A. Anomaly Detection B. SYN Cookies C. Application Inspection D. Content filtering E. Anti-X Protection F. Anti Virus
A. Storm Control B. Port security C. CAM table size definition D. IP spoof prevention E. Network Based Application Recognition
A. SDEE B. Telnet C. Console D. FTP E. HTTPS F. SSH