Over:
Over:
Revision:
Risk level:
Tag:
Tag:
Tag:
28.4. Control And Provisioning of Wireless Access Points
CAPWAP stands for Control And Provisioning of Wireless Access Points. It is a standard,
interoperable protocol that enables a controller to manage a collection of wireless access points.
Family:
Over:
Revision:
Risk level:
Tag:
28.5. CCProxy
CCProxy is a windows based software proxy.
Family:
Over:
Revision:
Risk level:
Tag:
Tag:
28.6. Ethernet Over IP
The EtherIP protocol is used to encapsulate Ethernet frames in IP packets.
Family:
Over:
Revision:
Risk level:
Tag:
28.7. ETSI Lawful Interception TS 10 232-1 V2.1.1
Etsi LI is a protocol which forms a standard for telecoms operators and networks operators.
Family:
Over:
Revision:
Risk level:
Tag:
Tag:
https
spdy
1
5
Anonymizer
Tunnels
Masquerading Tunnels
Tunneling
udp
13
3
Tunnels
Tunneling
tcp
1
2
Network Utilities
Business Applications
Tunneling
ip
17
5
Tunnels
Tunneling
base
17
4
Information Leaking
Application Layer Protocols
322
Chapter 28: Tunneling