p*0
2 楼
a*n
3 楼
挖个大坑,大家都发财。 让版主们破费。
We used to use source IP based filtering,
no matter stateful firewall, or zone-based firewall,
they are still all primarily based on IP.
Now wireless looks to have potential to dominate
access layer. How the traditional IP based firewall policy
interact with controller based security?
802.1x is supposed to provide identity based access, but
how scale is it to push ACL/firewall rules from radius to
end host?
So called next-generation firewall like Palo Alto
boasts application awareness, identity/Active Directory
integration, 100G throughput ..., But isn't it more
positioned in traditional border firewall? How about internal
networks?
Cisco TrustSec looks good, but how about standadization?
Cisco is also preaching borderless architecture, will that be good?
What's your think, insight, similar features from different vendors?
We used to use source IP based filtering,
no matter stateful firewall, or zone-based firewall,
they are still all primarily based on IP.
Now wireless looks to have potential to dominate
access layer. How the traditional IP based firewall policy
interact with controller based security?
802.1x is supposed to provide identity based access, but
how scale is it to push ACL/firewall rules from radius to
end host?
So called next-generation firewall like Palo Alto
boasts application awareness, identity/Active Directory
integration, 100G throughput ..., But isn't it more
positioned in traditional border firewall? How about internal
networks?
Cisco TrustSec looks good, but how about standadization?
Cisco is also preaching borderless architecture, will that be good?
What's your think, insight, similar features from different vendors?
n*d
4 楼
Could anybody recommand a GOOD MXML programming book?
Is there any FREE downloadable version?
Thanks!
Is there any FREE downloadable version?
Thanks!
S*1
5 楼
网上申工作,每个学校都要3封推荐信,请问校区网站上的reference会自动发链接给推
荐人么?
难道每个申请都要跟3个老师要一次推荐信,那老师不得烦死?还是一次跟老师要一个不
封的,然后复印给对方(不知老师肯不肯答应)。
荐人么?
难道每个申请都要跟3个老师要一次推荐信,那老师不得烦死?还是一次跟老师要一个不
封的,然后复印给对方(不知老师肯不肯答应)。
p*0
6 楼
这一个是古琴版
a*n
7 楼
Ah, Nobody reply so far.
I am serious to discuss the network security.
【在 a***n 的大作中提到】![](/moin_static193/solenoid/img/up.png)
: 挖个大坑,大家都发财。 让版主们破费。
: We used to use source IP based filtering,
: no matter stateful firewall, or zone-based firewall,
: they are still all primarily based on IP.
: Now wireless looks to have potential to dominate
: access layer. How the traditional IP based firewall policy
: interact with controller based security?
: 802.1x is supposed to provide identity based access, but
: how scale is it to push ACL/firewall rules from radius to
: end host?
I am serious to discuss the network security.
【在 a***n 的大作中提到】
![](/moin_static193/solenoid/img/up.png)
: 挖个大坑,大家都发财。 让版主们破费。
: We used to use source IP based filtering,
: no matter stateful firewall, or zone-based firewall,
: they are still all primarily based on IP.
: Now wireless looks to have potential to dominate
: access layer. How the traditional IP based firewall policy
: interact with controller based security?
: 802.1x is supposed to provide identity based access, but
: how scale is it to push ACL/firewall rules from radius to
: end host?
s*g
9 楼
Topic too broad, don't know where to start.
k*s
11 楼
We used to use source IP based filtering,
no matter stateful firewall, or zone-based firewall,
they are still all primarily based on IP.
Now wireless looks to have potential to dominate
access layer. How the traditional IP based firewall policy
interact with controller based security?
802.1x is supposed to provide identity based access, but
how scale is it to push ACL/firewall rules from radius to
end host?
no matter stateful firewall, or zone-based firewall,
they are still all primarily based on IP.
Now wireless looks to have potential to dominate
access layer. How the traditional IP based firewall policy
interact with controller based security?
802.1x is supposed to provide identity based access, but
how scale is it to push ACL/firewall rules from radius to
end host?
m*t
13 楼
am interested in security areas, specially for wireless domain. the original
post has a wide span both vertically and horizontally with a mixed concept,
hard to comment
it would be helpful to elaborate the problem statement
post has a wide span both vertically and horizontally with a mixed concept,
hard to comment
it would be helpful to elaborate the problem statement
相关阅读
有8个州不需要教师资格考试?我看过精华job oppt.(Non-profit organization in NYC)请大家帮忙推荐CBEST\CEST参考书、有用网站~~~~谢谢~BILINGUAL TEACHER (zt)哪个instructional technology 好?anybody has knowledge about Senior servcie?考试砸了这个怎么对付?宾州那教师证要6credits in math 6 in English以前的帖子都乱了请问非营利性组织怎么界定?公立学校都属于非营利性组织么?谢谢~HIGH SCHOOL TEACHER (zt)祝大家感恩节快乐!SCHOOL PSYCHOLOGIST (zt)去英国念特殊教育finally get registered !都教育master,一般第几学期开始实习呀?instructional educational technology phd好申么?有学音乐教育的吗?