D-Link DFL-260E Reference Manual page 189

Network security firewall application control signatures netdefendos
Hide thumbs Also See for DFL-260E:
Table of Contents

Advertisement

Chapter 18: Network Service
• NSFNET-IGP, page 221
• Network Time Protocol, page 221
• Network Voice Protocol II, page 222
• OSI Network Layer, page 222
• PGM Reliable Transport Protocol, page 222
• PHProxy, page 222
• Protocol Independent Multicast, page 223
• Private IP Encapsulation within IP, page 223
• PNNI over IP, page 223
• ISO 8823 Presentation Protocol, page 223
• Private encryption scheme, page 223
• Packet Radio Measurement, page 224
• Performance Transparency Protocol, page 224
• PUP, page 224
• Packet Video Protocol, page 224
• QNX, page 224
• Resource Location Protocol, page 225
• Robust Header Compression, page 225
• IBM Remote Program Load, page 225
• Original experimental academic or proprietary protocols, page 225
• MIT Remote Virtual Disk, page 226
• S1 Application Protocol, page 226
• SATNET and Backroom EXPAK, page 226
• SATNET Monitoring, page 226
• Semaphore Communications Sec. Pro., page 226
• Stream Connection Control Part, page 227
• Scheduled Transfer Protocol, page 227
• SCPS, page 227
• Stream Control Transmission Protocol, page 227
• Source Demand Routing Protocol, page 228
• Secure VMTP, page 228
• Shim6 Protocol, page 228
189

Advertisement

Table of Contents
loading

This manual is also suitable for:

Dfl-2560Dfl-2560gDfl-870Dfl-1660Dfl-860e

Table of Contents