Ive been going over the guides for Access Control and Flexible Pattern
Matching.
Although theres good info around how to configure this, I cant find anything
that explains the thought process or logic for the patterns or the offsets
used to classify the traffic.

Is there a decent doc that explains this or can someone shed some light on
this for me please?

Many thanks
Stu

-- 
Stuart Hare

[email protected]

Reply via email to