I don't know if I could explain it in greater detail, but it's primary 
purpose is to facilitate detailed mapping of the network via automated 
means.
On 10/1/2011 17:59, Tom Eastep wrote:
> On Oct 1, 2011, at 5:39 PM, Christ Schlacta wrote:
>
>> I'm trying to configure lldp on all the systems in my LAN, and they all
>> run shorewall.  I'm trying to figure out what rules to add to shorewall,
>> but there's no mention of it in the documentation
> That's because the Shorewall developer has no idea what it is :-)
>
> -Tom
>
> Tom Eastep        \ When I die, I want to go like my Grandfather who
> Shoreline,         \ died peacefully in his sleep. Not screaming like
> Washington, USA     \ all of the passengers in his car
> http://shorewall.net \________________________________________________
>
>
>
> ------------------------------------------------------------------------------
> All of the data generated in your IT infrastructure is seriously valuable.
> Why? It contains a definitive record of application performance, security
> threats, fraudulent activity, and more. Splunk takes this data and makes
> sense of it. IT sense. And common sense.
> http://p.sf.net/sfu/splunk-d2dcopy2
> _______________________________________________
> Shorewall-users mailing list
> [email protected]
> https://lists.sourceforge.net/lists/listinfo/shorewall-users


------------------------------------------------------------------------------
All of the data generated in your IT infrastructure is seriously valuable.
Why? It contains a definitive record of application performance, security
threats, fraudulent activity, and more. Splunk takes this data and makes
sense of it. IT sense. And common sense.
http://p.sf.net/sfu/splunk-d2dcopy2
_______________________________________________
Shorewall-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to