>1. Advanced NAT (One to one, One to many, And in todays world even NAT
> based on service) Also, it Shouldn't be a problem to forward
>services to
> inside NON-Windows(Read Unix servers).


Yes, but wouldn't this depend on the user's requirements?  I can't see how
this can be used to determine whether or not an application should be called
a firewall.


>2. Decent logging and reporting


MSP has the ability to log to either text files or SQL database for advanced
reporting.



>3. Various(Numerious forms of authentication) IE,
> Skey, Secure-ID, Radius, Tacacs, etc...


Again, this will depend on user requirements, and should not be used in a
definition for a firewall.


>4. Should provide some content filtering, Java, Active-X, etc..


Can't answer - never checked this one.  See point (3)



>5. Should provide a simple SMTP relay, or perhaps more advanced like
> Checkpoint's


Confused here - please clarify.  It is possible to configure MSP2.0 to allow
an internal e-mail server to interact with the Internet.


>Centralized management/logging. The abitity to look at live connections...
>VPN's, both client to network and network to network.


MS' VPN works with MSP as stated above.  And "centralized
management/logging" - what do you define as "centralized"?


>I just don't think that
>"MS Proxy Server" is a Firewall.  Microsoft probably doesn't either!  If
>they did, I am sure their marketing people would call it "Microsoft
>Firewall"!!


... so why do they refer to it as a Firewall on the cover for the CD?


Brian Steele


-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to