![]() ![]() A warning to stop and I believe (not sure on this) the number of infractions, due to the "6 strike" rule.at least with Comcast. The exact torrent (movie, TV show, etc) that was downloaded ![]() Comcast sends out these notifications probably every single day. Not really understanding why people are suspicious of this. ![]() How did the ISP's know it was "movies" being downloaded? My suspicions have been raised like Gort's. I'm mobile right now, can't confirm with not enough info. This is a well-formatted scam.ĭo your homework on this. Or a switch model if you want to do a mirror port. We need your specific sonicwall model to help more I would think. The only thing left missing is the understanding of how to put them all together. Those two links have all the tools you need with your current firewall to figure out who this person is. Or instead of the VM, setup a netflow monitoring software, and tell the sonicwall to forward those logs to the monitoring system the same way it would forward to the VM. Hyper-V, ESX, KVM all have free hypervisors. If your only problem is that you don't have the VM setup. I'm guessing that is the only reason you would need said VM. We don't use sonicwall, but if it is anything like cisco, the sonicwall itself would be sending the appflow/syslog data to another system. Monitoring from either a mirror port or the firewall itself is the best way methinks. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |