Security Applications of cflowd
Times, they are a'changing
 Question:  Who ate my DMZ???
 In the "good-old-days" we had a nice, broadcast media DMZ, on which
     we had some novel traffic monitors to:
     
     -  scan all inbound/outbound traffic for several general attack
          precursors; 
-  monitor and enforce network security compliance;  
-  collect evidence. 
 Now we have one OC-3 pipe into a Cisco that switches to several
     internal, external, and partner switch/routers.
     
     -  how to accomplish the above in such a configuration? 
 The big pipes keep pushing further out!