You provide no concrete reasoning for your speculations, and I think
that you're wrong.

What speculation?  That the basis of networking is how specific
machines' interfaces are linked, be it at layer 2 or layer 7?  This
kind of hand-waving really makes me itch for ad-hominem attacks, but
I'm going to thus far resist.

You're saying that the world's largest firewall vendor only account
for 90% of their customer's security?  I think you're wrong here, too
:-).

No, I'm saying that any level of indirection is going to cover up edge
cases and make them impossible to deal with - this is the reality of
programming.  Under the covers, regardless of what you think is
happening, some poor sod at CheckPoint has programmed some arguably
intelligent code that does it's best to translate your your intent
from the GUI into an interface-based ruleset.  If you don't think
that's true... well, I can't help you there.  I'd impolitely suggest a
hike, but we need all types, be they assembly warriors or PHBs.  Ick.
Maybe not the latter.

I officially consider you slightly insane now, hehe.
Or at the least, you have way too much free time on your hands :-).

Clinically insane - I have the papers and take the medicine.  It's
[iptables] what I know and what I like, and has all the edge cases I
can possibly think of covered.  If for some reason it doesn't, I go
download the latest patch-o-matic tarball and insert what I need.


RB

---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to