Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

What are difference between Juniper and checkpoint firewall?
and Can you explain me about the difference between checkpoint
and Cisco pix firewall ?

Answer Posted / vineeth mukundan

Cisco ASA doesnt provide this information other than this
Cisco ASA requires seperate syslog server for logging in cisco

Logging and tracking is easy and comprehensive in
checkpoint, with identity awareness blade, you would have
machined details along with user ID information logged.

Is This Answer Correct ?    24 Yes 4 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

Explain in mobile and computer and home is it possible that we see and listen person voice and activity carefully for destroying their privacy?

959


What is mesh network

1018


Can you give me some ransomware variants?

993


What is difference between discretionary access control and mandatory access control?

990


Different Bitwin ADSL & DSL ROUTER? How To Configure

3009


What factors would you consider before deploying a web intrusion detection system?

973


What is udp flood?

1071


What is Cross Site Request Forgery and how to defend against it?

1033


What is a DNS resource record

1054


What is Cross site scripting?

1088


In context of public key encryption, if you are using both signature and encryption features, what key will you use for encryption and which one will you use for signing?

972


Explain how do we use rsa for both authentication and secrecy?

1015


What is trojan virus?

1004


What is RIS?

1040


What is information security?

1189