EasyManua.ls Logo

D-Link DFL-260E

D-Link DFL-260E
948 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
3.77. Telestream .......................................................................................... 91
3.78. Teltel .................................................................................................. 91
3.79. TuneIn ................................................................................................ 91
3.80. TVAnts Protocol ................................................................................... 92
3.81. TVU Network Player .............................................................................. 92
3.82. UUSee Protocol .................................................................................... 92
3.83. WebEx ................................................................................................ 93
3.84. VeohTV ............................................................................................... 93
3.85. VEVO .................................................................................................. 93
3.86. Viaplay ............................................................................................... 94
3.87. Viber .................................................................................................. 94
3.88. Viewster .............................................................................................. 95
3.89. Vine ................................................................................................... 95
3.90. Voddler.com ........................................................................................ 95
3.91. Vsee ................................................................................................... 96
3.92. X.25 .................................................................................................... 96
3.93. Xbox Music .......................................................................................... 96
3.94. Xcap ................................................................................................... 97
3.95. XL Nonton ........................................................................................... 97
3.96. Yahoo Screen ....................................................................................... 97
3.97. Yahoo Messenger Video ........................................................................98
4. Authentication ................................................................................................. 99
4.1. Challenge Handshake Authentication Protocol ........................................... 99
4.2. Diameter .............................................................................................. 99
4.3. Identification Protocol .......................................................................... 100
4.4. kpasswd ............................................................................................. 100
4.5. Kerberos ............................................................................................. 100
4.6. Password Authentication Protocol .......................................................... 100
4.7. Remote Authentication Dial-In User Service ............................................. 101
4.8. SOCKet Secure v4 ................................................................................. 101
4.9. SOCKet Secure v5 ................................................................................. 101
4.10. Terminal Access Controller Access-Control System Plus ............................ 101
4.11. Yellow Page Passwd ............................................................................ 102
4.12. Yellow Pages Server ............................................................................ 102
5. Compression ................................................................................................. 103
5.1. Compression Control Protocol ............................................................... 103
5.2. COMP ................................................................................................. 103
6. Database ....................................................................................................... 104
6.1. DB2 .................................................................................................... 104
6.2. Distributed Relational Database Architecture ........................................... 104
6.3. FileMaker Pro ...................................................................................... 105
6.4. IBM Informix ........................................................................................ 105
6.5. Mobilink ............................................................................................. 105
6.6. MySQL Protocol ................................................................................... 105
6.7. PostgreSQL ......................................................................................... 106
6.8. Structured Query Language Interface ...................................................... 106
6.9. Sybase ................................................................................................ 106
6.10. Tabular Data Stream ........................................................................... 106
6.11. Transparent Network Service (Oracle) .................................................... 107
7. Encrypted ..................................................................................................... 108
7.1. I2P Invisible Internet Project ................................................................... 108
7.2. IPsec Encapsulating Security Payload ...................................................... 108
7.3. Internet Security Association and Key Management Protocol ...................... 109
7.4. Online Certificate Status Protocol ........................................................... 109
7.5. Secure Shell ........................................................................................ 109
7.6. Secure Socket Layer .............................................................................. 110
7.7. Tor ..................................................................................................... 110
7.8. Tor2web ............................................................................................. 110
8. ERP .............................................................................................................. 112
8.1. SAP .................................................................................................... 112
9. File Server ..................................................................................................... 113
Application Control Signatures
6

Table of Contents

Other manuals for D-Link DFL-260E

Related product manuals