Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword
Like this
1Activity
0 of .
Results for:
No results containing your search query
P. 1
Packet200701-Part2

Packet200701-Part2

Ratings: (0)|Views: 42 |Likes:
Published by Kowit Meboon
นิตยสาร Packet ปี 2007 ฉบับที่ 1 ส่วนที่ 2
นิตยสาร Packet ปี 2007 ฉบับที่ 1 ส่วนที่ 2

More info:

Published by: Kowit Meboon on Oct 04, 2009
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

10/06/2009

pdf

text

original

 
22
 
PACKET
CISCO SYSTEMS 2007
...  Self-Defending Network
 F  F    F                  F  F           F    F         F   (Self-Defending)  F      F   F       F Self-Defending Network  FF    F              F     (policy)    F F F  FF Intrusion Prevention   Access Control List (ACL)   F                    F  F   FF Self-Defending Network   Cisco Security Management Suite   2006      F      F Cisco Security Manager  Cisco Security Moni-toring, Analysis, and Response System (MARS)   F   F      
F

 E A T U R E
 
PACKET
CISCO SYSTEMS 2007
23
 F   Cisco ASA 5500 Series Adaptive Security Appliance 5500  F     F  IPSec  SSL  5,000  

F        (Intrusion Preven- tion System)       FCisco Security Manager     F F  FF  F Instant Messaging    F     Cisco Security Manager           Cisco ASA,   IOS Software, PIX,  Catalyst F     Cisco Security Manager   FF FF  F      F FFF      Cisco Security Management Suite F       Cisco Security Manager   F F   F          Cisco Security Manager F      F        CiscoSecurity Manager   Cisco Security Manager    F  Cisco Security MARS  4.2    F     F
 
24
 
PACKET
CISCO SYSTEMS 2007
   FF Cisco Security MARS  F       FF      F        F  F Cisco Security MARS  F  F      F   F F            irewall Log  Cisco Security MARS    Log       Cisco Security Manager       Log   F       F   F
F...  !
      F F Cisco ASA 5500 Series Adaptive Security Appliance  7.1    FFF  FF    ASA 5500 Series  4  F Anti-X, VPN, IPS  irewall          F FF ASA 5500 Series       F  F     Anti-X     F         Cisco PIX irewall FAnti-X   Cisco Security and Control Security Services Module(CSC-SSM) FASA 5500 Series     FFF  F F  F  (F     URL  )    (F   )     FFF  FF    (  )   F  F
 
Cisco ASA 5500 Series      F    F F      F     F SSL VPN F F        F IPSec VPN F    F  F   ASA 5500 Series  Clientless VPN     F  F F F    F      7.1     F SSL VPN  IPSec VPN 2,500  F 5 F (   5,000 )   
   Anti-X  
“Anti-X   F   ”  FF    “  Trend Micro InterScan Security Suite   FFPIX       Anti-X  F   F    F     “”     ”   FF Anti-X   “Store-and- orward”   ile-Based  FF    F Anti-X     FF Levels 3  4 FF    FF   
F E A T U R E

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->