Ive been going over the guides for Access Control and Flexible Pattern Matching. Although theres good info around how to configure this, I cant find anything that explains the thought process or logic for the patterns or the offsets used to classify the traffic.
Is there a decent doc that explains this or can someone shed some light on this for me please? Many thanks Stu -- Stuart Hare [email protected]
