Uses SHA-1 hashing algorithms for digital signage encryption | |
Uses the same keys to encrypt and decrypt data | |
Uses different keys to encrypt and decrypt data | |
Uses MD5 hashing algorithms for digital signage encryption |
When configured with the "PASS" action, stateful inspection is applied to all traffic passing between the configured zones. | |
Policies are applied to traffic moving between zones, not between interfaces. | |
The firewalls can be configured simultaneously on the same interface as classic CBAC using the ip inspect CLI command. | |
Interface ACLs are applied before zone-based policy firewalls when they are applied outbound. |
Configure synchronized syslog reporting. | |
Configure a common repository of all network events for ease of monitoring. | |
Configure Network Time Protocol. | |
Configure an automated network monitoring system for event correlation. |