Educause Security Discussion mailing list archives
Re: classifying P2P traffic
From: "Greene, Chip" <cgreene2 () RICHMOND EDU>
Date: Tue, 29 Jan 2008 10:01:15 -0500
We are using the Packetshaper 6500 and the Cisco IDSM-2 Modules. Both devices are catching P2P, but our test lab shows that we have the ability with new software releases of Limewire to download some files. If we remove either device, the ability to download files increases, so we are happy with the dual-vendor approach. ________________________________ From: Youngquist, Jason R. [mailto:jryoungquist () CCIS EDU] Sent: Tue 1/29/2008 9:49 AM To: SECURITY () LISTSERV EDUCAUSE EDU Subject: [SECURITY] classifying P2P traffic What devices are you using to monitor P2P traffic and how well are they working for you? Is there some P2P traffic that you believe your monitoring software isn't catching? Ie. encrypted traffic, outdated P2P definitions from the vendor, etc. Thanks. Jason Youngquist jryoungquist () ccis edu
Current thread:
- classifying P2P traffic Youngquist, Jason R. (Jan 29)
- <Possible follow-ups>
- Re: classifying P2P traffic David Boyer (Jan 29)
- Re: classifying P2P traffic Consolvo, Corbett D (Jan 29)
- Re: classifying P2P traffic Greene, Chip (Jan 29)
- Re: classifying P2P traffic Hughes, Scott (Jan 29)
- Re: classifying P2P traffic Justin Dover (Jan 29)
- Re: classifying P2P traffic Julian Y. Koh (Jan 29)
- Re: classifying P2P traffic Alex (Jan 29)
- Re: classifying P2P traffic Harris, Michael C. (Jan 29)
- Re: classifying P2P traffic Michael Hornung (Jan 29)
- Re: classifying P2P traffic Michael Hornung (Jan 29)
- Re: classifying P2P traffic Lutzen, Karl F. (Jan 29)
- Re: classifying P2P traffic jkaftan (Jan 29)
- Re: classifying P2P traffic Alex (Jan 29)
(Thread continues...)