I''m trying to configure lldp on all the systems in my LAN, and they all run shorewall. I''m trying to figure out what rules to add to shorewall, but there''s no mention of it in the documentation that I can find, and I don''t know enough about lldp to figure out what files need to be changed and how. I''m not sure what information needs to be found to make it work with shorewall, but insofar as I know, it''s a layer 2 protocol. ------------------------------------------------------------------------------ All of the data generated in your IT infrastructure is seriously valuable. Why? It contains a definitive record of application performance, security threats, fraudulent activity, and more. Splunk takes this data and makes sense of it. IT sense. And common sense. http://p.sf.net/sfu/splunk-d2dcopy2
On Oct 1, 2011, at 5:39 PM, Christ Schlacta wrote:> I''m trying to configure lldp on all the systems in my LAN, and they all > run shorewall. I''m trying to figure out what rules to add to shorewall, > but there''s no mention of it in the documentationThat''s because the Shorewall developer has no idea what it is :-) -Tom Tom Eastep \ When I die, I want to go like my Grandfather who Shoreline, \ died peacefully in his sleep. Not screaming like Washington, USA \ all of the passengers in his car http://shorewall.net \________________________________________________ ------------------------------------------------------------------------------ All of the data generated in your IT infrastructure is seriously valuable. Why? It contains a definitive record of application performance, security threats, fraudulent activity, and more. Splunk takes this data and makes sense of it. IT sense. And common sense. http://p.sf.net/sfu/splunk-d2dcopy2
I don''t know if I could explain it in greater detail, but it''s primary purpose is to facilitate detailed mapping of the network via automated means. On 10/1/2011 17:59, Tom Eastep wrote:> On Oct 1, 2011, at 5:39 PM, Christ Schlacta wrote: > >> I''m trying to configure lldp on all the systems in my LAN, and they all >> run shorewall. I''m trying to figure out what rules to add to shorewall, >> but there''s no mention of it in the documentation > That''s because the Shorewall developer has no idea what it is :-) > > -Tom > > Tom Eastep \ When I die, I want to go like my Grandfather who > Shoreline, \ died peacefully in his sleep. Not screaming like > Washington, USA \ all of the passengers in his car > http://shorewall.net \________________________________________________ > > > > ------------------------------------------------------------------------------ > All of the data generated in your IT infrastructure is seriously valuable. > Why? It contains a definitive record of application performance, security > threats, fraudulent activity, and more. Splunk takes this data and makes > sense of it. IT sense. And common sense. > http://p.sf.net/sfu/splunk-d2dcopy2 > _______________________________________________ > Shorewall-users mailing list > Shorewall-users@lists.sourceforge.net > https://lists.sourceforge.net/lists/listinfo/shorewall-users------------------------------------------------------------------------------ All of the data generated in your IT infrastructure is seriously valuable. Why? It contains a definitive record of application performance, security threats, fraudulent activity, and more. Splunk takes this data and makes sense of it. IT sense. And common sense. http://p.sf.net/sfu/splunk-d2dcopy2
On Oct 1, 2011, at 6:22 PM, Christ Schlacta wrote:> I don''t know if I could explain it in greater detail, but it''s primary > purpose is to facilitate detailed mapping of the network via automated > means.Christ -- Please stop top-posting. -Tom Tom Eastep \ When I die, I want to go like my Grandfather who Shoreline, \ died peacefully in his sleep. Not screaming like Washington, USA \ all of the passengers in his car http://shorewall.net \________________________________________________ ------------------------------------------------------------------------------ All of the data generated in your IT infrastructure is seriously valuable. Why? It contains a definitive record of application performance, security threats, fraudulent activity, and more. Splunk takes this data and makes sense of it. IT sense. And common sense. http://p.sf.net/sfu/splunk-d2dcopy2