Network Policy Server

Results: 104



#Item
81Internet protocols / Cryptographic software / Network architecture / Computer network security / Cisco PIX / Network Security Services / IPsec / HMAC / Cisco Systems / Computing / Server appliance / Cryptography

PIX 515-515E Security Policy 7_2 v1_10.fm

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-12-03 00:00:00
82Router / Server appliance / Electronic engineering / Cisco Systems / Network architecture / Network switch / Cisco / Computing / Videotelephony / Networking hardware

Cisco 7206 VXR Router with ISA Security Policy Introduction This nonproprietary Cryptographic Module Security Policy describes how the 7206 VXR NPE-400 routers meet the security requirements of Federal Information Proces

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
83Computer network security / Cryptography / Network architecture / Cisco PIX / Cryptographic software / Cryptographic protocols / Cisco Systems / IPsec / Security appliance / Computing / Server appliance / Internet protocols

PIX[removed]Security Policy 7_2 v1_7.fm

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-11-27 00:00:00
84Computer network security / Internet privacy / Network architecture / Videotelephony / Cisco Systems / Cisco IOS / Router / Virtual private network / FIPS 140-2 / Computing / Electronics / Server appliance

FIPS[removed]Non-Proprietary Security Policy for the Cisco 7206 VXR NPE-G1, Cisco 7206 VXR NPE-G2, Cisco 7206 VXR NPE-G1 with VSA, and the Cisco 7301 with VAM2+ Cisco 7206 VXR Chassis with NPE-G1 or NPE-G2 and VAM2+ Encryp

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-12-18 00:00:00
85Electronics / Network architecture / Internet privacy / Server appliance / Cisco Systems / Virtual private network / Cisco IOS / Network switch / Cisco / Computing / Computer network security / Routers

Cisco 7140 VPN Router Security Policy Introduction This nonproprietary Cryptographic Module Security Policy describes how Cisco 7140 VPN routers meet the security requirements of the Federal Information Processing Standa

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
86Computer hardware / Router / Server appliance / Cisco Systems / WAN Interface Card / Network switch / Cisco IOS / Cisco / Routing / Computing / Networking hardware

Cisco 2621 Modular Access Router Security Policy Introduction This is a non-proprietary Cryptographic Module Security Policy for the Cisco 2621 router. This security policy describes how the 2621 router meets the securit

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
87Computer hardware / Router / Server appliance / Cisco Systems / WAN Interface Card / Network switch / Cisco IOS / Cisco / Routing / Computing / Networking hardware

Cisco 2621 Modular Access Router Security Policy Introduction This is a non-proprietary Cryptographic Module Security Policy for the Cisco 2621 router. This security policy describes how the Cisco 2621 router meets the s

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
88Computer network security / Email / Malware / Electronic commerce / National security / Internet privacy / Password / Proxy server / Spyware / Computing / Internet / Security

Computer and Internet Use Policy Faculty, staff and students (hereinafter users) are expected to promote efficient use of network resources, consistent with the instructional, research, public service and administrative

Add to Reading List

Source URL: littlepriest.edu

Language: English - Date: 2013-06-10 12:46:18
89Computer network security / Internet privacy / Network architecture / Bring your own device / Password / BlackBerry Enterprise Server / BlackBerry / Operating system / Virtual private network / Technology / Computing / Mobile technology

Bring Your Own Device Policy and Rules of Behavior (Employer Name)  (Version X, [DATE]) This document provides policies, standards, and rules of behavior (ROB) for the use of personally-owned smart phones and/or tablets

Add to Reading List

Source URL: www.wsdot.wa.gov

Language: English - Date: 2014-08-01 13:12:03
90Malware / Computer security / Antivirus software / Spyware / Server / Computer virus / Distributed firewall / Computer network security / System software / Cyberwarfare

State of Vermont Malicious Software Protection Originally Approved: [removed]Approved by: Tom Pelham Policy Number:

Add to Reading List

Source URL: dii.vermont.gov

Language: English - Date: 2011-05-08 22:57:22
UPDATE