Simon Murcott wrote: 

> One point you are missing is that it is possible using this kind of
> configuration to create a firewall where you cannot address any of it's
> external interfaces. So how can you do an intrusion attack on a firewall
> that you cannot address?

Another advantage is the transperacy. There is no need to change any
routing-setup but just insert this "firewall-bridge" between two
nodes.
Phil


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to