Is it necessary to configure detections of the unauthorized
protocols riskiest? for example telnet, ftp, echo-chargen
etc on Network sensor.
What different politic must i set up on Network sensor above
and below the firewall?
Thanks
_________________________________________________________ 
Envoyez des messages musicaux sur le portable de vos amis 
 http://mobile.lycos.fr/mobile/local/sms_musicaux/

Reply via email to