Is it necessary to configure detections of the unauthorized protocols riskiest? for example telnet, ftp, echo-chargen etc on Network sensor. What different politic must i set up on Network sensor above and below the firewall? Thanks _________________________________________________________ Envoyez des messages musicaux sur le portable de vos amis http://mobile.lycos.fr/mobile/local/sms_musicaux/
