Results 1 - 10
of
38,001
TABLE III FUNCTIONAL DISCREPANCIES BETWEEN THE TWO FIREWALLS DESIGNED BY TEAM A AND B
2004
Cited by 8
Table 1. SOPC Firewall Modules
2003
"... In PAGE 6: ... One such module blocks patterns of TCP Synchronize/Acknowledge (SYN/ACK) packets charac- teristic of a DoS attacks. Other extensible functions that have been implemented as modules that fit into the SOPC firewall are listed in Table1 [9] [10]. The set of features in the firewall is only limited by the size of the FPGA.... ..."
Cited by 15
Table 2: Firewall rules
2005
"... In PAGE 9: ...able 1: Evaluation criteria....................................................................................................42 Table2 : Firewall rules .... In PAGE 103: ... Regardless of which of the hosts initiates the connection, the HIP proxy will interfere. The HIP base exchange packets will be properly forwarded by the proxy, since firewall rule 2, Table2 , Chapter 5, states that they should be forwarded. However, the first ESP packet sent by the legacy host will be diverted to the HIP proxy, following firewall rule 10, Table 2.... In PAGE 103: ... The HIP base exchange packets will be properly forwarded by the proxy, since firewall rule 2, Table 2, Chapter 5, states that they should be forwarded. However, the first ESP packet sent by the legacy host will be diverted to the HIP proxy, following firewall rule 10, Table2 . When the proxy examines the source and destination addresses, it notices that there are no SAs for the connection.... ..."
Table 1- The firewall configuration in the example
"... In PAGE 4: ... The firewall is configured such that only web and mail services are available from the external network. Table1 depicts the firewall rules. Table 1- The firewall configuration in the example ... ..."
Cited by 1
Table 3. Class firewall size.
2002
"... In PAGE 8: ... Class firewalls com- puted from a more precise ORD contain fewer classes. The first two columns in Table3 show the average class firewall sizes for our benchmarks. For each user class in a program, we calculated the size of its firewall.... ..."
Cited by 6
Table 3. Class firewall size.
2002
"... In PAGE 8: ... Class firewalls com- puted from a more precise ORD contain fewer classes. The first two columns in Table3 show the average class firewall sizes for our benchmarks. For each user class in a program, we calculated the size of its firewall.... ..."
Cited by 6
Table 3. Class firewall size.
2002
"... In PAGE 8: ... Class firewalls com- puted from a more precise ORD contain fewer classes. The first two columns in Table3 show the average class firewall sizes for our benchmarks. For each user class in a program, we calculated the size of its firewall.... ..."
Cited by 6
Table 2. Firewall Filters and Actions
2003
"... In PAGE 7: ... The disadvantage of encoding rules like this is that it becomes difficult to parallelize rule classification over a set of different rules. Table2 lists some example classification filters and actions common in firewalls. Intelligent Storage Storage Area Networks (SANs) consist of a collection of SCSI disks connected together through a fast interconnect, typically Fibre Channel.... ..."
Table 2. Firewall Filters and Actions
2003
"... In PAGE 7: ... The disadvantage of encoding rules like this is that it becomes difficult to parallelize rule classification over a set of different rules. Table2 lists some example classification filters and actions common in firewalls. Intelligent Storage Storage Area Networks (SANs) consist of a collection of SCSI disks connected together through a fast interconnect, typically Fibre Channel.... ..."
Results 1 - 10
of
38,001