<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SDN Network Protector; user points to remote IP host instead in Software Defined Networking</title>
    <link>https://community.hpe.com/t5/software-defined-networking/sdn-network-protector-user-points-to-remote-ip-host-instead/m-p/6853215#M918</link>
    <description>&lt;P&gt;To my knowledge, the current release of Network Protector will not inspect traffic sent directly to an IP address. The Network Protector application inspects DNS packets, so if the user circumvents that process by accessing an IP address directly, Network Protector will not inspect their packets.&lt;/P&gt;&lt;P&gt;Other current and future solutions by HPE may provide the inspection capabilities you're looking for, but presently Network Protector does not provide that level of inspection.&lt;/P&gt;</description>
    <pubDate>Fri, 22 Apr 2016 20:41:22 GMT</pubDate>
    <dc:creator>ShaunWackerly</dc:creator>
    <dc:date>2016-04-22T20:41:22Z</dc:date>
    <item>
      <title>SDN Network Protector; user points to remote IP host instead</title>
      <link>https://community.hpe.com/t5/software-defined-networking/sdn-network-protector-user-points-to-remote-ip-host-instead/m-p/6805557#M885</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As I saw in the HP SDN Network Protector info, it would get DNS traffic by using OpenFlow switch. OpenFlow switch like 2920 can send a user entering a web site(DNS info) to Protector and examines it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If some smart users enter a remote malicious website by using IP address instead, does Network Protector still examine for those users for that site? &amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;S. Lee.&lt;/P&gt;</description>
      <pubDate>Mon, 26 Oct 2015 07:35:41 GMT</pubDate>
      <guid>https://community.hpe.com/t5/software-defined-networking/sdn-network-protector-user-points-to-remote-ip-host-instead/m-p/6805557#M885</guid>
      <dc:creator>lee_sa2</dc:creator>
      <dc:date>2015-10-26T07:35:41Z</dc:date>
    </item>
    <item>
      <title>Re: SDN Network Protector; user points to remote IP host instead</title>
      <link>https://community.hpe.com/t5/software-defined-networking/sdn-network-protector-user-points-to-remote-ip-host-instead/m-p/6853215#M918</link>
      <description>&lt;P&gt;To my knowledge, the current release of Network Protector will not inspect traffic sent directly to an IP address. The Network Protector application inspects DNS packets, so if the user circumvents that process by accessing an IP address directly, Network Protector will not inspect their packets.&lt;/P&gt;&lt;P&gt;Other current and future solutions by HPE may provide the inspection capabilities you're looking for, but presently Network Protector does not provide that level of inspection.&lt;/P&gt;</description>
      <pubDate>Fri, 22 Apr 2016 20:41:22 GMT</pubDate>
      <guid>https://community.hpe.com/t5/software-defined-networking/sdn-network-protector-user-points-to-remote-ip-host-instead/m-p/6853215#M918</guid>
      <dc:creator>ShaunWackerly</dc:creator>
      <dc:date>2016-04-22T20:41:22Z</dc:date>
    </item>
  </channel>
</rss>

