Security Applications of cflowd
Times, they are a'changing
Question: Who ate my DMZ???
In the "good-old-days" we had a nice, broadcast media DMZ, on which
we had some novel traffic monitors to:
- scan all inbound/outbound traffic for several general attack
precursors;
- monitor and enforce network security compliance;
- collect evidence.
Now we have one OC-3 pipe into a Cisco that switches to several
internal, external, and partner switch/routers.
- how to accomplish the above in such a configuration?
The big pipes keep pushing further out!