Комментарии:
Please drink a coffee before giving a training. Thanks for the nice work.
ОтветитьHow do you decide what would be an acceptable rate for each one of those tabs in flood and Packet Based attack protection ? I know that it depends individual case on the amount of traffic firewall handles. But where do we get started?
ОтветитьGood job.
ОтветитьI've a doubt... Why did you apply "Zone Protection Policy" on untrust zone?? Can anyone dispel my doubt?? A reply is much appreciated.
ОтветитьI watched all the videos in this series, but this video is the worst, the narrator just reads what is on the screen. Thank you I can read also. Better he explains more technical details.
ОтветитьAnother great video but you need a new keyboard / mouse. That mouse click was driving me nuts!
ОтветитьJunos screens on steroids ! Nice
ОтветитьI want one question if you want to reach Google so how your pc will verify the certificate is valid or not
Ответитьhi, do you recommends to apply zone protection in the WAN/outside zone?
ОтветитьThank you very much for the clear explanation! This will help a lot with my CCDC competition!
ОтветитьThank you!!!!
ОтветитьHow can enable spoofing
Ответить