Table of Contents
3.2 Application proxy
3.5 Circuit proxy
3.4 Bit forwarding rate
3.7 Connection
3.6 Concurrent connections
3.8 Connection establishment rate
3.9 Connection overhead
3.15 Illegal traffic
3.24 Rule set (discussion)
4. Security considerations
PPT Slide
mjr: Sort by time of day, per hour
|
Author: David Newman
|