Ron DuFresne wrote:
>
> How deeply do application proxies actually look into the packets? What
> degree do the majhor players go to to determine what is and is not
> acceptable? How many actually look deeper then the packet headers? How
> many look at more then the mere headers after the first packet or two?
And how much difference is there between an "application proxy" and
an IDS system? If the box has to deal with protocols at that level,
why not combine the functionality of the two?
--
Gary Flynn
Security Engineer - Technical Services
James Madison University
Please R.U.N.S.A.F.E.
http://www.jmu.edu/computing/info-security/engineering/runsafe.shtml
S/MIME Cryptographic Signature