<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>Attacks Archives - Network Solution</title>
	<atom:link href="https://blog.network-solution.net/category/attacks/feed/" rel="self" type="application/rss+xml" />
	<link>https://blog.network-solution.net/category/attacks/</link>
	<description></description>
	<lastBuildDate>Mon, 08 Feb 2016 22:45:28 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.5.7</generator>

<image>
	<url>https://blog.network-solution.net/wp-content/uploads/2021/06/favicon.ico</url>
	<title>Attacks Archives - Network Solution</title>
	<link>https://blog.network-solution.net/category/attacks/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">88039135</site>	<item>
		<title>Configuring an Advanced ACL to Defend Against Attacks</title>
		<link>https://blog.network-solution.net/configuring-an-advanced-acl-to-defend-against-attacks/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=configuring-an-advanced-acl-to-defend-against-attacks</link>
					<comments>https://blog.network-solution.net/configuring-an-advanced-acl-to-defend-against-attacks/#respond</comments>
		
		<dc:creator><![CDATA[mammoura]]></dc:creator>
		<pubDate>Mon, 08 Feb 2016 22:45:28 +0000</pubDate>
				<category><![CDATA[Advanced ACL]]></category>
		<category><![CDATA[Attacks]]></category>
		<category><![CDATA[Defend Against Attacks]]></category>
		<guid isPermaLink="false">http://blog.network-solution.net/?p=412</guid>

					<description><![CDATA[<p>Networking Requirements As shown in&#160;Figure 1,&#160;Device&#160;A,&#160;Device&#160;B, and&#160;Device&#160;C are access devices, whereas&#160;Device&#160;D,&#160;Device&#160;E, and&#160;Device&#160;F are core devices. The access devices connect to the core devices through 10 Gbit/s interfaces. Voice and 3G services run on the network. To control user access and ensure network and device security, security policies need to be configured on the access routers &#8230; </p>
<p>The post <a href="https://blog.network-solution.net/configuring-an-advanced-acl-to-defend-against-attacks/">Configuring an Advanced ACL to Defend Against Attacks</a> appeared first on <a href="https://blog.network-solution.net">Network Solution</a>.</p>
]]></description>
		
					<wfw:commentRss>https://blog.network-solution.net/configuring-an-advanced-acl-to-defend-against-attacks/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">412</post-id>	</item>
	</channel>
</rss>
