31 Mar
1999
31 Mar
'99
1:53 p.m.
I absolutely agree, but we're finding that the reality is that network operators are using firewalls to provide host protection, not data protection, per se.
Melinda
At 10:06 AM 3/31/99 -0800, Matt Holdrege wrote:
As has been discussed on the MEGACO list, the best way to authenticate and authorize is to use IPsec. This has absolutely nothing to do with inspecting the internal payload of the packet.
Melinda Shore Member of the Scientific Staff Nokia IP Telephony 127 West State Street Ithaca, New York 14850 +1 607 273 0724 x81 (office) +1 607 275 3610 (fax) +1 607 280 0010 (mobile) shore@ithaca-viennasys.com