Has anyone done this type of testing where the IDS agent/detector is 
utilized to validate a router's ACL's or a firewall's security 
rule/policy??  If not, how does one really validate a firewall is setup 
correctly. Do they just say well, it is passing email and web, it must be 
working or is there some sort of check list people use nowadays.. ??


/m

-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to