Hi,

How important is the stealth rule?

All the documentation says to use it.  But if you have a rule base without a 
stealth rule, how big a threat is that?

Thanks!

/ap

_________________________________________________________________
Get your FREE download of MSN Explorer at http://explorer.msn.com



================================================================================
     To unsubscribe from this mailing list, please see the instructions at
               http://www.checkpoint.com/services/mailing.html
================================================================================

Reply via email to