Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

What are difference between Juniper and checkpoint firewall?
and Can you explain me about the difference between checkpoint
and Cisco pix firewall ?

Answer Posted / ashish

In pix or asa rules are appied on the interface whereas in
checkpoint rules are applied on the gateway.

Is This Answer Correct ?    60 Yes 7 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What is the difference between a virus and malware?

985


Explain how does traceroute work? Now how does traceroute make sure that the packet follows the same path that a previous (with ttl - 1) probe packet went in?

935


What is a Smart Card or Chip Card or Integrated Circuit Card (ICC)?

979


What is the role of single sign on in authentication technologies?

1021


What are all the technical steps involved when the data transmission from server via router?

1050


What is the general data protection regulation (gdpr)?

1065


What is difference between baseband and broadband transmission

1135


What is terminal emulation, in which layer it comes

1048


explain how do we do authentication with message digest(md5)? (Usually md is used for finding tampering of data)

913


explain what is meant by port blocking within lan?

1010


Is vpn traffic encrypted?

1066


What is the difference between cybersecurity and information security?

1122


What do you do when you get blue screen in a computer? How do you troubleshoot it?

1051


Explain what is the role of single sign on in authentication technologies?

1055


What are worms?

1018