RE: Frame Relay Security

2001-01-08 Thread Jim Brown


There should not be different levels of encryption for traffic depending on
whether its frame or Internet transient. Your traffic is open to compromise
on the Internet or in a providers frame cloud. From a security viewpoint
neither one is more secure than the other.

It really boils down to acceptable risk vs. cost.

Just remember, you can never eliminate risk. There are always holes in your
security.

Any individual who is asking themselves should I use DES/3DES on a frame
connection should stop and look to see if they have a modem bank behind
their firewall.

Your security is only a strong as the weakest link.

-Original Message-
From: Brian Lodwick [mailto:[EMAIL PROTECTED]]
Sent: Sunday, January 07, 2001 8:35 PM
To: [EMAIL PROTECTED]
Subject: Re: Frame Relay Security


Group,
  Which then I believe should obviously lead into the discussion- if VPN's 
are today's PVC's then would it be appropriate to say that traffic 
transported over the public internet with such a protocol as IPSec is just 
as safe? and how do you know your enemies aren't working for that frame 
provider -if they are using single DES they had better hope not. Are there 
protocols now capable of providing enough security encryption for extremely 
sensitive traffic to transit the public internet?

Brian

From: "Howard C. Berkowitz" [EMAIL PROTECTED]
Reply-To: "Howard C. Berkowitz" [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Re: Frame Relay Security
Date: Sun, 7 Jan 2001 13:37:09 -0500

 I understand most of the benefits of frame relay, but I am wondering if =
 there are any security problems assoicated with this protocol?  Is it =
 secure enough for unencrypted transfer of financial or sensitive =
 information?  Any help understanding the security risks associated with =
 frame relay appreciated.
 
 -- Kevin

Is a dedicated line secure enough for unencrypted transfer of
financial or sensitive information?

Answer:  It depends.

People often assume that frame is somehow shared when "dedicated
lines" are not.   From Chapter 5 of my _WAN Survival Guide_,

 All too many users have an intuitive belief that if they were to
 pull on the London end of a London to New York circuit, wires would
 wiggle in Manhattan. The reality, of course, is that any network of
 complexity beyond a very simple LAN involves one or more layers of
 virtualization onto real media. At the OSI lower layers,
 virtualization usually involves multiplexing, but various name and
 address mapping functions provide virtual structure as one moves up
 the protocol stack.

Typically, frame PVCs and T1's run over exactly the same media from
the customer site to the telco end office.  Once at the end office,
they are multiplexed.  T1 is far too slow for economical data
transmission between modern telco offices.  Both the T1 and the frame
circuits typically will be multiplexed onto facilities at least at
DS-3, and usually OC-12 to OC-192. So much beyond the local loop,
there really isn't much difference between frame and dedicated.

Interpretations in the US HIPAA legislation for medical data tend to
allow unencrypted traffic to flow over dedicated and frame, but not
the public Internet.  The Federal Reserve, however, tends to want
end-to-end encryption regardless of the media, historically single
DES.  Military traffic would be bulk encrypted and possibly
end-to-end encrypted as well.

_
FAQ, list archives, and subscription info: 
http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

_
Get your FREE download of MSN Explorer at http://explorer.msn.com

_
FAQ, list archives, and subscription info:
http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

_
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



RE: Frame Relay Security

2001-01-08 Thread Chuck Larrieu

Jim, just to be contrary, how can a single provider, or even multiple
provider frame clouds be compromised as easily as internet traffic?

What are some of the specifics of danger of compromise of any private
network versus the internet?

Those bad people can't, for example, do DDoS attacks against your private
network, except via the internet connection. It is that same internet
connection that is the source of major compromises of corporate networks
nationwide.

What are some of the specific security issues you see on private networks,
as compared to public networks?

Chuck
Just being contrary, in the hopes of learning something :-

-Original Message-
From:   [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] On Behalf Of Jim
Brown
Sent:   Monday, January 08, 2001 8:47 AM
To: 'Brian Lodwick'; [EMAIL PROTECTED]
Subject:RE: Frame Relay Security


There should not be different levels of encryption for traffic depending on
whether its frame or Internet transient. Your traffic is open to compromise
on the Internet or in a providers frame cloud. From a security viewpoint
neither one is more secure than the other.

It really boils down to acceptable risk vs. cost.

Just remember, you can never eliminate risk. There are always holes in your
security.

Any individual who is asking themselves should I use DES/3DES on a frame
connection should stop and look to see if they have a modem bank behind
their firewall.

Your security is only a strong as the weakest link.

-Original Message-
From: Brian Lodwick [mailto:[EMAIL PROTECTED]]
Sent: Sunday, January 07, 2001 8:35 PM
To: [EMAIL PROTECTED]
Subject: Re: Frame Relay Security


Group,
  Which then I believe should obviously lead into the discussion- if VPN's
are today's PVC's then would it be appropriate to say that traffic
transported over the public internet with such a protocol as IPSec is just
as safe? and how do you know your enemies aren't working for that frame
provider -if they are using single DES they had better hope not. Are there
protocols now capable of providing enough security encryption for extremely
sensitive traffic to transit the public internet?

Brian

From: "Howard C. Berkowitz" [EMAIL PROTECTED]
Reply-To: "Howard C. Berkowitz" [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Re: Frame Relay Security
Date: Sun, 7 Jan 2001 13:37:09 -0500

 I understand most of the benefits of frame relay, but I am wondering if =
 there are any security problems assoicated with this protocol?  Is it =
 secure enough for unencrypted transfer of financial or sensitive =
 information?  Any help understanding the security risks associated with =
 frame relay appreciated.
 
 -- Kevin

Is a dedicated line secure enough for unencrypted transfer of
financial or sensitive information?

Answer:  It depends.

People often assume that frame is somehow shared when "dedicated
lines" are not.   From Chapter 5 of my _WAN Survival Guide_,

 All too many users have an intuitive belief that if they were to
 pull on the London end of a London to New York circuit, wires would
 wiggle in Manhattan. The reality, of course, is that any network of
 complexity beyond a very simple LAN involves one or more layers of
 virtualization onto real media. At the OSI lower layers,
 virtualization usually involves multiplexing, but various name and
 address mapping functions provide virtual structure as one moves up
 the protocol stack.

Typically, frame PVCs and T1's run over exactly the same media from
the customer site to the telco end office.  Once at the end office,
they are multiplexed.  T1 is far too slow for economical data
transmission between modern telco offices.  Both the T1 and the frame
circuits typically will be multiplexed onto facilities at least at
DS-3, and usually OC-12 to OC-192. So much beyond the local loop,
there really isn't much difference between frame and dedicated.

Interpretations in the US HIPAA legislation for medical data tend to
allow unencrypted traffic to flow over dedicated and frame, but not
the public Internet.  The Federal Reserve, however, tends to want
end-to-end encryption regardless of the media, historically single
DES.  Military traffic would be bulk encrypted and possibly
end-to-end encrypted as well.

_
FAQ, list archives, and subscription info:
http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

_
Get your FREE download of MSN Explorer at http://explorer.msn.com

_
FAQ, list archives, and subscription info:
http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

_
FAQ, list archives, and subscription info:
http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

_

Re: Frame Relay Security

2001-01-08 Thread Jim Healis

Once, while working at a very popular network auction web site, I ran 
into a security advisor that said Frame Relay was not secure and we 
should not allow critical information to pass over those connections.
The VP of Technology, at the time, said "we have more important things 
to worry about than someone spending hours on end trying to hack a Frame 
Switch just to see if our traffic happens to be on it".

Just thought I would add that little tidbit to the conversation.

-j

Chuck Larrieu wrote:

 Jim, just to be contrary, how can a single provider, or even multiple
 provider frame clouds be compromised as easily as internet traffic?
 
 What are some of the specifics of danger of compromise of any private
 network versus the internet?
 
 Those bad people can't, for example, do DDoS attacks against your private
 network, except via the internet connection. It is that same internet
 connection that is the source of major compromises of corporate networks
 nationwide.
 
 What are some of the specific security issues you see on private networks,
 as compared to public networks?
 
 Chuck
 Just being contrary, in the hopes of learning something :-
 
 -Original Message-
 From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] On Behalf Of Jim
 Brown
 Sent: Monday, January 08, 2001 8:47 AM
 To:   'Brian Lodwick'; [EMAIL PROTECTED]
 Subject:  RE: Frame Relay Security
 
 
 There should not be different levels of encryption for traffic depending on
 whether its frame or Internet transient. Your traffic is open to compromise
 on the Internet or in a providers frame cloud. From a security viewpoint
 neither one is more secure than the other.
 
 It really boils down to acceptable risk vs. cost.
 
 Just remember, you can never eliminate risk. There are always holes in your
 security.
 
 Any individual who is asking themselves should I use DES/3DES on a frame
 connection should stop and look to see if they have a modem bank behind
 their firewall.
 
 Your security is only a strong as the weakest link.
 
 -Original Message-
 From: Brian Lodwick [mailto:[EMAIL PROTECTED]]
 Sent: Sunday, January 07, 2001 8:35 PM
 To: [EMAIL PROTECTED]
 Subject: Re: Frame Relay Security
 
 
 Group,
   Which then I believe should obviously lead into the discussion- if VPN's
 are today's PVC's then would it be appropriate to say that traffic
 transported over the public internet with such a protocol as IPSec is just
 as safe? and how do you know your enemies aren't working for that frame
 provider -if they are using single DES they had better hope not. Are there
 protocols now capable of providing enough security encryption for extremely
 sensitive traffic to transit the public internet?
 
 
 Brian
 
 
 From: "Howard C. Berkowitz" [EMAIL PROTECTED]
 Reply-To: "Howard C. Berkowitz" [EMAIL PROTECTED]
 To: [EMAIL PROTECTED]
 Subject: Re: Frame Relay Security
 Date: Sun, 7 Jan 2001 13:37:09 -0500
 
 
 I understand most of the benefits of frame relay, but I am wondering if =
 there are any security problems assoicated with this protocol?  Is it =
 secure enough for unencrypted transfer of financial or sensitive =
 information?  Any help understanding the security risks associated with =
 frame relay appreciated.
 
 -- Kevin
 
 Is a dedicated line secure enough for unencrypted transfer of
 financial or sensitive information?
 
 Answer:  It depends.
 
 People often assume that frame is somehow shared when "dedicated
 lines" are not.   From Chapter 5 of my _WAN Survival Guide_,
 
 
 All too many users have an intuitive belief that if they were to
 pull on the London end of a London to New York circuit, wires would
 wiggle in Manhattan. The reality, of course, is that any network of
 complexity beyond a very simple LAN involves one or more layers of
 virtualization onto real media. At the OSI lower layers,
 virtualization usually involves multiplexing, but various name and
 address mapping functions provide virtual structure as one moves up
 the protocol stack.
 
 Typically, frame PVCs and T1's run over exactly the same media from
 the customer site to the telco end office.  Once at the end office,
 they are multiplexed.  T1 is far too slow for economical data
 transmission between modern telco offices.  Both the T1 and the frame
 circuits typically will be multiplexed onto facilities at least at
 DS-3, and usually OC-12 to OC-192. So much beyond the local loop,
 there really isn't much difference between frame and dedicated.
 
 Interpretations in the US HIPAA legislation for medical data tend to
 allow unencrypted traffic to flow over dedicated and frame, but not
 the public Internet.  The Federal Reserve, however, tends to want
 end-to-end encryption regardless of the media, historically single
 DES.  Military traffic would be bulk encrypted and possibly
 end-to-end encrypted as well.
 
 _
 FAQ, list archives, and subscription info:
 http://www.groupstud

RE: Frame Relay Security

2001-01-08 Thread Tony van Ree

Hi all,

A front gate keeps cattle of the lawn.  A front door keeps welcome strangers from 
entering my house.  A lock on the bedroom door may protect me a night.  Something 
stronger would be needed to ensure my wife was safe.

I guess what I am trying to say is the greater your level of risk the stronger your 
security must be.  Knowing that data crosses public networks has one being a little 
more careful about what is sent there.  Private networks accross or between countries 
become a problem as all the data at the point it leaves the carrier is multiplexed 
between switches.  There is usually no distinction between the type of data being sent 
(Although some carriers may provide special services this would probably not occur 
between countries).  Often there is no way for the carrier to tell what type of data 
is being sent. (if they could it might present a security risk).  

It should not be the carriers responsibility to look after the security of an 
individuals data but to make the best effort to ensure it gets to the right person.  
This is no different to sending a parcel in the mail.

It is strange though that throughout all my studies and my networking career 
statistics seem to point that the greatest risk is from within.  Usually because this 
is where most feel security is not required.

This stuff goes round and around.  It seems to me that the security of data is 
ultimately the responsibitly of the end devices.  I thought that is why end to end 
encryption was developed.

Just some views.

Teunis,
Hobart, Tasmania
Australia



On Monday, January 08, 2001 at 04:24:11 PM, Chuck Larrieu wrote:

 Jim, just to be contrary, how can a single provider, or even multiple
 provider frame clouds be compromised as easily as internet traffic?
 
 What are some of the specifics of danger of compromise of any private
 network versus the internet?
 
 Those bad people can't, for example, do DDoS attacks against your private
 network, except via the internet connection. It is that same internet
 connection that is the source of major compromises of corporate networks
 nationwide.
 
 What are some of the specific security issues you see on private networks,
 as compared to public networks?
 
 Chuck
 Just being contrary, in the hopes of learning something :-
 
 -Original Message-
 From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] On Behalf Of Jim
 Brown
 Sent: Monday, January 08, 2001 8:47 AM
 To:   'Brian Lodwick'; [EMAIL PROTECTED]
 Subject:  RE: Frame Relay Security
 
 
 There should not be different levels of encryption for traffic depending on
 whether its frame or Internet transient. Your traffic is open to compromise
 on the Internet or in a providers frame cloud. From a security viewpoint
 neither one is more secure than the other.
 
 It really boils down to acceptable risk vs. cost.
 
 Just remember, you can never eliminate risk. There are always holes in your
 security.
 
 Any individual who is asking themselves should I use DES/3DES on a frame
 connection should stop and look to see if they have a modem bank behind
 their firewall.
 
 Your security is only a strong as the weakest link.
 
 -Original Message-
 From: Brian Lodwick [mailto:[EMAIL PROTECTED]]
 Sent: Sunday, January 07, 2001 8:35 PM
 To: [EMAIL PROTECTED]
 Subject: Re: Frame Relay Security
 
 
 Group,
   Which then I believe should obviously lead into the discussion- if VPN's
 are today's PVC's then would it be appropriate to say that traffic
 transported over the public internet with such a protocol as IPSec is just
 as safe? and how do you know your enemies aren't working for that frame
 provider -if they are using single DES they had better hope not. Are there
 protocols now capable of providing enough security encryption for extremely
 sensitive traffic to transit the public internet?
 
 Brian
 
 From: "Howard C. Berkowitz" [EMAIL PROTECTED]
 Reply-To: "Howard C. Berkowitz" [EMAIL PROTECTED]
 To: [EMAIL PROTECTED]
 Subject: Re: Frame Relay Security
 Date: Sun, 7 Jan 2001 13:37:09 -0500
 
  I understand most of the benefits of frame relay, but I am wondering if =
  there are any security problems assoicated with this protocol?  Is it =
  secure enough for unencrypted transfer of financial or sensitive =
  information?  Any help understanding the security risks associated with =
  frame relay appreciated.
  
  -- Kevin
 
 Is a dedicated line secure enough for unencrypted transfer of
 financial or sensitive information?
 
 Answer:  It depends.
 
 People often assume that frame is somehow shared when "dedicated
 lines" are not.   From Chapter 5 of my _WAN Survival Guide_,
 
  All too many users have an intuitive belief that if they were to
  pull on the London end of a London to New York circuit, wires would
  wiggle in Manhattan. The reality, of course, is that any network of
  complexity beyond a very simple LAN involves one or more layers of
  virtualization onto real 

Frame Relay Security

2001-01-07 Thread Kevin Welch

I understand most of the benefits of frame relay, but I am wondering if =
there are any security problems assoicated with this protocol?  Is it =
secure enough for unencrypted transfer of financial or sensitive =
information?  Any help understanding the security risks associated with =
frame relay appreciated.

-- Kevin

_
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



Re: Frame Relay Security

2001-01-07 Thread TrentJ

Here is a document that may help answer your question.

http://www.cisco.com/warp/public/cc/so/neso/wnso/power/chzsp_wp.htm


"Kevin Welch" [EMAIL PROTECTED] wrote in message
015f01c078cc$c64bece0$2a002a0a@sjc102498">news:015f01c078cc$c64bece0$2a002a0a@sjc102498...
 I understand most of the benefits of frame relay, but I am wondering if =
 there are any security problems assoicated with this protocol?  Is it =
 secure enough for unencrypted transfer of financial or sensitive =
 information?  Any help understanding the security risks associated with =
 frame relay appreciated.

 -- Kevin

 _
 FAQ, list archives, and subscription info:
http://www.groupstudy.com/list/cisco.html
 Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



_
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



Re: Frame Relay Security

2001-01-07 Thread Erick B.

Most Frame relay connections go through some
telco/frame provider and some bigger organizations
have their own frame infrastructure. I'm not aware of
any security measures at the frame layer.

As for securing the information, you can encrypt at
layer 3. Most financial software these days has 
encryption in the software of some sort. This is the
best spot to do it. Lets say the router just encrypts
then between the PC and the router the data will be
unsecure (unless application encrypts) and someone can
pick it up with a sniffer. Another example is SSL and
HTTPS which are done at the application level. As with
anything, if it's sensative - protect it at the
source.

--- Kevin Welch [EMAIL PROTECTED] wrote:
 I understand most of the benefits of frame relay,
 but I am wondering if =
 there are any security problems assoicated with this
 protocol?  Is it =
 secure enough for unencrypted transfer of financial
 or sensitive =
 information?  Any help understanding the security
 risks associated with =
 frame relay appreciated.
 
 -- Kevin


__
Do You Yahoo!?
Yahoo! Photos - Share your holiday photos online!
http://photos.yahoo.com/

_
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



Re: Frame Relay Security

2001-01-07 Thread Howard C. Berkowitz

I understand most of the benefits of frame relay, but I am wondering if =
there are any security problems assoicated with this protocol?  Is it =
secure enough for unencrypted transfer of financial or sensitive =
information?  Any help understanding the security risks associated with =
frame relay appreciated.

-- Kevin

Is a dedicated line secure enough for unencrypted transfer of 
financial or sensitive information?

Answer:  It depends.

People often assume that frame is somehow shared when "dedicated 
lines" are not.   From Chapter 5 of my _WAN Survival Guide_,

All too many users have an intuitive belief that if they were to 
pull on the London end of a London to New York circuit, wires would 
wiggle in Manhattan. The reality, of course, is that any network of 
complexity beyond a very simple LAN involves one or more layers of 
virtualization onto real media. At the OSI lower layers, 
virtualization usually involves multiplexing, but various name and 
address mapping functions provide virtual structure as one moves up 
the protocol stack.

Typically, frame PVCs and T1's run over exactly the same media from 
the customer site to the telco end office.  Once at the end office, 
they are multiplexed.  T1 is far too slow for economical data 
transmission between modern telco offices.  Both the T1 and the frame 
circuits typically will be multiplexed onto facilities at least at 
DS-3, and usually OC-12 to OC-192. So much beyond the local loop, 
there really isn't much difference between frame and dedicated.

Interpretations in the US HIPAA legislation for medical data tend to 
allow unencrypted traffic to flow over dedicated and frame, but not 
the public Internet.  The Federal Reserve, however, tends to want 
end-to-end encryption regardless of the media, historically single 
DES.  Military traffic would be bulk encrypted and possibly 
end-to-end encrypted as well.

_
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



RE: Frame Relay Security

2001-01-07 Thread Kathy Miihalisko

Kevin:

No matter the solution, if it's not encrypted it's not secure. In your
situation you might also consider certificate-based router authentication.

Kathy "Katyusha" M.

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of
Kevin Welch
Sent: Sunday, January 07, 2001 12:11 PM
To: [EMAIL PROTECTED]
Subject: Frame Relay Security


I understand most of the benefits of frame relay, but I am wondering if =
there are any security problems assoicated with this protocol?  Is it =
secure enough for unencrypted transfer of financial or sensitive =
information?  Any help understanding the security risks associated with =
frame relay appreciated.

-- Kevin

_
FAQ, list archives, and subscription info:
http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

_
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



Re: Frame Relay Security

2001-01-07 Thread Tony van Ree

Hi,

Once the data gets from your physical link into the Telco end it is usually 
re-multiplexed into other physical links to go onto the next site.  This may go on for 
a number of times depending on where the logical link goes.  For example, a trace 
route may indicate 6 hops to a site to get to the site may require going through 20 
physical links.  You message get remixed (multiplexed) on each physical link.

That has been my understanding.

Teunis
Hobart, Tasmania
Australia



On Sunday, January 07, 2001 at 01:37:09 PM, Howard C. Berkowitz wrote:

 I understand most of the benefits of frame relay, but I am wondering if =
 there are any security problems assoicated with this protocol?  Is it =
 secure enough for unencrypted transfer of financial or sensitive =
 information?  Any help understanding the security risks associated with =
 frame relay appreciated.
 
 -- Kevin
 
 Is a dedicated line secure enough for unencrypted transfer of 
 financial or sensitive information?
 
 Answer:  It depends.
 
 People often assume that frame is somehow shared when "dedicated 
 lines" are not.   From Chapter 5 of my _WAN Survival Guide_,
 
 All too many users have an intuitive belief that if they were to 
 pull on the London end of a London to New York circuit, wires would 
 wiggle in Manhattan. The reality, of course, is that any network of 
 complexity beyond a very simple LAN involves one or more layers of 
 virtualization onto real media. At the OSI lower layers, 
 virtualization usually involves multiplexing, but various name and 
 address mapping functions provide virtual structure as one moves up 
 the protocol stack.
 
 Typically, frame PVCs and T1's run over exactly the same media from 
 the customer site to the telco end office.  Once at the end office, 
 they are multiplexed.  T1 is far too slow for economical data 
 transmission between modern telco offices.  Both the T1 and the frame 
 circuits typically will be multiplexed onto facilities at least at 
 DS-3, and usually OC-12 to OC-192. So much beyond the local loop, 
 there really isn't much difference between frame and dedicated.
 
 Interpretations in the US HIPAA legislation for medical data tend to 
 allow unencrypted traffic to flow over dedicated and frame, but not 
 the public Internet.  The Federal Reserve, however, tends to want 
 end-to-end encryption regardless of the media, historically single 
 DES.  Military traffic would be bulk encrypted and possibly 
 end-to-end encrypted as well.
 
 _
 FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
 Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]
 
 


--
www.tasmail.com


_
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]