Contents CHAPTER 1 Internet Protocol Reference Internet Protocol Header ...2 IP header number list Internet Protocol Options ...6 Transfer Protocols ...6 ...6 ...7 ...7 ICMP Other protocols Standard Ports and Random Ports...8 CHAPTER 2 MIME Content Types CHAPTER 3 Services and Ports Ports Used by WSM and Fireware ...21 Ports Used by Microsoft Products ...22 Well-Known Services List ...23...
Page 6
General IT and Security Web Sites ...67 White Hat Web Sites...69 Grey Hat Sites...70 Other Web Sites ...71 Dictionaries of Computer Terminology ...71 RSS Feeds...72 Security Feeds IT Related Feeds ...73 Fun Feeds Web Logs (Blogs) Web Logs (Blogs) ...72 ...72 ...73 ...74 WatchGuard System Manager...
Page 7
CHAPTER 7 Copyright, Patent, Trademark, and Licensing Information Copyright Information ...75 Patents ...75 Trademarks...75 Licensing...76 Apache License (1.1) Apache License (2.0) GNU General Public License (GPL) GNU Lesser General Public License (LGPL) GNU Library General Public License (Library GPL) Java Platform, Standard Edition License ...99 bzip2 ...100...
Internet Protocol Reference Internet Protocol (IP) sets the format of packets and the address pattern for sending data through the Internet. It operates as a postal system, and allows you to address a package and drop it into the system. But, there is no direct link between you and the recipient. In other words, there is no package. Most networks mix IP with higher level protocols such as Transmission Control Protocol (TCP).
Time to live. It sets the maximum time the datagram remains alive in the system. IP protocol number. Indicates which of TCP, UDP, ICMP, IGMP, or other Transport protocol is inside. Checksum for the IP header Source IP address Destination IP address IP Options (Present if IHL is 6) WatchGuard System Manager...
IP header number list The IP Protocol header contains an 8-bit field that identifies the protocol for the transport layer for the datagram. Keyword Number ICMP IGMP BBN-RCC-MON NVP-II ARGUS EMCON XNET CHAOS DCN-MEAS XNS-IDP TRUNK-1 TRUNK-2 LEAF-1 LEAF-2 IRTP ISO-TP4 NETBLT MFE-NSP...
Page 12
Internet Pluribus Packet Core Any distributed file system SATNET Monitoring VISA Protocol Internet Packet Core Utility Computer Protocol Network Executive Computer Protocol Heart Beat Wang Span Network Packet Video Protocol Backroom SATNET Monitoring SUN NDPROTOCOL-Temporary WIDEBAND Monitoring WIDEBAND EXPAK WatchGuard System Manager...
Network File System (NFS) services users. Network File System is a popular TCP/IP service for supplying shared file systems over a network. • Gives supports to broadcasts. dangerous. Hackers can use them to create routing that helps them get WatchGuard System Manager...
Most traffic on the Internet uses TCP, UDP, or ICMP protocols. Some other protocols are as follows: IGMP (Internet Group Multicast Protocol) A protocol used by a host on multicast access networks to notify a locally attached router to which group the router belongs.
2049, no connection can be made. This type of problem frequently occurs with the X Window and Archie services. Most operating systems assign port numbers between 1024 and 2100 so this problem does not occur frequently. WatchGuard System Manager...
MIME Content Types Software applications use content type headers to identify the type of data they receive. Content type headers tell the software application how to correctly identify and display video clips, images, sound, or other data. Usually, people are most familiar with the MIME content types used in email. Some of the available proxy policies in your Firebox configuration can use content type headers to determine whether to allow or deny traffic.
Well-known services are a mixture of port number and transport protocol for specified, standard software applications. This chapter contains tables that list service names, port number, protocol, and description. Ports Used by WSM and Fireware The WatchGuard Firebox, management station, and WatchGuard servers use specified ports during usual operations. Port # Protocol...
TCP/UDP Well-Known Services List In addition to the ports used by services described above, WatchGuard supplies a list of well-known services. Because software companies regularly add new services, this is not a full list of all possible services. For more information, refer to: www.iana.org/assignments/port-numbers...
Page 32
Bootstrap Protocol Client TCP/UDP Trivial File Transfer TCP/UDP Gopher TCP/UDP Remote Job Service TCP/UDP Remote Job Service TCP/UDP Remote Job Service TCP/UDP Remote Job Service TCP/UDP Distributed External Object Store TCP/UDP vettcp TCP/UDP Finger TCP/UDP World Wide Web HTTP WatchGuard System Manager...
Page 36
Web proxy/caching service -- frequently scanned for vulnerabilities TCP/UDP Cc:mail/lotus Used for chat FirstClass (ftp channel on 510 TCP) CompuServe Online TCP/UDP Radio free ethernet America Online TCP/UDP X Window System (through 6063) TCP/UDP X Font Service WatchGuard System Manager...
Page 37
Service Name Port # 8000 iphone 6670 iphone 22555 iphone 25793 iphone 1490 Reference Guide Protocol Description TCP/UDP NCD Network Audio Server for connecting to the phone server for audio for the address server, in 4.x and 5.0 for the conference engine in 4.x and 5.0 Well-Known Services List...
Page 38
Well-Known Services List WatchGuard System Manager...
SurfControl. Searching for Blocked Sites To see whether WebBlocker is blocking a web site as part of a category block, go to WatchGuard Test-a-Site on the SurfControl web site. 1 Open a web browser and go to: http://mtas.surfcontrol.com/mtas/WatchGuardTest-a-Site.asp...
• Discussion sites on how to talk to your partner about diseases, pregnancy, and respecting boundaries Note: Not included in this category are commercial sites that sell sexual paraphernalia. These sites are filtered through the Adult category. WatchGuard System Manager...
Page 41
Group Category Tasteless & Offensive Crime Criminal Activity Hacking Intolerance & Hate Violence Reference Guide Description of Content • Offensive or violent language, including through jokes, comics, or satire • Excessive use of profanity or obscene gesticulation Advocating, instructing, or giving advice on performing illegal acts, such as: •...
Page 42
• Tips or trends focused on a specific art, craft, or technique • Online publications on a specific pastime or recreational activity • Online clubs, associations, or forums dedicated to a hobby • Child-centered sites and sites published by children WatchGuard System Manager...
Page 43
Group Category Sports Streaming Media Travel Arts Personal Education Society & Culture Job Search & Career Development Personals & Dating Religion Philanthropic & Professional Orgs. Fashion & Beauty Shopping Advertisements Food & Drink Reference Guide Description of Content • Team or conference web sites •...
Page 44
• Personal storage or backup • Clip art, fonts, and animated gif pages • Providers of mobile phone downloads, including: - Ringtones, - Logos - Backgrounds - Screensavers - Games • Peer-to-peer file sharing clients • Peer-to-peer file sharing servers WatchGuard System Manager...
Page 45
Group Category Spam URLs Infrastructure News News Blogs & Forums Search Photo Searches Search Engines Research Finance & Investment Government Health & Medicine Reference Reference Guide Description of Content • URLs found in spam, including these topics: - Computing - Finance & Stocks - Entertainment - Games - Health &...
Page 46
• Business Associations • Basic business sites, such a s FedEx, that enable organizations to manage their necessary daily business tasks. • Sites that are not included in the defined categories • Sites that are not categorized WatchGuard System Manager...
Types of Policies in Fireware This chapter gives a list of the pre-defined policies included with your Firebox management software, their protocols, and their ports. It also gives special information about circumstances that could have an effect on the security of some policies. In this chapter, policies are divided into two groups—policies that are controlled by a packet filter and policies that are controlled by a proxy.
We recommend that you use VPN options to give more security for ICA connections. You can use all of the usual log options with WinFrame. Characteristics • Internet Protocol(s): TCP • Port Number(s): 1494 The Firebox cannot make sure that these packets were sent from the WatchGuard System Manager...
Clarent-Command Clarent Corporation supplies IP telephone technology to mainstream carriers and service providers. Clarent products allow voice-over-IP between Clarent gateways across the Internet. This policy gives support to the Clarent v3.0 product and later. Clarent products use two sets of ports, one for gateway-to-gateway communications (UDP ports 4040, 4045, and 5010) and one for gateway-to-command center communications (UDP ports 5001 and 5002).
Internet Protocol(s): TCP (for server-server zone transfers), UDP (for client-server lookups) • Port Number(s): TCP 53, UDP 53 Entrust The Entrust Authority Public Key distribution application protocol passes public keys to a trusted third-party organization for verification. Characteristics • Internet Protocol(s): TCP • Port Number(s): 709, 710 WatchGuard System Manager...
FTP be allowed only to public FTP servers located behind the Firebox. External hosts can be spoofed. WatchGuard cannot verify that these packets were actually sent from the correct location. You can configure the Firebox to add the source IP address to the Blocked Sites list whenever an FTP connection to a computer protected by the Firebox is denied.
HTTP proxy policy. We recommend that HTTP be allowed only to public HTTP servers located behind the Firebox. External hosts can be spoofed. WatchGuard cannot verify that these packets were actually sent from the correct location. You can configure the Firebox to add the source IP address to the Blocked Sites list whenever an HTTP connection to a computer protected by the Firebox is denied.
IDENT The Identification Protocol (IDENT) is a protocol used to match TCP connections to a user name. It is used most frequently by large public SMTP and FTP servers. It is used for logs, but you cannot trust the information it gives, as attackers can change their servers to have them send back incorrect information.
Kerberos v 5 Port Number(s): TCP 88, UDP 88 L2TP Layer 2 Tunneling Protocol (L2TP) is an extension to the PPP protocol that enables ISPs to operate virtual private networks. Characteristics • Internet Protocol(s): UDP • Port Number(s): 1701 WatchGuard System Manager...
LDAP Lightweight Directory Access Protocol (LDAP) is an open-standard protocol for using online directory services. The protocol operates with Internet transport protocols, such as TCP. You can use LDAP to access stand-alone directory servers or X.500 directories. Characteristics • Internet Protocol(s): TCP •...
In most conditions, NNTP must be enabled in two directions. If you operate a public newsfeed, you must allow NNTP connections from all external hosts. WatchGuard cannot make sure that these packets were sent from the correct location.
Network Time Protocol (NTP) is a protocol built on TCP/IP that controls local timekeeping. It synchronizes computer clocks with other clocks located on the Internet. Characteristics • Internet Protocol(s): TCP, UDP • Port Number(s): TCP 123 , UDP 123 OSPF Open Shortest Path First (OSPF) is a routing protocol developed for IP networks based on the link-state algorithm.
In RFC 2865, the server port used by RADIUS changed from port 1645 to 1812. Make sure you select the policy that matches your implementation. Characteristics • Internet Protocol(s): UDP RADIUS policy Port Number(s): UDP 1645 • • RADIUS-RFC policy Port Number(s): UDP 1812 WatchGuard System Manager...
RADIUS-Accounting and RADIUS-Acct-RFC The Remote Authentication Dial-In User Service (RADIUS) Accounting policy supplies accounting information to administrators of networks that use RADIUS authentication. RADIUS is a client-server system that keeps authentication information for users, remote access servers, and VPN gateways in a central user database that is available to all servers.
These configuration settings are to be used only if there is no other alternative, and policy settings must specify Characteristics Internet Protocol(s): TCP, UDP • • Port Number(s): TCP 139, TCP 445, UDP 137, UDP 138, UDP 445 internal and external hosts. WatchGuard System Manager...
Port Number(s): 161 SNMP-Trap Simple Network Management Protocol (SNMP) traps are notification messages that an SNMP agent (for example, a router) sends to a network management station. These messages usually report an important event that must be examined. Characteristics •...
Remove port 514 from the Blocked Ports list • Add the WatchGuard® Logging policy to Policy Manager It is usually not secure to allow syslog traffic through the Firebox. It is possible for hackers to fill syslogs with log entries. If the syslog is full, it is more difficult to see an attack. Also, the disk frequently fills up and the attack is not recorded.
TACACS TACACS user authentication is a system that uses user accounts to authenticate users into a dial-up modem pool. This removes the need to keep copies of accounts on a UNIX system. TACACS does not support TACACS+ or RADIUS. Characteristics •...
Internet service provider of a site. The WatchGuard Traceroute policy controls UNIX-based, UDP-style Traceroute only. For a DOS-based or Windows-based Traceroute packet filter, use the Ping policy. For more information about the Ping policy, see “Ping”...
WinFrame. Characteristics • Internet Protocol(s): TCP • Port Number(s): 1494 WG-Auth The WatchGuard Authentication policy allows users to authenticate to the Firebox. Characteristics • Internet Protocol(s): TCP • Port Number(s): 4100 User Guide Packet Filter Policies...
Port Number(s): 4103, 4105, 4117, 4118 WG-Logging The WatchGuard Logging policy is necessary only if a second Firebox must access a Log Server on the trusted interface of a Firebox. If there is only one Firebox, this policy is not necessary.
WHOIS The WHOIS protocol gives information about the administrator of web sites and networks. It is frequently used to find the administrator of a different web site. To filter WHOIS traffic, add a WHOIS policy that allows connections to the WHOIS server (such as rs.internic.net).
Packet Filter Policies Proxy Policies This section reviews the proxy policies supplied by the WatchGuard® System Manager. A proxy policy opens packets, strips out forbidden data types in the packet content, and assembles the packets again using the source and destination headers of the proxy.
The WatchGuard policy “HTTP Proxy” is not the same as an HTTP caching proxy. An HTTP caching proxy controls the caching of Web data. If you use an external caching proxy, you must enable (by adding policies) any outgoing policies that are necessary for your organization.
For these protocols, the TCP-UDP proxy relays the traffic to the correct proxies for the protocols or allows you to allow or deny traffic. For other protocols, you can select to allow or deny traffic. Characteristics • Internet Protocol(s): TCP, UDP • Port Number(s): TCP 0 (Any), UDP 0 (Any) WatchGuard System Manager...
TFTP-proxy Trivial File Transfer Protocol (TFTP) is a simple form of FTP that uses very small amounts of memory. It is used to transfer small files between hosts on the same network. Some manufacturers use the TFTP protocol to send periodic updates to VoIP equipment under management. If your equipment requires TFTP for updates, make sure you add a TFTP policy to your Firebox configuration to allow these connections.
Page 72
Packet Filter Policies WatchGuard System Manager...
WatchGuard to learn more about network security. The editorial comments included in this chapter are supplied to help you decide which resources are most helpful to you. These comments are from the LiveSecurity editorial team.
Russell, Ryan and Dubrawksky, Ido, et al. Stealing the Network: How to Own the Box. Cambridge, MA: Elsevier/Syngress, 2005. ISBN 1931836876. Levy, Johnny and Russell, Ryan, et al. Stealing the Network: How to Own a Shadow. Cambridge, MA: Elsevier/Syngress, 2007. ISBN 1597490814. Stephenson, Neal. Cryptonomicon. New York, NY: HarperCollins Publishers, 1999. ISBN 0060512806. WatchGuard System Manager...
Mailing Lists wg-users@watchguard.com WatchGuard sponsors a listserv for our customers. For more information, see the Technical Support chapter in the User Guide. firewall-wizards@nfr.net Firewall gurus from around the world discuss and answer all types of questions. Full Disclosure When Symantec bought Security Focus and its lists, suspicious security experts and network administrators fled.
Page 76
Pro: Comprehensive, up-to-the-minute survey of worldwide Internet security. Con: The same information repeats countless times as various online sources report it. Net: A great glimpse of security issues worldwide. WatchGuard System Manager...
The Register This is not the first place you'll learn of emerging threats, but when you hear of one, depend on The Reg for the most honest, no-hype summary of the issue. Pro: Plain-English writing style is great for IT beginners. Check out their "BOFH" series for hilariously bleak parodies of a network administrator's life.
But our favorite feature is the moderated security forums, where you can discuss relevant topics (ranging from general network security, to how to compile and run specific exploits) with other network administrators. WatchGuard System Manager...
Online gnu zebra configuration document for Firebox users using dynamic routing protocols. www.watchguard.com/support/advancedfaqs/log_sniffing.asp Check here for information on a useful Network Packet Analyzer. www.iana.org Look here for lists of protocol number assignments and TCP and UDP port numbers.
An RSS reader can provide you with a convenient, one-stop shop consolidating news from all your favorite sources. Try out RSS and WatchGuard Wire. They are free, and keep you informed while saving you time.
news.com.com/2547-1001_3-0-5.xml CNET News Enterprise Hardware Feed news.com.com/2547-1009_3-0-5.xml CNET News Security Feed news.com.com/2547-1035_3-0-5.xml CNET News Networking Feed Fun Feeds www.wired.com/news/feeds/rss2/0,2610,,00.xml Wired top stories www.wired.com/news/feeds/rss2/0,2610,3,00.xml Wired technology stories www.wired.com/news/feeds/rss2/0,2610,2,00.xml Wired culture stories www.wired.com/news/feeds/rss2/0,2610,4,00.xml Wired political stories dwlt.net/tapestry/dilbert.rdf Daily Dilbert dwlt.net/tapestry/pa.rdf Penny Arcade Web Logs (Blogs) F-Secure This blog covers any kind of malware that spreads, and often has useful screen shots so you...
Web Logs (Blogs) Radio Free Security WatchGuard’s podcast covers network secuirty issues of interest to small- to medium-sized businesses. Learn how to prioritze threats by hearing the LiveSecurity reporters pick the “Security Story of the Month”; then keep it on play to hear the renowned industry experts assess the latest threats and give practical tips and insights.
WatchGuard, the WatchGuard logo, Firebox, LiveSecurity, and any other mark listed as a trademark in the “Terms of Use” portion of the WatchGuard Web site that is used herein are either registered trademarks or trademarks of WatchGuard Technologies, Inc. and/or its subsidiaries in the United States and/or other countries.
WatchGuard, the WatchGuard logo, Firebox, LiveSecurity, and any other mark listed as a trademark in the “Terms of Use” portion of the WatchGuard Web site that is used herein are either registered trademarks or trademarks of WatchGuard Technologies, Inc. and/or its subsidiaries in the United States and/or other countries.
THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE APACHE SOFTWARE FOUNDATION OR ITS CON- TRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUEN- TIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;...
Page 86
License. You may add Your own attribution notices within Derivative Works that You distribute, alongside or as an addendum to the NOTICE text from the Work, provided that such additional attribution notices cannot be construed as modifying the License. WatchGuard System Manager...
Page 87
You may add Your own copyright statement to Your modifications and may provide additional or different license terms and conditions for use, reproduction, or distribution of Your modifications, or for any such Derivative Works as a whole, provided Your use, reproduction, and distribution of the Work otherwise complies with the conditions stated in this License.
To prevent this, we have made it clear that any patent must be licensed for everyone's free use or not licensed at all. The precise terms and conditions for copying, distribution and modification follow. WatchGuard System Manager...
Page 89
Terms and Conditions for Copying, Distribution, and Modification 1 This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under the terms of this General Public License. The "Program", below, refers to any such program or work, and a "work based on the Program"...
Page 90
Program by all those who receive copies directly or indirectly through you, then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Program. WatchGuard System Manager...
Page 91
If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section is intended to apply and the section as a whole is intended to apply in other circumstances. It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims;...
Also, if the library is modified by someone else and passed on, the recipients should know that what they have is not the original version, so that the original author's reputation will not be affected by problems that might be introduced by others. WatchGuard System Manager...
Page 93
Finally, software patents pose a constant threat to the existence of any free program. We wish to make sure that a company cannot effectively restrict the users of a free program by obtaining a restrictive license from a patent holder. Therefore, we insist that any patent license obtained for a version of the library must be consistent with the full freedom of use specified in this license.
Page 94
In addition, mere aggregation of another work not based on the Library with the Library (or with a work based on the Library) on a volume of a storage or distribution medium does not bring the other work under the scope of this License. WatchGuard System Manager...
Page 95
4 You may opt to apply the terms of the ordinary GNU General Public License instead of this License to a given copy of the Library. To do this, you must alter all the notices that refer to this License, so that they refer to the ordinary GNU General Public License, version 2, instead of to this License.
Page 96
Library (or any work based on the Library), you indicate your acceptance of this License to do so, and all its terms and conditions for copying, distributing or modifying the Library or works based on it. WatchGuard System Manager...
Page 97
11 Each time you redistribute the Library (or any work based on the Library), the recipient automatically receives a license from the original licensor to copy, distribute, link with or modify the Library subject to these terms and conditions. You may not impose any further restrictions on the recipients' exercise of the rights granted herein.
Page 99
Licensing To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender the rights. These restrictions translate to certain responsibilities for you if you distribute copies of the library, or if you modify it. For example, if you distribute copies of the library, whether gratis or for a fee, you must give the recipients all the rights that we gave you.
Page 100
But when you distribute the same sections as part of a whole which is a work based on the Library, the distribution of the whole must be on the terms of this WatchGuard System Manager...
Page 101
License, whose permissions for other licensees extend to the entire whole, and thus to each and every part regardless of who wrote it. Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you;...
Page 102
Library is void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance. WatchGuard System Manager...
Page 103
10 You are not required to accept this License, since you have not signed it. However, nothing else grants you permission to modify or distribute the Library or its derivative works. These actions are prohibited by law if you do not accept this License. Therefore, by modifying or distributing the Library (or any work based on the Library), you indicate your acceptance of this License to do so, and all its terms and conditions for copying, distributing or modifying the Library or works based on it.
Specification, and (ii) discussing the Specification with any third party; and (iii) excerpting brief portions of the Specification in oral or written communications which discuss the Specification provided that such excerpts do not in the aggregate constitute a significant portion of the Specification. WatchGuard System Manager...
Page 105
2 License for the Distribution of Compliant Implementations. Sun also grants you a perpetual, non-exclusive, non-transferable, worldwide, fully paid-up, royalty free, limited license (without the right to sublicense) under any applicable copyrights or, subject to the provisions of subsection 4 below, patent rights it may have covering the Specification to create and/or distribute an Independent Implementation of the Specification that: (a) fully implements the Specification including all its required interfaces and functionality;...
Page 106
(i) agree that such Feedback is provided on a non-proprietary and non-confidential basis, and (ii) grant Sun a perpetual, non-exclusive, worldwide, fully paid-up, irrevocable license, with the right to sublicense through multiple levels of sublicensees, to incorporate, disclose, and use without limitation the Feedback for any purpose. WatchGuard System Manager...
GENERAL TERMS Any action related to this Agreement will be governed by California law and controlling U.S. federal law. The U.N. Convention for the International Sale of Goods and the choice of law rules of any jurisdiction will not apply. The Specification is subject to U.S.
Except as contained in this notice, the name of a copyright holder shall not be used in advertising or otherwise to promote the sale, use or other dealings in this Software without prior written authorization of the copyright holder. WatchGuard System Manager...
PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. WatchGuard System Manager...
free-extractor This software is provided 'as-is', without any express or implied warranty. In no event will the author(s) be held liable for any damages arising from the use of this software. Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions: 1 The origin of this software must not be misrepresented;...
Licensing THIS SOFTWARE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE REGENTS OF THE UNIVERSITY OF MICHIGAN AND MERIT NETWORK, INC. DO NOT WARRANT THAT THE FUNCTIONS CONTAINED IN THE SOFTWARE WILL MEET LICENSEE'S REQUIREMENTS OR THAT OPERATION WILL BE UNINTERRUPTED OR ERROR FREE.
LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON-INFRINGEMENT. THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, AND THE AUTHORS AND DISTRIBUTORS HAVE NO OBLIGATION TO PROVIDE MAINTENANCE, SUPPORT, UPDATES, ENHANCEMENTS, OR MODIFICATIONS. WatchGuard System Manager...
Java 2D API Samples READ THE FOLLOWING AGREEMENT BEFORE INSTALLING OR USING THE SAMPLE SOFTWARE. BY DOWNLOADING THIS SAMPLE SOFTWARE, YOU ACCEPT AND AGREE TO THE TERMS AND CONDITIONS BELOW. IF YOU DO NOT AGREE, DO NOT DOWNLOAD OR USE THE SAMPLE SOFTWARE. Sun Microsystems grants you ("Licensee") a non-exclusive, royalty free, license to use, modify and redistribute this software in source and binary code form, provided that i) this copyright notice and license appear on all copies of the software;...
Page 116
(1) Modifications made by that Contributor (or portions thereof ); and (2) the combination of Modifications made by that Contributor with its Contributor Version (or portions of such combination). WatchGuard System Manager...
Page 117
c The licenses granted in Sections 2.2(a) and 2.2(b) are effective on the date Contributor first distributes or otherwise makes the Modifications available to a third party. d Notwithstanding Section 2.2(b) above, no patent license is granted: (1) for any code that Contributor has deleted from the Contributor Version;...
Page 118
(meaning the Contributor Version where the Participant is a Contributor or the Original Software where the Participant is the Initial Developer) directly or indirectly infringes any patent, then any and all rights granted directly or indirectly to You by such Participant, the WatchGuard System Manager...
Page 119
Initial Developer (if the Initial Developer is not the Participant) and all Contributors under Sections 2.1 and/or 2.2 of this License shall, upon 60 days notice from Participant terminate prospectively and automatically at the expiration of such 60 day notice period, unless if within such 60 day period You withdraw Your claim with respect to the Participant Software against such Participant either unilaterally or pursuant to a written agreement with Participant.
Program by such Contributor itself or anyone acting on such Contributor's behalf. Contributions do not include additions to the Program which: (i) are separate modules of software distributed in conjunction with the Program under their own license agreement, and (ii) are not derivative works of the Program. WatchGuard System Manager...
Page 121
"Contributor" means any person or entity that distributes the Program. "Licensed Patents " mean patent claims licensable by a Contributor which are necessarily infringed by the use or sale of its Contribution alone or when combined with the Program. "Program" means the Contributions distributed in accordance with this Agreement. "Recipient"...
Page 122
LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OR DISTRIBUTION OF THE PROGRAM OR THE EXERCISE OF ANY RIGHTS GRANTED HEREUNDER, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. WatchGuard System Manager...
7 GENERAL If any provision of this Agreement is invalid or unenforceable under applicable law, it shall not affect the validity or enforceability of the remainder of the terms of this Agreement, and without further action by the parties hereto, such provision shall be reformed to the minimum extent necessary to make such provision valid and enforceable.
Page 124
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. WatchGuard System Manager...
HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFT- WARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. WatchGuard System Manager...
Linux Copyright 1993 United States Government as represented by the Director, National Security Agency. This software may be used and distributed according to the terms of the GNU General Public License, incorporated herein by reference. In addition to the disclaimers in the GPL, SRC expressly disclaims any and all warranties, expressed or implied, concerning the enclosed software.
1 The materials contained herein are unmodified and are used unmodified. 2 Redistributions of source code must retain the above copyright notice, this list of conditions and the following NO ''WARRANTY'' disclaimer below (''Disclaimer''), without modification. WatchGuard System Manager...
3 Redistributions in binary form must reproduce at minimum a disclaimer similar to the Disclaimer below and any redistribution must be conditioned upon including a substantially similar Disclaimer requirement for further binary redistribution. 4 Neither the names of the above-listed copyright holders nor the names of any contributors may be used to endorse or promote product derived from this software without specific prior written permission.
Page 130
• Neither the name of the Sun Microsystems, Inc. nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. WatchGuard System Manager...
Page 131
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS “AS IS” AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPE- CIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;...
INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. WatchGuard System Manager...
OpenLDAP The OpenLDAP Public License Version 2.8, 17 August 2003 Redistribution and use of this software and associated documentation ("Software"), with or without modification, are permitted provided that the following conditions are met: 1 Redistributions in source form must retain copyright statements and notices, 2 Redistributions in binary form must reproduce applicable copyright statements and notices, this list of conditions, and the following disclaimer in the documentation and/or other materials provided with the distribution, and...
Page 134
CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. WatchGuard System Manager...
Public License in all respects for all of the code used other than OpenSSL. If you modify this file, you may extend this exception to your version of the file, but you are not obligated to do so. If you do not wish to do so, delete this exception statement from your version. WatchGuard System Manager...
It is provided "as is" without express or implied warranty of any kind. These notices must be retained in any copies of any part of this documentation and/or software. WatchGuard System Manager...
Page 141
This software is provided 'as-is', without any express or implied warranty. In no event will the authors be held liable for any damages arising from the use of this software. Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions: 1 The origin of this software must not be misrepresented;...
Page 142
1 Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2 Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. WatchGuard System Manager...
Page 143
3 The names of the authors of this software must not be used to endorse or promote products derived from this software without prior written permission. 4 Redistributions of any form whatsoever must retain the following acknowledgment: "This product includes software developed by Pedro Roque Marques <pedro_m@yahoo.com>" THE AUTHORS OF THIS SOFTWARE DISCLAIM ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS, IN NO EVENT SHALL THE AUTHORS BE LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES...
PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. WatchGuard System Manager...
License is not already Covered Code governed by this License. 1.11 "Source Code" means the preferred form of the Covered Code for making modifications to it, including all modules it contains, plus any associated interface definition files, scripts WatchGuard System Manager...
Page 147
used to control compilation and installation of an Executable, or a list of source code differential comparisons against either the Original Code or another well known, available Covered Code of the Contributor's choice. The Source Code can be in a compressed or archival form, provided the appropriate decompression or de-archiving software is widely available for no charge.
Page 148
However, You may do so only on Your own behalf, and not on behalf of the Initial Developer or any Contributor. You must make it absolutely clear that any such warranty, support, indemnity or liability obligation is offered by You alone, and You hereby agree to indemnify WatchGuard System Manager...
Page 149
the Initial Developer and every Contributor for any liability incurred by the Initial Developer or such Contributor as a result of warranty, support, indemnity or liability terms You offer. 3.6 Distribution of Executable Versions. You may distribute Covered Code in Executable form only if the requirements of Section 3.1-3.5 have been met for that Covered Code, and if You include a notice stating that the Source Code version of the Covered Code is available under the terms of this License, including a description of how and where You have fulfilled the obligations of Section 3.2...
Page 150
48 C.F.R. 12.212 (Sept. 1995). Consistent with 48 C.F.R. 12.212 and 48 C.F.R. 227.7202-1 through 227.7202-4 (June 1995), all U.S. Government End Users acquire Covered Code with only those rights set forth herein. WatchGuard System Manager...
Page 151
11 MISCELLANEOUS This License represents the complete agreement concerning subject matter hereof. If any provision of this License is held to be unenforceable, such provision shall be reformed only to the extent necessary to make it enforceable. This License shall be governed by California law provisions (except to the extent applicable law, if any, provides otherwise), excluding its conflict- of-law provisions.
ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNEC- TION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. WatchGuard System Manager...
3 The end-user documentation included with the redistribution, if any, must include the following acknowledgment: "This product includes software developed by the Indiana University Extreme! Lab (http:// www.extreme.indiana.edu/)." Alternately, this acknowledgment may appear in the software itself, if and wherever such third- party acknowledgments normally appear. WatchGuard System Manager...
4 The names "Indiana Univeristy" and "Indiana Univeristy Extreme! Lab" must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact http://www.extreme.indiana.edu/. 5 Products derived from this software may not use "Indiana Univeristy" name nor may "Indiana Univeristy"...
Page 157
Index ANSI Z39.50 Any policy described Archie policy auth (ident) policy authentication and ssh blocked sites, searching for Border Gateway Protocol (BGP) described Citrix ICA policy Clarent-command policy Clarent-gateway policy CU-SeeMe policy DHCP-Server policy policy for DNS proxy described Reference Guide e-mail messages and the SMTP proxy Entrust policy...
Page 158
OSPF policy PCAnywhere policy ping policy policies types of well-known POP2 policy POP3 policy ports random standard used by Microsoft products used by WatchGuard products PPTP policy for protocols ICMP IGMP Internet IPIP RADIUS policy RADIUS-Accounting policy random ports RDP policy...
Page 159
SecurID policy services well-known 21, 23 Simple Mail Transfer Protocol Simple Network Management Protocol. See SNMP SMB policy SMTP packet filter policy SMTP proxy described SNMP described policy for SNMP-Trap policy SQL*Net policy SQL-Server policy ssh policy standard ports static NAT. See NAT, static Sun RPC policy SurfControl syslog...
Need help?
Do you have a question about the Firebox X5500E and is the answer not in the manual?
Questions and answers