4

Security Applications of cflowd
Times, they are a'changing

    Question: Who ate my DMZ???

    Answer: A BIG Cisco.

    In the "good-old-days" we had a nice, broadcast media DMZ, on which we had some novel traffic monitors to:
    • scan all inbound/outbound traffic for several general attack precursors;
    • monitor and enforce network security compliance;
    • collect evidence.

    Now we have one OC-3 pipe into a Cisco that switches to several internal, external, and partner switch/routers.
    • how to accomplish the above in such a configuration?

    The big pipes keep pushing further out!