We had to facilitate them to set up a duplicate port to tap in to monitor that customer’s traffic. It was a 2U (two-unit) PC that we ran a mirrored ethernet port to.
[What we ended up with was] a little box in our systems room that was capturing all the traffic to this customer. Everything they were sending and receiving.
And yet his lawyer could have written a truthful denial that they'd given the govt "direct access to the server". See how that works?
[What we ended up with was] a little box in our systems room that was capturing all the traffic to this customer. Everything they were sending and receiving.
And yet his lawyer could have written a truthful denial that they'd given the govt "direct access to the server". See how that works?