Educause Security Discussion mailing list archives
classifying P2P traffic
From: "Youngquist, Jason R." <jryoungquist () CCIS EDU>
Date: Tue, 29 Jan 2008 08:49:40 -0600
What devices are you using to monitor P2P traffic and how well are they working for you? Is there some P2P traffic that you believe your monitoring software isn't catching? Ie. encrypted traffic, outdated P2P definitions from the vendor, etc. Thanks. Jason Youngquist jryoungquist () ccis edu
Current thread:
- classifying P2P traffic Youngquist, Jason R. (Jan 29)
- <Possible follow-ups>
- Re: classifying P2P traffic David Boyer (Jan 29)
- Re: classifying P2P traffic Consolvo, Corbett D (Jan 29)
- Re: classifying P2P traffic Greene, Chip (Jan 29)
- Re: classifying P2P traffic Hughes, Scott (Jan 29)
- Re: classifying P2P traffic Justin Dover (Jan 29)
- Re: classifying P2P traffic Julian Y. Koh (Jan 29)
- Re: classifying P2P traffic Alex (Jan 29)
- Re: classifying P2P traffic Harris, Michael C. (Jan 29)
- Re: classifying P2P traffic Michael Hornung (Jan 29)
- Re: classifying P2P traffic Michael Hornung (Jan 29)
(Thread continues...)