacceleratingand
managinginternetworking.ISAServerprovidestwotightlyintegratedmodes—a
multilayerf irewalland ahighperformanceWebcacheserver.Thefirewallprovides
filteringatthepacket,circuit,andapplicationlayer,statefulinspectiontoexamine
Vista de pagina 57
1 2 ... 53 54 55 56 57 58 59 60 61 62 63 ... 208 209

Comentarios a estos manuales

Sin comentarios