- Provides an additional, flexible eccess permission mechanism
- Provides monitor and block inbound and outbound communications with known malicious and undesirable hosts
- Provides redirect traffic from the switch to the application
- Provides sequential search for allowed and blocked domains
Для просмотра статистики ответов нужно
войти.