Uses different keys to encrypt and decrypt data | |
Uses MD5 hashing algorithms for digital signage encryption | |
Uses the same keys to encrypt and decrypt data | |
Uses SHA-1 hashing algorithms for digital signage encryption |
The firewalls can be configured simultaneously on the same interface as classic CBAC using the ip inspect CLI command. | |
Policies are applied to traffic moving between zones, not between interfaces. | |
Interface ACLs are applied before zone-based policy firewalls when they are applied outbound. | |
When configured with the "PASS" action, stateful inspection is applied to all traffic passing between the configured zones. |
Hot standby routing protocol | |
IP routing | |
Bridging | |
Virtual access list |