Video Tutorial: Zone Protection Profiles

Video Tutorial: Zone Protection Profiles

32,937 Просмотров

Ссылки и html тэги не поддерживаются


Комментарии:

@TheMikael42
@TheMikael42 - 14.02.2019 18:37

Please drink a coffee before giving a training. Thanks for the nice work.

Ответить
@pravallikadasari5532
@pravallikadasari5532 - 30.05.2019 22:16

How do you decide what would be an acceptable rate for each one of those tabs in flood and Packet Based attack protection ? I know that it depends individual case on the amount of traffic firewall handles. But where do we get started?

Ответить
@MRangelgaboo
@MRangelgaboo - 23.03.2020 20:04

Good job.

Ответить
@ashokreddyb7867
@ashokreddyb7867 - 16.05.2020 20:11

I've a doubt... Why did you apply "Zone Protection Policy" on untrust zone?? Can anyone dispel my doubt?? A reply is much appreciated.

Ответить
@LivingCurios
@LivingCurios - 16.07.2020 13:21

I watched all the videos in this series, but this video is the worst, the narrator just reads what is on the screen. Thank you I can read also. Better he explains more technical details.

Ответить
@markmaxwell6818
@markmaxwell6818 - 15.08.2020 01:09

Another great video but you need a new keyboard / mouse. That mouse click was driving me nuts!

Ответить
@ioannis69k
@ioannis69k - 24.09.2020 21:06

Junos screens on steroids ! Nice

Ответить
@praveenbhatt6935
@praveenbhatt6935 - 26.05.2022 23:48

I want one question if you want to reach Google so how your pc will verify the certificate is valid or not

Ответить
@alexlora6009
@alexlora6009 - 21.10.2022 00:34

hi, do you recommends to apply zone protection in the WAN/outside zone?

Ответить
@emmagustavson2887
@emmagustavson2887 - 13.12.2023 01:47

Thank you very much for the clear explanation! This will help a lot with my CCDC competition!

Ответить
@kalibygomes3443
@kalibygomes3443 - 06.05.2024 03:48

Thank you!!!!

Ответить
@yeruelbirku8929
@yeruelbirku8929 - 30.05.2024 16:18

How can enable spoofing

Ответить