Folks, Mike Noyes wrote: > > Firewall Product Certification Criteria Version 3.0a > http://www.icsalabs.com/html/communities/firewalls/ \ > certification/criteria/criteria_3.0a.shtml > Taking a look at this, it refered to logging all acceptable and unacceptabe access. That'd fill our logs in a hearbeat, then syslog would stop logging. Do you concur? Matthew _______________________________________________ Leaf-devel mailing list [EMAIL PROTECTED] http://lists.sourceforge.net/lists/listinfo/leaf-devel
- RE: [Leaf-devel] Character Studies (of Users) PBarreto
- Re: [Leaf-devel] Character Studies (of Users) thc
- Re: [Leaf-devel] Character Studies (of Users) Scott C. Best
- Re: [Leaf-devel] Character Studies (of Users) David Douthitt
- Re: [Leaf-devel] Character Studies (of Users) David Douthitt
- RE: [Leaf-devel] Character Studies (of Users) PBarreto
- Re: [Leaf-devel] Character Studies (of Users) Mike Noyes
- Re: [Leaf-devel] Character Studies (of Users) thc
- [Leaf-devel] cish (Cisco IOS shell for Linux) David Douthitt
- Re: [Leaf-devel] Character Studies (of Users) Matt Schalit
- Re: [Leaf-devel] Character Studies (of Users) Scott C. Best
- Re: [Leaf-devel] Character Studies (of Users) Matt Schalit
- Re: [Leaf-devel] Character Studies (of Users) Mike Noyes
- [Leaf-devel] ICSA Overview Scott C. Best