uld search CCO for Java blocking CBAC for a more in depth
explanation.
-Original Message-
From: Dinesh_Kakkar [mailto:[EMAIL PROTECTED]]
Sent: Wednesday, August 09, 2000 11:30 PM
To: 'Chris Larson'; [EMAIL PROTECTED]
Subject: RE: enable security features with Cisco IOS using CB
We use CBAC as a usefull first line of defense before the firewall. Using
CBAC we can limit embryonic or half open connections, specifiy a maximum
number of incomplete handshakes, set thresholds for certain types of data,
limit java scripts and the level at which they operate, only allow
connectio
: 'Dinesh_Kakkar'; [EMAIL PROTECTED]
Subject: RE: enable security features with Cisco IOS using
CBAC
We use CBAC as a usefull first line of defense before the firewall.
Using
CBAC we can limit embryonic or half open connections, specifiy a
maximu
To: [EMAIL PROTECTED]
Subject: RE: enable security features with Cisco IOS using
CBAC
Funny you should mention this.
CBAC is one of the components of the MCNS specialty and one of the
strong
features of the IOS security now. I've read a bit in the Held and
Hund
Funny you should mention this.
CBAC is one of the components of the MCNS specialty and one of the strong
features of the IOS security now. I've read a bit in the Held and Hundley
book Cisco Access Lists Field Guide. Now that I have the means to do so, I
have been contemplating how to demonstrate
5 matches
Mail list logo