Walker, How is it implemented? Is there an external hosts that recognizes virus signatures? Would you please give us some basic example?
Thanks, -----Original Message----- From: Walker, Jim [mailto:[EMAIL PROTECTED]] Sent: quarta-feira, 12 de dezembro de 2001 18:00 To: [EMAIL PROTECTED] Subject: RE: NBAR [7:28939] We are. It works ok, you just have to watch for the frames with precedence bits set to high getting dropped due to the access list. Jim Walker Master Network Engineer Partners HealthCare System, Inc. Information Systems / Technical Services & Operations Tel. (617) 732-8803 Fax (617) 264-5130 This e-mail message and any attachments are confidential and may be privileged. If you are not the intended recipient, please notify me immediately by replying to this message and please destroy all copies of this message and attachments. Thank you. -----Original Message----- From: Jeff D [mailto:[EMAIL PROTECTED]] Sent: Wednesday, December 12, 2001 2:50 PM To: [EMAIL PROTECTED] Subject: NBAR [7:28939] Anyone using NBAR to block email virus attachments? Pros/Cons? Message Posted at: http://www.groupstudy.com/form/read.php?f=7&i=29047&t=28939 -------------------------------------------------- FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

