D-Link DFL-260E Reference Manual page 18

Network security firewall application control signatures netdefendos
Hide thumbs Also See for DFL-260E:
Table of Contents

Advertisement

27.9. Remote Desktop Protocol (Windows Terminal Server) .............................. 318
27.10. Remote Frame Buffer ........................................................................ 318
27.11. ShowMyPc.com ................................................................................ 318
27.12. TeamViewer ..................................................................................... 318
27.13. VMWare .......................................................................................... 319
27.14. X Window System ............................................................................. 319
27.15. X Display Manager Control Protocol .................................................... 319
28. Tunneling .................................................................................................... 320
28.1. 3GPP LI ............................................................................................. 321
28.2. AICCU-TIC IPv6 Tunneling .................................................................... 321
28.3. ASProxy ............................................................................................ 321
28.4. Control And Provisioning of Wireless Access Points .................................. 322
28.5. CCProxy ............................................................................................ 322
28.6. Ethernet Over IP ................................................................................. 322
28.7. ETSI Lawful Interception TS 10 232-1 V2.1.1 ............................................ 322
28.8. Gbridge.com ..................................................................................... 323
28.9. Generic Routing Encapsulation ............................................................. 323
28.10. GPRS Tunneling Protocol ................................................................... 323
28.11. GPRS Tunneling Protocol version 2 ...................................................... 323
28.12. LogMeIn Hamachi ............................................................................. 324
28.13. Hotspot Shield ................................................................................. 324
28.14. HTTP Tunnel .................................................................................... 324
28.15. iodine ............................................................................................. 324
28.16. IPv6 Control Protocol ........................................................................ 325
28.17. Layer 2 Tunneling Protocol ................................................................. 325
28.18. Link Quality Report ........................................................................... 325
28.19. Mobile IP ......................................................................................... 325
28.20. Net-Proxy ........................................................................................ 326
28.21. OpenVPN ........................................................................................ 326
28.22. PD-Proxy ......................................................................................... 326
28.23. Point-to-Point Protocol ...................................................................... 327
28.24. Point-to-Point Protocol Over Ethernet .................................................. 327
28.25. Point-to-Point Tunneling Protocol ....................................................... 327
28.26. socks2http ....................................................................................... 327
28.27. Spotflux (Windows only) .................................................................... 328
28.28. AnalogBit tcp-over-dns ...................................................................... 328
28.29. Teredo protocol ................................................................................ 328
28.30. Ultrasurf .......................................................................................... 328
28.31. Van Jacobson Compressed ................................................................. 329
28.32. Van Jacobson Uncompressed ............................................................. 329
28.33. vpnoverdns ..................................................................................... 329
28.34. XOT (X25 over TCP) ........................................................................... 329
28.35. ZenMate ......................................................................................... 330
29. Unclassified ................................................................................................. 331
29.1. Established TCP Connection ................................................................. 331
29.2. Incomplete virtual protocol .................................................................. 331
29.3. Malformed virtual protocol .................................................................. 332
29.4. Unknown virtual protocol .................................................................... 332
30. Wap ............................................................................................................ 333
30.1. WAP Binary XML ................................................................................. 333
30.2. MultiMedia Messages Encapsulation ..................................................... 333
30.3. Short message peer-to-peer protocol .................................................... 334
30.4. Universal Computer Protocol ............................................................... 334
30.5. Wireless Session Protocol ..................................................................... 334
30.6. Wireless Transport layer Security ........................................................... 334
30.7. Wireless Transaction Protocol ............................................................... 334
31. Web ............................................................................................................ 335
31.1. 01net.com ......................................................................................... 390
31.2. 0zz0.com ........................................................................................... 390
31.3. 10050.net .......................................................................................... 391
31.4. 10086.cn ........................................................................................... 391
18
Application Control Signatures

Advertisement

Table of Contents
loading

This manual is also suitable for:

Dfl-2560Dfl-2560gDfl-870Dfl-1660Dfl-860e

Table of Contents