Transparent IPv4-to-IPv6 tunneling, detection of certain forms of abuse, QoS modificaton, traffic monitoring and shaping.
Obviouly, these are mostly happening at a firewall or equivalent, which is kind of the point. Very little DPI is legitimate in core networking. /P On 05 December, 2012 - Wayne Moore wrote: > What legitimate uses do you see? > > On 12/5/2012 10:34, Petter Ericson wrote: > > There are legitimate uses for DPI, > > -- > Necessity is the plea for every infringement of human freedom. > It is the argument of tyrants; it is the creed of slaves. > > William Pitt (1759-1806) > > -- > Unsubscribe, change to digest, or change password at: > https://mailman.stanford.edu/mailman/listinfo/liberationtech -- Petter Ericson ([email protected]) Telecomix Sleeper Jellyfish -- Unsubscribe, change to digest, or change password at: https://mailman.stanford.edu/mailman/listinfo/liberationtech
