Folks,

Mike Noyes wrote:
> 

> Firewall Product Certification Criteria Version 3.0a
> http://www.icsalabs.com/html/communities/firewalls/ \
> certification/criteria/criteria_3.0a.shtml
> 


Taking a look at this, it refered to logging all acceptable and
unacceptabe access.  That'd fill our logs in a hearbeat, then
syslog would stop logging.

Do you concur?
Matthew

_______________________________________________
Leaf-devel mailing list
[EMAIL PROTECTED]
http://lists.sourceforge.net/lists/listinfo/leaf-devel

Reply via email to