You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Once issue #297 is implemented, policies will be able to define the destination of encapsulated packets. This new flexibility also enables policies to redirect flows. Flow redirection opens Gatekeeper to new possibilities such as path control and integrating with intrusion detection systems such as Suricata, Snort, and Zeek (formerly Bro). Path control can become the key to mitigate Coremetl/Crossfire attacks.
Combined with the fact that policies control when flow redirection is applied, to which flows, and to where redirecting them, flow redirection can also be seen as on-demand tunnels.
The text was updated successfully, but these errors were encountered:
Once issue #297 is implemented, policies will be able to define the destination of encapsulated packets. This new flexibility also enables policies to redirect flows. Flow redirection opens Gatekeeper to new possibilities such as path control and integrating with intrusion detection systems such as Suricata, Snort, and Zeek (formerly Bro). Path control can become the key to mitigate Coremetl/Crossfire attacks.
Combined with the fact that policies control when flow redirection is applied, to which flows, and to where redirecting them, flow redirection can also be seen as on-demand tunnels.
The text was updated successfully, but these errors were encountered: