It has the functions that they are expected of a program of its class as they are the
configuration of rules outposts and zones of confidence for
directions, ports and applications or the registry in real time
of the activity of the network, all this without an excessive
consumption of resources.
|