EasyManua.ls Logo

D-Link DFL-870

D-Link DFL-870
948 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Loading...
Network Security Solution http://www.dlink.com
NetDefendOS
Ver. 11.04.01
Network Security Firewall
Security
Security
Application Control
Signatures

Table of Contents

Other manuals for D-Link DFL-870

Question and Answer IconNeed help?

Do you have a question about the D-Link DFL-870 and is the answer not in the manual?

D-Link DFL-870 Specifications

General IconGeneral
Form Factor1U Rackmount
ManagementWeb-based, CLI, SNMP
Interfaces8 x 10/100/1000 Ethernet
Power SupplyAC 100-240V, 50/60Hz
VPN SupportIPSec

Summary

Network Security Firewall Application Control Signatures

Chapter 1: Antivirus

1.1. Lookout Mobile Security

All-in-one security software for mobile devices.

1.2. Sophos update

Sophos antivirus update protocol.

Chapter 2: Application Service

2.1. Microsoft ActiveSync

Mobile data synchronization technology and protocol developed by Microsoft.

Chapter 3: AudioVideo

3.3. Adobe Connect

Web communication system for training, marketing, conferences, and online collaboration.

Chapter 4: Authentication

4.1. Challenge Handshake Authentication Protocol

CHAP protocol used to verify peer identity on a point-to-point link.

4.2. Diameter

AAA protocol for computer networks, alternative to RADIUS.

Chapter 6: Database

6.1. DB2

Relational model database server from IBM, runs on mainframes and available for Linux/Unix/Windows.

Chapter 7: Encrypted

7.1. I2 P Invisible Internet Project

Anonymous overlay network protecting communication from surveillance.

7.2. IPsec Encapsulating Security Payload

IPSec protocol providing services for securing host communications.

Chapter 8: ERP

8.1. SAP

Protocol and ERP application name used by most companies.

Chapter 9: File Server

Chapter 11: Forum

11.4. LinkedIn

LinkedIn is professional social network.

Chapter 12: Game

Chapter 13: Instant Messaging

13.1. AOL Instant Messenger (formerly OSCAR)

AIM is an instant messaging application, protocol name OSCAR.

Chapter 14: Mail Protocols

14.1. Internet Message Access Protocol version 4

IMAP protocol enables client to access and manipulate electronic mail messages on a server.

14.2. Internet Message Access Protocol Secure

IMAPS is the secure version of the IMAP protocol.

Chapter 15: Microsoft Office

15.1. Microsoft Office Groove

Desktop application for document collaboration in teams, with offline members.

Chapter 16: Middleware

16.1. Advance Message Queuing Protocol

AMQP is an open standard application layer protocol for message-oriented middleware.

16.2. Distributed Computing Environment - Remote Procedure Call

DCERPC protocol is an RPC implementation used in Distributed Computing Environments.

Chapter 17: Network Management

17.1. Altiris

Provides service-oriented management solutions for IT infrastructures.

Chapter 18: Network Service

Chapter 19: Peer to Peer

Chapter 20: Printer

20.1. Apple AirPrint

Network printing feature for Apple systems, based on Dns Service Discovery and IPP.

Chapter 22: Routing

22.1. Apollo Domain:XEROX

Routing protocol implemented natively in Apollo workstations.

22.2. Border Gateway Protocol

Inter Autonomous Systems routing protocol used by most ISPs.

22.3. Enhanced Interior Gateway Routing Protocol

Improved version of IGRP, a Cisco proprietary protocol.

Chapter 23: Security Service

23.1. Fsecure

Finnish computer security company.

23.2. GhostSurf

Internet privacy application.

Chapter 24: Standard

24.1. High Entropy

Detects encrypted payloads using entropy and printable strings.

24.2. Statistical Protocol IDentification

Identifies encrypted/obfuscated streams from advanced Peer-to-peer or VPN protocols.

Chapter 25: Telephony

Chapter 26: Terminal

26.1. Remote Login

Protocol for bidirectional communication to distant terminals.

26.2. Remote Shell

Establishes secure connection to remote host for command execution.

Chapter 27: Thin Client

27.1. Rational ClearCase

Source control / configuration management tool from IBM's 'Rational' division.

Chapter 28: Tunneling

28.3. ASProxy

Free web proxy allowing anonymous internet surfing.

28.4. Control And Provisioning of Wireless Access Points

Standard protocol enabling a controller to manage wireless access points.

Chapter 31: Web

31.1. 01 net.com

Classifies HTTP traffic to 01net.com, a French high-tech news site.

Related product manuals