Hi all,
Is there any documents available concerning the flow of a packet in the UTM? And this according the technology used (Web Filtering Proxy / L4 Firewall / Fall back if no rules present at one of the used technology etc..)
Thanks,
-m-
This thread was automatically locked due to age.