Gathering requirements is an interesting process because like you alluded to, it's both about gathering, but also understanding the organization, where they're coming from, and what their current infra looks like.
Gathering requirements is an interesting process because like you alluded to, it's both about gathering, but also understanding the organization, where they're coming from, and what their current infra looks like.
As always, it turns out that new solutions fit some use cases, some not so much. There is no one size fits all in IT.
It's been interesting to read the posts coming out recently on what people learned by deploying them.
As always, it turns out that new solutions fit some use cases, some not so much. There is no one size fits all in IT.
It's been interesting to read the posts coming out recently on what people learned by deploying them.
Exactly, haven't found an easy way of avoiding these type of fragments. Should work with RadSec if it's using TCP, because then you don't need IP to chop the data.
Exactly, haven't found an easy way of avoiding these type of fragments. Should work with RadSec if it's using TCP, because then you don't need IP to chop the data.