-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hi Gunter,
I fully concur with you here.
$.02,
- - ferg
On 2/24/2014 3:03 AM, Gunter Van de Velde (gvandeve) wrote:
> Hi Fernando,
>
> Firewall technology is implemented based upon usage case and may be
> very differently for each implementatio
Le 2014-02-24 11:15, Fernando Gont a écrit :
>> You should document all usage cases
>> and agreement on the security risks imposed, together with a balanced
>> view on how to address those risks.
>
> This seems to be out-of-scope. i.e., our document is on capabilities as
> opposed to discussing se
Hi, Gunter,
Thanks so much for your feedback! Please find my coments inline...
On 02/24/2014 08:03 AM, Gunter Van de Velde (gvandeve) wrote:
>
> Firewall technology is implemented based upon usage case and may be
> very differently for each implementation (centralized, distributed,
> L3-only, L4
Hi Fernando,
Firewall technology is implemented based upon usage case and may be very
differently for each implementation (centralized, distributed, L3-only,
L4-only, L3-L4, Session, Services, Applications,
etc...)... loads of interpretations on what is the most secure and scalable
method for