Panel | ||||||
---|---|---|---|---|---|---|
|
When networks using different levels of trust are interconnected, the prevailing security model is to create a gate through which all inter-network communications must pass; that is, a single point (or very limited number of points) at which security policies are enforced. In most scenarios, the greatest concern is generally when an external untrusted network communicates with a trusted network. The
Spacevars | ||
---|---|---|
|
Spacevars | ||
---|---|---|
|
The
Spacevars | ||
---|---|---|
|
Caption | ||||
---|---|---|---|---|
| ||||
Note |
---|
The example graphic depicts the SBC 5000, but all the platforms are supported. |
Info |
---|
To learn about Enterprise deployment scenarios, refer to Enterprise Deployment Scenarios. To learn about H.323 deployment scenarios, refer to H.323 Deployment Scenarios. |
Pagebreak |
---|