Was wondering if some people would like to give their opinions and facts on the following:
We had a company come in about 2 weeks ago and perform an audit on the configs of our 6 PIX Firewalls. One of the recommendatios was:
"Start replacing the numerous conduit statements you have by using access lists seeing that is the way Cisco will be going in the future with PIX configs"
Is this for real ? Should access lists be used over conduits ? If so, why ?
Thanks
We had a company come in about 2 weeks ago and perform an audit on the configs of our 6 PIX Firewalls. One of the recommendatios was:
"Start replacing the numerous conduit statements you have by using access lists seeing that is the way Cisco will be going in the future with PIX configs"
Is this for real ? Should access lists be used over conduits ? If so, why ?
Thanks