I don't know if I could explain it in greater detail, but it's primary purpose is to facilitate detailed mapping of the network via automated means. On 10/1/2011 17:59, Tom Eastep wrote: > On Oct 1, 2011, at 5:39 PM, Christ Schlacta wrote: > >> I'm trying to configure lldp on all the systems in my LAN, and they all >> run shorewall. I'm trying to figure out what rules to add to shorewall, >> but there's no mention of it in the documentation > That's because the Shorewall developer has no idea what it is :-) > > -Tom > > Tom Eastep \ When I die, I want to go like my Grandfather who > Shoreline, \ died peacefully in his sleep. Not screaming like > Washington, USA \ all of the passengers in his car > http://shorewall.net \________________________________________________ > > > > ------------------------------------------------------------------------------ > All of the data generated in your IT infrastructure is seriously valuable. > Why? It contains a definitive record of application performance, security > threats, fraudulent activity, and more. Splunk takes this data and makes > sense of it. IT sense. And common sense. > http://p.sf.net/sfu/splunk-d2dcopy2 > _______________________________________________ > Shorewall-users mailing list > [email protected] > https://lists.sourceforge.net/lists/listinfo/shorewall-users
------------------------------------------------------------------------------ All of the data generated in your IT infrastructure is seriously valuable. Why? It contains a definitive record of application performance, security threats, fraudulent activity, and more. Splunk takes this data and makes sense of it. IT sense. And common sense. http://p.sf.net/sfu/splunk-d2dcopy2 _______________________________________________ Shorewall-users mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/shorewall-users
