Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations SkipVought on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

Search results for query: *

  1. wallace

    SYNfloods and PIX

    Berford: I'm afraid I wasn't clear enough. (Sorry about that.) Actually, I'm asking about controls the PIX may have to protect server that are on the inside from SYNflood attacks emanating from the outside. For example, Checkpoint has a capability that they call SYNdefender that does this...
  2. wallace

    SYNfloods and PIX

    Does anyone know if the PIX has any built-in security controls to lessen the impact of Denial of Service attacks? If so, is there anything one can do to configure or adjust these controls? Thanks.
  3. wallace

    Command authorization profiles on PIX through CSACS

    In IOS it is possible to set up different groups in CSACS and give each group access to different sets of commands on an IOS router. Does anyone know if a similar capability exists for the PIX (that is, working in concert with CSACS through CSACS' authorization capabilities). Thanks!

Part and Inventory Search

Back
Top