p*0
2 楼
a*n
3 楼
挖个大坑,大家都发财。 让版主们破费。
We used to use source IP based filtering,
no matter stateful firewall, or zone-based firewall,
they are still all primarily based on IP.
Now wireless looks to have potential to dominate
access layer. How the traditional IP based firewall policy
interact with controller based security?
802.1x is supposed to provide identity based access, but
how scale is it to push ACL/firewall rules from radius to
end host?
So called next-generation firewall like Palo Alto
boasts application awareness, identity/Active Directory
integration, 100G throughput ..., But isn't it more
positioned in traditional border firewall? How about internal
networks?
Cisco TrustSec looks good, but how about standadization?
Cisco is also preaching borderless architecture, will that be good?
What's your think, insight, similar features from different vendors?
We used to use source IP based filtering,
no matter stateful firewall, or zone-based firewall,
they are still all primarily based on IP.
Now wireless looks to have potential to dominate
access layer. How the traditional IP based firewall policy
interact with controller based security?
802.1x is supposed to provide identity based access, but
how scale is it to push ACL/firewall rules from radius to
end host?
So called next-generation firewall like Palo Alto
boasts application awareness, identity/Active Directory
integration, 100G throughput ..., But isn't it more
positioned in traditional border firewall? How about internal
networks?
Cisco TrustSec looks good, but how about standadization?
Cisco is also preaching borderless architecture, will that be good?
What's your think, insight, similar features from different vendors?
n*d
4 楼
Could anybody recommand a GOOD MXML programming book?
Is there any FREE downloadable version?
Thanks!
Is there any FREE downloadable version?
Thanks!
S*1
5 楼
网上申工作,每个学校都要3封推荐信,请问校区网站上的reference会自动发链接给推
荐人么?
难道每个申请都要跟3个老师要一次推荐信,那老师不得烦死?还是一次跟老师要一个不
封的,然后复印给对方(不知老师肯不肯答应)。
荐人么?
难道每个申请都要跟3个老师要一次推荐信,那老师不得烦死?还是一次跟老师要一个不
封的,然后复印给对方(不知老师肯不肯答应)。
p*0
6 楼
这一个是古琴版
a*n
7 楼
Ah, Nobody reply so far.
I am serious to discuss the network security.
【在 a***n 的大作中提到】![](/moin_static193/solenoid/img/up.png)
: 挖个大坑,大家都发财。 让版主们破费。
: We used to use source IP based filtering,
: no matter stateful firewall, or zone-based firewall,
: they are still all primarily based on IP.
: Now wireless looks to have potential to dominate
: access layer. How the traditional IP based firewall policy
: interact with controller based security?
: 802.1x is supposed to provide identity based access, but
: how scale is it to push ACL/firewall rules from radius to
: end host?
I am serious to discuss the network security.
【在 a***n 的大作中提到】
![](/moin_static193/solenoid/img/up.png)
: 挖个大坑,大家都发财。 让版主们破费。
: We used to use source IP based filtering,
: no matter stateful firewall, or zone-based firewall,
: they are still all primarily based on IP.
: Now wireless looks to have potential to dominate
: access layer. How the traditional IP based firewall policy
: interact with controller based security?
: 802.1x is supposed to provide identity based access, but
: how scale is it to push ACL/firewall rules from radius to
: end host?
s*g
9 楼
Topic too broad, don't know where to start.
k*s
11 楼
We used to use source IP based filtering,
no matter stateful firewall, or zone-based firewall,
they are still all primarily based on IP.
Now wireless looks to have potential to dominate
access layer. How the traditional IP based firewall policy
interact with controller based security?
802.1x is supposed to provide identity based access, but
how scale is it to push ACL/firewall rules from radius to
end host?
no matter stateful firewall, or zone-based firewall,
they are still all primarily based on IP.
Now wireless looks to have potential to dominate
access layer. How the traditional IP based firewall policy
interact with controller based security?
802.1x is supposed to provide identity based access, but
how scale is it to push ACL/firewall rules from radius to
end host?
m*t
13 楼
am interested in security areas, specially for wireless domain. the original
post has a wide span both vertically and horizontally with a mixed concept,
hard to comment
it would be helpful to elaborate the problem statement
post has a wide span both vertically and horizontally with a mixed concept,
hard to comment
it would be helpful to elaborate the problem statement
相关阅读
special education真的好容易找工作啊看看这个有戏吗我看过精华有一个问题谁知道实习之前背景调查的程序是什么?一门棘手的课,请大家给点意见。请大家帮忙推荐CBEST\CEST参考书、有用网站~~~~谢谢~MIAMI的DADE COUNTY公立学校 招中文/普通话教师opt 截止日期与H1B的影响都教育master,一般第几学期开始实习呀?H1b in public school sAnyone who knows any good ESL M.S. program in Britain?帮忙看看-特殊教育申请I am backinstructional educational technology phd好申么?SCHOOL PSYCHOLOGIST (zt)问个关于申请的问题 (转载)请问在高中教书的朋友问个技术问题:请问stata如何用IRT处理missing values?AERA 2007 年会的旅馆,大家都定了吗?