Eicon Networks S92 Manual do Utilizador Página 58

  • Descarregar
  • Adicionar aos meus manuais
  • Imprimir
  • Página
    / 209
  • Índice
  • MARCADORES
  • Avaliado. / 5. Com base em avaliações de clientes
Vista de página 57
YuChakTinMichael‘sGIACGCFWProjectAssignment
Page 58
Vulnerabilities
SameasforNortonFirewall,wehavenotbeenabletoidentifyanyvulnerabilityfor
thisproduct.Thisislikelyduetothefactthatthisproductisnotaspopularastheir
highendcounterparts,thusisnotthecommontargetofattack(orthattheattacksare
notworthtobepublicized).
MicrosoftISASe rver
AccordingtoMicrosoft,
“MicrosoftInternetSecurityandAcceleration(ISA)Server2000isanextensible
enterprisefirewallandWebcache serverthatintegrateswiththeMicrosoftWindows®
2000operatingsystemforpolicybasedsecurity,aswellasacceleratingand
managinginternetworking.ISAServerprovidestwotightlyintegratedmodes—a
multilayerf irewalland ahighperformanceWebcacheserver.Thefirewallprovides
filteringatthepacket,circuit,andapplicationlayer,statefulinspectiontoexamine
Vista de página 57
1 2 ... 53 54 55 56 57 58 59 60 61 62 63 ... 208 209

Comentários a estes Manuais

Sem comentários