EasyManua.ls Logo

D-Link DFL-870

D-Link DFL-870
948 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
27.9. Remote Desktop Protocol (Windows Terminal Server) .............................. 318
27.10. Remote Frame Buffer ........................................................................ 318
27.11. ShowMyPc.com ................................................................................ 318
27.12. TeamViewer ..................................................................................... 318
27.13. VMWare .......................................................................................... 319
27.14. X Window System ............................................................................. 319
27.15. X Display Manager Control Protocol .................................................... 319
28. Tunneling .................................................................................................... 320
28.1. 3GPP LI ............................................................................................. 321
28.2. AICCU-TIC IPv6 Tunneling .................................................................... 321
28.3. ASProxy ............................................................................................ 321
28.4. Control And Provisioning of Wireless Access Points .................................. 322
28.5. CCProxy ............................................................................................ 322
28.6. Ethernet Over IP ................................................................................. 322
28.7. ETSI Lawful Interception TS 10 232-1 V2.1.1 ............................................ 322
28.8. Gbridge.com ..................................................................................... 323
28.9. Generic Routing Encapsulation ............................................................. 323
28.10. GPRS Tunneling Protocol ................................................................... 323
28.11. GPRS Tunneling Protocol version 2 ...................................................... 323
28.12. LogMeIn Hamachi ............................................................................. 324
28.13. Hotspot Shield ................................................................................. 324
28.14. HTTP Tunnel .................................................................................... 324
28.15. iodine ............................................................................................. 324
28.16. IPv6 Control Protocol ........................................................................ 325
28.17. Layer 2 Tunneling Protocol ................................................................. 325
28.18. Link Quality Report ........................................................................... 325
28.19. Mobile IP ......................................................................................... 325
28.20. Net-Proxy ........................................................................................ 326
28.21. OpenVPN ........................................................................................ 326
28.22. PD-Proxy ......................................................................................... 326
28.23. Point-to-Point Protocol ...................................................................... 327
28.24. Point-to-Point Protocol Over Ethernet .................................................. 327
28.25. Point-to-Point Tunneling Protocol ....................................................... 327
28.26. socks2http ....................................................................................... 327
28.27. Spotflux (Windows only) .................................................................... 328
28.28. AnalogBit tcp-over-dns ...................................................................... 328
28.29. Teredo protocol ................................................................................ 328
28.30. Ultrasurf .......................................................................................... 328
28.31. Van Jacobson Compressed ................................................................. 329
28.32. Van Jacobson Uncompressed ............................................................. 329
28.33. vpnoverdns ..................................................................................... 329
28.34. XOT (X25 over TCP) ........................................................................... 329
28.35. ZenMate ......................................................................................... 330
29. Unclassified ................................................................................................. 331
29.1. Established TCP Connection ................................................................. 331
29.2. Incomplete virtual protocol .................................................................. 331
29.3. Malformed virtual protocol .................................................................. 332
29.4. Unknown virtual protocol .................................................................... 332
30. Wap ............................................................................................................ 333
30.1. WAP Binary XML ................................................................................. 333
30.2. MultiMedia Messages Encapsulation ..................................................... 333
30.3. Short message peer-to-peer protocol .................................................... 334
30.4. Universal Computer Protocol ............................................................... 334
30.5. Wireless Session Protocol ..................................................................... 334
30.6. Wireless Transport layer Security ........................................................... 334
30.7. Wireless Transaction Protocol ............................................................... 334
31. Web ............................................................................................................ 335
31.1. 01net.com ......................................................................................... 390
31.2. 0zz0.com ........................................................................................... 390
31.3. 10050.net .......................................................................................... 391
31.4. 10086.cn ........................................................................................... 391
Application Control Signatures
18

Table of Contents

Other manuals for D-Link DFL-870

Related product manuals