What is the motivation for scanning internal, vs perimeter access ?
Sam Banks wrote:
The way I set this up was by running a cable from the router to the
efw and then from the efw to the network but I left the existing
connection from the router to the network and just forwarded the ports
that I wanted to be scanned through to the efw.
Sam
On 9/22/06, *Dave Packham* <[EMAIL PROTECTED]
<mailto:[EMAIL PROTECTED]>> wrote:
Can EFW be setup in a L2 or transparent mode so that it does not do
routing? So that it can be placed inline in and existing network?
Dave P
------
begin:vcard
fn:Lee Marzke
n:Marzke;Lee
email;internet:[EMAIL PROTECTED]
tel;work:800 393 5217
tel;home:610 454 9354
version:2.1
end:vcard
-------------------------------------------------------------------------
Take Surveys. Earn Cash. Influence the Future of IT
Join SourceForge.net's Techsay panel and you'll get the chance to share your
opinions on IT & business topics through brief surveys -- and earn cash
http://www.techsay.com/default.php?page=join.php&p=sourceforge&CID=DEVDEV
_______________________________________________
Efw-user mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/efw-user