NBAR2 Protocol Pack 3.1.0

Total Page:16

File Type:pdf, Size:1020Kb

NBAR2 Protocol Pack 3.1.0 NBAR2 Protocol Pack 3.1.0 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 C O N T E N T S Release Notes for NBAR2 Protocol Pack 3.1.0 1 3COM-AMP3 through AYIYA-IPV6-TUNNELED 5 3COM-AMP3 6 3COM-TSMUX 7 3PC 8 9PFS 9 914C G 10 ACAP 10 ACAS 11 ACCESSBUILDER 12 ACCESSNETWORK 13 ACP 14 ACR-NEMA 15 ACTIVE-DIRECTORY 15 ACTIVESYNC 16 ADOBE-CONNECT 17 AED-512 18 AFPOVERTCP 19 AGENTX 20 ALPES 21 AMINET 21 AN 22 ANET 23 ANSANOTIFY 24 ANSATRADER 25 ANY-HOST-INTERNAL 25 AODV 26 AOL-MESSENGER 27 AOL-MESSENGER-AUDIO 28 NBAR2 Protocol Pack 3.1.0 ii Contents AOL-MESSENGER-FT 29 AOL-MESSENGER-VIDEO 29 AOL-PROTOCOL 30 APC-POWERCHUTE 31 APERTUS-LDP 32 APPLEJUICE 33 APPLEQTC 34 APPLEQTCSRVR 34 APPLE-REMOTE-DESKTOP 35 APPLIX 36 ARCISDMS 37 ARGUS 38 ARIEL1 38 ARIEL2 39 ARIEL3 40 ARIS 41 ARNS 42 ARUBA-PAPI 42 ASA 43 ASA-APPL-PROTO 44 ASIPREGISTRY 45 ASIP-WEBADMIN 46 AS-SERVERMAP 47 AT-3 47 AT-5 48 AT-7 49 AT-8 50 AT-ECHO 51 AT-NBP 51 AT-RTMP 52 AT-ZIS 53 AUDIO-OVER-HTTP 54 AUDIT 55 AUDITD 56 AURORA-CMGR 56 NBAR2 Protocol Pack 3.1.0 iii Contents AURP 57 AUTH 58 AVIAN 59 AVOCENT 60 AX25 60 AYIYA-IPV6-TUNNELED 61 BABELGUM through BR-SAT-MON 63 BABELGUM 63 BACNET 64 BAIDU-MOVIE 65 BANYAN-RPC 66 BANYAN-VIP 67 BB 68 BBNRCCMON 68 BDP 69 BFTP 70 BGMP 71 BGP 72 BGS-NSI 73 BHEVENT 73 BHFHS 74 BHMDS 75 BINARY-OVER-HTTP 76 BITTORRENT 77 BITTORRENT-NETWORKING 78 BL-IDM 78 BLIZWOW 79 BLOGGER 80 BMPP 81 BNA 82 BNET 83 BORLAND-DSJ 83 BR-SAT-MON 84 CABLEPORT through CYCLESERV2 87 CABLEPORT-AX 88 NBAR2 Protocol Pack 3.1.0 iv Contents CAB-PROTOCOL 89 CADLOCK 90 CAILIC 91 CALL-OF-DUTY 92 CAPWAP-CONTROL 92 CAPWAP-DATA 93 CBT 94 CDC 95 CDDBP-ALT 96 CFDPTKT 97 CFTP 98 CHAOS 99 CHARGEN 99 CHECKPOINT-CPMI 100 CHSHELL 101 CIFS 102 CIMPLEX 103 CISCO-FNA 104 CISCO-IP-CAMERA 104 CISCO-NAC 105 CISCO-PHONE 106 CISCO-SYS 107 CISCO-TDP 108 CISCO-TNA 109 CITRIX 109 CITRIX-STATIC 110 CLEARCASE 111 CLOANTO-NET-1 112 CMIP-AGENT 113 CMIP-MAN 114 COAUTHOR 115 CODAAUTH2 116 COLLABORATOR 116 COMMERCE 117 COMPAQ-PEER 118 NBAR2 Protocol Pack 3.1.0 v Contents COMPRESSNET 119 COMSCM 120 CON 120 CONFERENCE 121 CONNENDP 122 CONTENTSERVER 123 COOLTALK 124 CORBA-IIOP 125 CORERJD 125 COURIER 126 COVIA 127 CPHB 128 CPNX 129 CPQ-WBEM 130 CREATIVEPARTNR 130 CREATIVESERVER 131 CRS 132 CRTP 133 CRUDP 134 CRYPTOADMIN 134 CSI-SGWP 135 CSNET-NS 136 CTF 137 CUSEEME 138 CUSTIX 139 CVC_HOSTD 139 CVSPSERVER 140 CVSUP 141 CYBERCASH 142 CYCLESERV 143 CYCLESERV2 144 DASP through DWR 145 DANTZ 146 DASP 147 DATASURFSRV 148 NBAR2 Protocol Pack 3.1.0 vi Contents DATASURFSRVSEC 149 DATEX-ASN 149 DAYTIME 150 DBASE 151 DCCP 152 DCLINK 153 DCN-MEAS 154 DCP 154 DCTP 155 DDM-DFM 156 DDM-RDB 157 DDM-SSL 158 DDP 159 DDX 159 DEC_DLM 160 DECAP 161 DECAUTH 162 DECBSRV 163 DECLADEBUG 163 DECVMS-SYSMGT 164 DEI-ICDA 165 DEOS 166 DESKNETS 167 DEVICE 167 DGP 168 DHCP-FAILOVER 169 DHCP-FAILOVER2 170 DHCP 171 DHCPV6-CLIENT 171 DHCPV6-SERVER 172 DHT 173 DICOM 174 DIGITAL-VRC 175 DIRECTCONNECT 176 DIRECTPLAY 176 NBAR2 Protocol Pack 3.1.0 vii Contents DIRECTPLAY8 177 DIRECTV-CATLG 178 DIRECTV-SOFT 179 DIRECTV-TICK 180 DIRECTV-WEB 181 DISCARD 181 DISCLOSE 182 DISTCC 183 DIXIE 184 DLS-MON 185 DLS 186 DMP 186 DN6-NLM-AUD 188 DNA-CML 188 DNP 189 DNS 190 DNSIX 191 DOOM 192 DPSI 192 DSFGW 193 DSP 194 DSP3270 195 DSR 196 DTAG-STE-SB 197 DTK 197 DWR 198 ECHO through EXEC 201 ECHO 202 EDONKEY-STATIC 202 EDONKEY 203 EGP 204 EIGRP 205 ELCSD 206 EMBL-NDT 207 EMCON 207 NBAR2 Protocol Pack 3.1.0 viii Contents EMFIS-CNTL 208 EMFIS-DATA 209 ENCAP 210 ENCRYPTED-BITTORRENT 211 ENCRYPTED-EMULE 212 ENTOMB 212 ENTRUST-AAAS 213 ENTRUST-AAMS 214 ENTRUST-ASH 215 ENTRUST-KMSH 216 ENTRUST-SPS 216 EPMAP 217 ERPC 218 ESCP-IP 219 ESIGNAL 220 ESRO-EMSDP 220 ESRO-GEN 221 ETHERIP 222 EUDORA-SET 223 EXCHANGE 224 EXEC 224 FACEBOOK through FUJITSU-DEV 227 FACEBOOK 227 FACETIME 228 FASTTRACK-STATIC 229 FASTTRACK 230 FATSERV 231 FC 232 FCP 233 FILEMAKER-ANNOUNCEMENT 233 FILETOPIA 234 FINGER 235 FIRE 236 FIX 237 FLASH-VIDEO 238 NBAR2 Protocol Pack 3.1.0 ix Contents FLASHMYSPACE 238 FLASHYAHOO 239 FLEXLM 240 FLN-SPX 241 FONT-SERVICE 242 FRING-VIDEO 243 FRING-VOIP 243 FRING 244 FTP-AGENT 245 FTP-DATA 246 FTP 247 FTPS-DATA 248 FUJITSU-DEV 248 GAME-SPY through GURUGURU 251 GACP 252 GAME-SPY 253 GBRIDGE 253 GDOMAP 254 GDS_DB 255 GENIE 256 GENRAD-MUX 257 GGF-NCP 257 GGP 258 GHOSTSURF 259 GINAD 260 GKRELLM 261 GMAIL 261 GMTP 262 GNUTELLA 263 GO-LOGIN 264 GOBOOGY 265 GOOGLE-ACCOUNTS 266 GOOGLE-DOCS 266 GOOGLE-EARTH 267 GOOGLE-PLUS 268 NBAR2 Protocol Pack 3.1.0 x Contents GOOGLE-SERVICES 269 GOPHER 270 GOTODEVICE 271 GOTOMYPC 271 GRAPHICS 272 GRE 273 GRIDFTP 274 GROOVE 275 GROUPWISE 276 GSIFTP 276 GSS-HTTP 277 GSS-XLICEN 278 GTALK-CHAT 279 GTALK-FT 280 GTALK-VIDEO 280 GTALK-VOIP 281 GTALK 282 GTP-USER 283 GURUGURU 284 H323 through HYPERWAVE-ISP 287 H323 288 HA-CLUSTER 288 HAMACHI 289 HAP 290 HASSLE 291 HCP-WISMAR 292 HDAP 293 HELLO-PORT 293 HEMS 294 HEROIX-LONGITUDE 295 HIP 296 HITACHI-SPC 297 HL7 298 HMMP-IND 298 HMMP-OP 299 NBAR2 Protocol Pack 3.1.0 xi Contents HMP 300 HOPOPT 301 HOSTNAME 302 HOTMAIL 303 HP-ALARM-MGR 303 HP-COLLECTOR 304 HP-MANAGED-NODE 305 HP-PDL-DATASTR 306 HTTP-ALT 307 HTTP-MGMT 307 HTTP-RPC-EPMAP 308 HTTP 309 HULU 310 HYBRID-POP 311 HYPER-G 311 HYPERWAVE-ISP 312 IAFDBASE through JARGON 315 I-NLSP 316 IAFDBASE 317 IAFSERVER 318 IASD 319 IATP 320 IAX 321 IBM-APP 321 IBM-DB2 322 IBM-DIRECTOR 323 IBPROTOCOL 324 ICLCNET-LOCATE 325 ICLCNET_SVINFO 325 ICMP 326 ICQ-FILETRANSFER 327 ICQ 328 IDFP 329 IDPR-CMTP 330 IDPR 330 NBAR2 Protocol Pack 3.1.0 xii Contents IDRP 331 IEEE-MMS-SSL 332 IEEE-MMS 333 IFMP 334 IGRP 335 IIOP 336 IL 337 IMAP 337 IMSP 338 INBUSINESS 339 INFOSEEK 340 INGRES-NET 341 INTECOURIER 342 INTEGRA-SME 342 INTRINSA 343 IP-MESSENGER 344 IPCD 345 IPCOMP 346 IPCSERVER 347 IPCV 347 IPDD 348 IPINIP 349 IPIP 350 IPLT 351 IP-MESSENGER 351 IPP 352 IPPC 353 IPSEC 354 IPV6-FRAG 355 IPV6-ICMP 355 IPV6-NONXT 356 IPV6-OPTS 357 IPV6-ROUTE 358 IPV6INIP 359 IPX-IN-IP 360 NBAR2 Protocol Pack 3.1.0 xiii Contents IRC-SERV 360 IRC 361 IRTP 362 IS99C 363 IS99S 364 ISAKMP 365 ISATAP-IPV6-TUNNELED 366 ISCSI-TARGET 366 ISCSI 367 ISI-GL 368 ISIS 369 ISO-ILL 370 ISO-IP 371 ISO-TP0 371 ISO-TP4 372 ISO-TSAP-C2 373 ISO-TSAP 374 ITM-MCELL-S 375 ITUNES 376 JARGON 376 KALI through LWAPP 379 KALI 380 KAZAA2 381 K-BLOCK 381 KERBEROS-ADM 382 KERBEROS 383 KEYSERVER 384 KIS 385 KLOGIN 385 KNET-CMP 386 KONSPIRE2B 387 KPASSWD 388 KRYPTOLAN 389 KSHELL 389 KURO 390 NBAR2 Protocol Pack 3.1.0 xiv Contents L2TP 391 LA-MAINT 392 LANSERVER 393 LARP 393 LDAP 394 LDP 395 LEAF-1 396 LEAF-2 397 LEGENT-1 397 LEGENT-2 398 LINKEDIN 399 LIVEMEETING 400 LIVESTATION 401 LJK-LOGIN 402 LOCKD 402 LOCUS-CON 403 LOCUS-MAP 404 LOGIN 405 LOGLOGIC 406 LOGMEIN 407 LOTUS-NOTES 407 LWAPP 408 MAC-SRVR-ADMIN through MYSQL 411 MAC-SRVR-ADMIN 413 MAGENTA-LOGIC 414 MAILBOX-LM 414 MAILQ 415 MAITRD 416 MANET 417 MANOLITO 418 MAPI 419 MAPLESTORY 419 MASQDIALER 420 MATIP-TYPE-A 421 MATIP-TYPE-B 422 NBAR2 Protocol Pack 3.1.0 xv Contents MAXDB 423 MCAFEE-UPDATE 424 MCIDAS 425 MCNS-SEC 425 MDC-PORTMAPPER 426 MECOMM 427 MEGAVIDEO 428 MEREGISTER 429 MERIT-INP 429 META5 430 METAGRAM 431 METER 432 MFCOBOL 433 MFE-NSP 433 MFTP 434 MGCP 435 MICOM-PFS 436 MICP 437 MICROMUSE-LM 437 MICROSOFTDS 438 MIKOGO 439 MIT-DOV 440 MIT-ML-DEV 441 MOBILE 441 MOBILEIP-AGENT 442 MOBILIP-MN 443 MOBILITYSRV 444 MONDEX 445 MONITOR 446 MORTGAGEWARE 446 MPLS-IN-IP 447 MPM-FLAGS 448 MPM-SND 449 MPM 450 MPP 450 NBAR2 Protocol Pack 3.1.0 xvi Contents MPTN 451 MRM 452 MS-DYNAMICS-CRM-ONLINE 453 MS-IIS 454 MS-LIVE-ACCOUNTS 455 MS-LYNC-MEDIA 455 MS-LYNC 456 MS-NETLOGON 457 MS-OCS-FILE-TRANSFER 458 MS-OFFICE-365 459 MS-OLAP 460 MS-ROME 460 MS-RPC 461 MS-SHUTTLE 462 MS-SMS 463 MS-SQL-M 464 MS-STREAMING 465 MS-UPDATE 465 MS-WBT 466 MS-WIN-DNS 467 MSDP 468 MSEXCH-ROUTING 469 MSFT-GC-SSL 470 MSFT-GC 470 MSG-AUTH 471 MSG-ICP 472 MSN-MESSENGER-FT 473 MSN-MESSENGER-VIDEO 474 MSN-MESSENGER 475 MSNP 475 MSP 476 MTP 477 MULTILING-HTTP 478 MULTIPLEX 479 MUMPS 480 NBAR2 Protocol Pack 3.1.0 xvii Contents MUX 480 MY-JABBER-FT 481 MYLEX-MAPD 482 MYSQL 483 NAME through NXEDIT 485 NAME 486 NAMP 487 NAPSTER 488 NARP 489 NAS 490 NCED 491 NCLD 491 NCP 492 NCUBE-LM 493 NDMP 494 NDSAUTH 495 NEST-PROTOCOL 496 NET-ASSISTANT 497 NET8-CMAN 497 NETAPP-SNAPMIRROR 498 NETBIOS-NS 499 NETBIOS 500 NETBLT 501 NETFLIX 502 NETGW 503 NETNEWS 503 NETOP-REMOTE-CONTROL 504 NETRCS 505 NETRJS-1 506 NETRJS-2 507 NETRJS-3 508 NETRJS-4 508 NETSC-DEV 509 NETSC-PROD 510 NETSHOW 511 NBAR2 Protocol Pack 3.1.0 xviii Contents NETVIEWDM1 512 NETVIEWDM2 513 NETVIEWDM3 513 NETVMG-TRACEROUTE 514 NETWALL 515 NETWARE-IP 516 NETWORKING-GNUTELLA 517 NEW-RWHO 518 NEXTSTEP 518 NFS 519 NI-FTP 520 NI-MAIL 521 NICNAME 522 NLOGIN 523 NMAP 523 NMSP 524 NNSP 525 NNTP 526 NOTES 527 NOVADIGM 528 NOVASTORBAKCUP 528 NPMP-GUI 529 NPMP-LOCAL 530 NPMP-TRAP 531 NPP 532 NQS 532 NS 533 NSFNET-IGP 534 NSIIOPS 535 NSRMP 536 NSS-ROUTING 536 NSW-FE 537 NTALK 538 NTP 539 NVP-II 540 NBAR2 Protocol Pack 3.1.0 xix Contents NXEDIT 541 OBEX through OSU-NMS 543 OBEX 544 OBJCALL 544 OCBINDER 545 OCS_AMU 546 OCS_CMU 547 OCSERVER 548 ODMR 548 OHIMSRV 549 OLSR 550 OMGINITIALREFS 551 OMHS 552 OMSERV 553 ONMUX 553 OPALIS-RDV 554 OPALIS-ROBOT 555 OPC-JOB-START 556 OPC-JOB-TRACK 557 OPENPORT 558 OPENVMS-SYSIPC 558 OPENVPN 559 OPSMGR 560 ORA-SRV 561 ORACLE-BI 562 ORACLE-EBSUITE-UNSECURED 562 ORACLE-SQLNET 563 ORACLENAMES 564 ORACLENET8CMAN 565 ORBIX-CONFIG 566 ORBIX-LOC-SSL 567 ORBIX-LOCATOR 567 OSCAR-FILETRANSFER 568 OSPF 569 OSU-NMS
Recommended publications
  • Avaya Session Border Controller for Enterprise Overview and Specification
    Avaya Session Border Controller for Enterprise Overview and Specification Release 7.2.2.2 Issue 8 April 2019 © 2017-2019, Avaya Inc. YOU DO NOT WISH TO ACCEPT THESE TERMS OF USE, YOU All Rights Reserved. MUST NOT ACCESS OR USE THE HOSTED SERVICE OR AUTHORIZE ANYONE TO ACCESS OR USE THE HOSTED Notice SERVICE. While reasonable efforts have been made to ensure that the Licenses information in this document is complete and accurate at the time of printing, Avaya assumes no liability for any errors. Avaya reserves THE SOFTWARE LICENSE TERMS AVAILABLE ON THE AVAYA the right to make changes and corrections to the information in this WEBSITE, HTTPS://SUPPORT.AVAYA.COM/LICENSEINFO, document without the obligation to notify any person or organization UNDER THE LINK “AVAYA SOFTWARE LICENSE TERMS (Avaya of such changes. Products)” OR SUCH SUCCESSOR SITE AS DESIGNATED BY AVAYA, ARE APPLICABLE TO ANYONE WHO DOWNLOADS, Documentation disclaimer USES AND/OR INSTALLS AVAYA SOFTWARE, PURCHASED “Documentation” means information published in varying mediums FROM AVAYA INC., ANY AVAYA AFFILIATE, OR AN AVAYA which may include product information, operating instructions and CHANNEL PARTNER (AS APPLICABLE) UNDER A COMMERCIAL performance specifications that are generally made available to users AGREEMENT WITH AVAYA OR AN AVAYA CHANNEL PARTNER. of products. Documentation does not include marketing materials. UNLESS OTHERWISE AGREED TO BY AVAYA IN WRITING, Avaya shall not be responsible for any modifications, additions, or AVAYA DOES NOT EXTEND THIS LICENSE IF THE SOFTWARE deletions to the original published version of Documentation unless WAS OBTAINED FROM ANYONE OTHER THAN AVAYA, AN AVAYA such modifications, additions, or deletions were performed by or on AFFILIATE OR AN AVAYA CHANNEL PARTNER; AVAYA the express behalf of Avaya.
    [Show full text]
  • Security Management Fundamentals Release: 6.0 Document Revision: 03.08
    Nortel Communication Server 1000 Security Management Fundamentals Release: 6.0 Document Revision: 03.08 www.nortel.com .NN43001-604 Nortel Communication Server 1000 Release: 6.0 Publication: NN43001-604 Document release date: 14 April 2010 Copyright © 2008-2010 Nortel Networks. All Rights Reserved. While the information in this document is believed to be accurate and reliable, except as otherwise expressly agreed to in writing NORTEL PROVIDES THIS DOCUMENT "AS IS" WITHOUT WARRANTY OR CONDITION OF ANY KIND, EITHER EXPRESS OR IMPLIED. The information and/or products described in this document are subject to change without notice. Nortel, Nortel Networks, the Nortel logo, and the Globemark are trademarks of Nortel Networks. All other trademarks are the property of their respective owners. 3 . Contents New in this release 11 Other changes 11 Revision history 11 How to get help 15 Getting help from the Nortel Web site 15 Getting help over the telephone from a Nortel Solutions Center 15 Getting help from a specialist by using an Express Routing Code 16 Getting help through a Nortel distributor or reseller 16 Introduction 17 Purpose 17 Navigation 18 Other security information 18 About this document 19 Subject 19 Intended audience 20 Terminology conventions 20 Fundamentals of system security management 21 System security overview 23 General signaling security overview 23 Key management concepts 23 Public-key certificate concepts 25 Platform security overview 28 Unified Communications Management security services 28 Unified Communications Management security server roles 29 Security Domain Manager concepts 30 Linux security hardening 31 Internal communications security overview 36 ISSS/IPsec 36 Secure File Transfer Protocol concepts 38 Port access restrictions concepts 40 Linux Master Firewall Control 41 Media and signaling security overview 42 Nortel Communication Server 1000 Security Management Fundamentals NN43001-604 03.08 14 April 2010 Copyright © 2008-2010 Nortel Networks.
    [Show full text]
  • SILC-A SECURED INTERNET CHAT PROTOCOL Anindita Sinha1, Saugata Sinha2 Asst
    ISSN (Print) : 2320 – 3765 ISSN (Online): 2278 – 8875 International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering Vol. 2, Issue 5, May 2013 SILC-A SECURED INTERNET CHAT PROTOCOL Anindita Sinha1, Saugata Sinha2 Asst. Prof, Dept. of ECE, Siliguri Institute of Technology, Sukna, Siliguri, West Bengal, India 1 Network Engineer, Network Dept, Ericsson Global India Ltd, India2 Abstract:-. The Secure Internet Live Conferencing (SILC) protocol, a new generation chat protocol provides full featured conferencing services, compared to any other chat protocol. Its main interesting point is security which has been described all through the paper. We have studied how encryption and authentication of the messages in the network achieves security. The security has been the primary goal of the SILC protocol and the protocol has been designed from the day one security in mind. In this paper we have studied about different keys which have been used to achieve security in the SILC protocol. The main function of SILC is to achieve SECURITY which is most important in any chat protocol. We also have studied different command for communication in chat protocols. Keywords: SILC protocol, IM, MIME, security I.INTRODUCTION SILC stands for “SECURE INTERNET LIVE CONFERENCING”. SILC is a secure communication platform, looks similar to IRC, first protocol & quickly gained the status of being the most popular chat on the net. The security is important feature in applications & protocols in contemporary network environment. It is not anymore enough to just provide services; they need to be secure services. The SILC protocol is a new generation chat protocol which provides full featured conferencing services; additionally it provides security by encrypting & authenticating the messages in the network.
    [Show full text]
  • Universidad Pol Facultad D Trabajo
    UNIVERSIDAD POLITÉCNICA DE MADRID FACULTAD DE INFORMÁTICA TRABAJO FINAL DE CARRERA ESTUDIO DEL PROTOCOLO XMPP DE MESAJERÍA ISTATÁEA, DE SUS ATECEDETES, Y DE SUS APLICACIOES CIVILES Y MILITARES Autor: José Carlos Díaz García Tutor: Rafael Martínez Olalla Madrid, Septiembre de 2008 2 A mis padres, Francisco y Pilar, que me empujaron siempre a terminar esta licenciatura y que tanto me han enseñado sobre la vida A mis abuelos (q.e.p.d.) A mi hijo icolás, que me ha dejado terminar este trabajo a pesar de robarle su tiempo de juego conmigo Y muy en especial, a Susana, mi fiel y leal compañera, y la luz que ilumina mi camino Agradecimientos En primer lugar, me gustaría agradecer a toda mi familia la comprensión y confianza que me han dado, una vez más, para poder concluir definitivamente esta etapa de mi vida. Sin su apoyo, no lo hubiera hecho. En segundo lugar, quiero agradecer a mis amigos Rafa y Carmen, su interés e insistencia para que llegara este momento. Por sus consejos y por su amistad, les debo mi gratitud. Por otra parte, quiero agradecer a mis compañeros asesores militares de Nextel Engineering sus explicaciones y sabios consejos, que sin duda han sido muy oportunos para escribir el capítulo cuarto de este trabajo. Del mismo modo, agradecer a Pepe Hevia, arquitecto de software de Alhambra Eidos, los buenos ratos compartidos alrrededor de nuestros viejos proyectos sobre XMPP y que encendieron prodigiosamente la mecha de este proyecto. A Jaime y a Bernardo, del Ministerio de Defensa, por haberme hecho descubrir las bondades de XMPP.
    [Show full text]
  • Qos: NBAR Protocol Library, Cisco IOS XE Release 3.8S
    QoS: NBAR Protocol Library, Cisco IOS XE Release 3.8S Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 C O N T E N T S 3COM-AMP3 through AYIYA-IPV6-TUNNELED 34 3COM-AMP3 35 3COM-TSMUX 36 3PC 37 9PFS 38 914C G 39 ACAP 40 ACAS 40 ACCESSBUILDER 41 ACCESSNETWORK 42 ACP 43 ACR-NEMA 44 ACTIVE-DIRECTORY 45 ACTIVESYNC 45 ADOBE-CONNECT 46 AED-512 47 AFPOVERTCP 48 AGENTX 49 ALPES 50 AMINET 50 AN 51 ANET 52 ANSANOTIFY 53 ANSATRADER 54 ANY-HOST-INTERNAL 54 AODV 55 AOL-MESSENGER 56 AOL-MESSENGER-AUDIO 57 AOL-MESSENGER-FT 58 QoS: NBAR Protocol Library, Cisco IOS XE Release 3.8S ii Contents AOL-MESSENGER-VIDEO 58 AOL-PROTOCOL 59 APC-POWERCHUTE 60 APERTUS-LDP 61 APPLEJUICE 62 APPLEQTC 63 APPLEQTCSRVR 63 APPLIX 64 ARCISDMS 65 ARGUS 66 ARIEL1 67 ARIEL2 67 ARIEL3 68 ARIS 69 ARNS 70 ARUBA-PAPI 71 ASA 71 ASA-APPL-PROTO 72 ASIPREGISTRY 73 ASIP-WEBADMIN 74 AS-SERVERMAP 75 AT-3 76 AT-5 76 AT-7 77 AT-8 78 AT-ECHO 79 AT-NBP 80 AT-RTMP 80 AT-ZIS 81 AUDIO-OVER-HTTP 82 AUDIT 83 AUDITD 84 AURORA-CMGR 85 AURP 85 AUTH 86 QoS: NBAR Protocol Library, Cisco IOS XE Release 3.8S iii Contents AVIAN 87 AVOCENT 88 AX25 89 AYIYA-IPV6-TUNNELED 89 BABELGUM through BR-SAT-MON 92 BABELGUM 93 BACNET 93 BAIDU-MOVIE 94 BANYAN-RPC 95 BANYAN-VIP 96 BB 97 BBNRCCMON 98 BDP 98 BFTP 99 BGMP 100 BGP 101 BGS-NSI 102 BHEVENT 103 BHFHS 103 BHMDS 104 BINARY-OVER-HTTP 105 BITTORRENT 106 BL-IDM 107 BLIZWOW 107 BLOGGER 108 BMPP 109 BNA 110 BNET 111 BORLAND-DSJ 112 BR-SAT-MON 112
    [Show full text]
  • Special Report Internet Portal Sites in Korea
    www.ica.or.kr March~April 2006 (ISSUE 18) Special Report Internet Portal Sites in Korea Review Korea Mobile Communications in 2005 Marketing & Strategy Focus on LBS Industry Hwiyoung Chae International Cooperation NHN CEO Agency for Korea IT Publisher’s Column IT Korea journal March~April 2006 1 Booming Internet Portals Soon to Go Global That Korea is the world’s broadband leader is organized into sections by media types. The video no longer an arguable fact. The internet wave, search, a feature that has recently been added on, is sweeping across Korea since the 1990s, has made it generating a tremendous buzz, and setting a whole- into the world’s most networked nation. Korea’s new trend in the worldwide search market. reputation is especially peerless in online gaming. Korea’s state-of-the-art mobile infrastructure Needless to say, this amazing internet boom could technology provides its search portals yet another not have been possible without Korea’s advanced platform with a potentially vast market. The wide Sunbae Kim broadband environment. Meanwhile, Korean penetration of mobile phone, PDA and other wire- ICA President internet users, savvier than their counterparts else- less devices in the country has been accelerating where in the world, are also more demanding growth in its wireless portal market in recent years. when it comes to service quality. Korea’s hard-to- Many Korean portals, judging the time now ripe for please consumers were indeed instrumental in overseas expansion, are laying out the game plan. taking the country’s internet industry to its present Heavyweights like Naver and SK Communications heyday, providing sticks as well as carrots to spur have already opened or are in the process of R&D and force innovations in businesses.
    [Show full text]
  • Configuring 9600 Series SIP Telephones with Avaya Auratm Session Manager Release 6.0 and Avaya Auratm Communication Manager Evolution Server Release 6.0 – Issue 1.0
    Avaya Solution Interoperability Test Lab Configuring 9600 Series SIP Telephones with Avaya AuraTM Session Manager Release 6.0 and Avaya AuraTM Communication Manager Evolution Server Release 6.0 – Issue 1.0 Abstract These Application Notes describe the configuration of 9600 Series SIP Telephones with Avaya AuraTM Session Manager Release 6.0 supported by Avaya AuraTM Communication Manager Evolution Server Release 6.0. Avaya AuraTM Session Manager provides SIP proxy/routing functionality, routing SIP sessions across a TCP/IP network with centralized routing policies and registrations for SIP endpoints. Avaya AuraTM Communication Manager Evolution Server serves as an Evolution Server within the Avaya Aura™ Session Manager architecture and supports the SIP endpoints registered to Avaya AuraTM Session Manager. These Application Notes provide information for the setup, configuration, and verification of the call flows tested on this solution. DJH Reviewed: Solution Interoperability Lab Application Notes 1 of 51 SPOC 10/1/2010 ©2010 Avaya Inc. All Rights Reserved. SM6_CM-ES_R6 Table of Contents: 1. Introduction ............................................................................................................. 4 2. Equipment and Software Validated......................................................................... 5 3. Configure Avaya AuraTM Communication Manager ................................................ 6 3.1. Verify System Capacities and Licensing ................................................................. 6 3.1.1.
    [Show full text]
  • INTERNET-DRAFT M. Ackermann Intended Status: Informational BCBS Michigan N
    INTERNET-DRAFT M. Ackermann Intended Status: Informational BCBS Michigan N. Elkins W. Jouris Inside Products Expires: April 2014 October 3, 2013 Usage of NTP for the PDM DOH IPv6 Extension Header draft-ackermann-tictoc-pdm-ntp-usage-00 Abstract The Performance and Diagnostic Metrics (PDM) Destination Options Header (DOH) for IPv6 defines metrics which are critical for timely end-to-end problem resolution, without impacting an operational production network. These metrics and their derivations can be used for network diagnostics. The base metrics are: packet sequence number and packet timestamp. The timestamp fields require time synchronization at the two end points. This document provides implementation guidelines for implementing Network Time Protocol (NTP) to provide such synchronization. Status of this Memo This Internet-Draft is submitted to IETF in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet-Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." The list of current Internet-Drafts can be accessed at http://www.ietf.org/1id-abstracts.html The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html Ackermann Expires April, 2014 [Page 1] INTERNET DRAFT -ackermann-tictoc-pdm-ntp-usage-00 October 2013 Copyright and License Notice Copyright (c) 2013 IETF Trust and the persons identified as the document authors.
    [Show full text]
  • The Application Usage and Risk Report an Analysis of End User Application Trends in the Enterprise
    The Application Usage and Risk Report An Analysis of End User Application Trends in the Enterprise 8th Edition, December 2011 Palo Alto Networks 3300 Olcott Street Santa Clara, CA 94089 www.paloaltonetworks.com Table of Contents Executive Summary ........................................................................................................ 3 Demographics ............................................................................................................................................. 4 Social Networking Use Becomes More Active ................................................................ 5 Facebook Applications Bandwidth Consumption Triples .......................................................................... 5 Twitter Bandwidth Consumption Increases 7-Fold ................................................................................... 6 Some Perspective On Bandwidth Consumption .................................................................................... 7 Managing the Risks .................................................................................................................................... 7 Browser-based Filesharing: Work vs. Entertainment .................................................... 8 Infrastructure- or Productivity-Oriented Browser-based Filesharing ..................................................... 9 Entertainment Oriented Browser-based Filesharing .............................................................................. 10 Comparing Frequency and Volume of Use
    [Show full text]
  • List of TCP and UDP Port Numbers - Wikipedia, the Free Encyclopedia 6/12/11 3:20 PM
    List of TCP and UDP port numbers - Wikipedia, the free encyclopedia 6/12/11 3:20 PM List of TCP and UDP port numbers From Wikipedia, the free encyclopedia (Redirected from TCP and UDP port numbers) This is a list of Internet socket port numbers used by protocols of the Transport Layer of the Internet Protocol Suite for the establishment of host-to-host communications. Originally, these port numbers were used by the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP), but are used also for the Stream Control Transmission Protocol (SCTP), and the Datagram Congestion Control Protocol (DCCP). SCTP and DCCP services usually use a port number that matches the service of the corresponding TCP or UDP implementation if they exist. The Internet Assigned Numbers Authority (IANA) is responsible for maintaining the official assignments of port numbers for specific uses.[1] However, many unofficial uses of both well-known and registered port numbers occur in practice. Contents 1 Table legend 2 Well-known ports: 0–1023 3 Registered ports: 1024–49151 4 Dynamic, private or ephemeral ports: 49152–65535 5 See also 6 References 7 External links Table legend Color coding of table entries Official Port/application combination is registered with IANA Unofficial Port/application combination is not registered with IANA Conflict Port is in use for multiple applications (may be official or unofficial) Well-known ports: 0–1023 The port numbers in the range from 0 to 1023 are the well-known ports. They are used by system processes that provide widely-used types of network services.
    [Show full text]
  • A Framework for Designing Cryptographic Key Management Systems
    NIST Special Publication 800-130 A Framework for Designing Cryptographic Key Management Systems Elaine Barker Miles Smid Dennis Branstad Santosh Chokhani C O M P U T E R S E C U R I T Y NIST Special Publication 800-130 A Framework for Designing Cryptographic Key Management Systems Elaine Barker Computer Security Division Information Technology Laboratory Miles Smid Orion Security Solutions Silver, Spring, MD Dennis Branstad NIST Consultant Austin, TX Santosh Chokhani Cygnacom McLean, VA August 2013 U.S. Department of Commerce Penny Pritzker, Secretary National Institute of Standards and Technology Patrick D. Gallagher, Under Secretary of Commerce for Standards and Technology and Director SP 800-130 August 2013 Authority This publication has been developed by NIST to further its statutory responsibilities under the Federal Information Security Management Act (FISMA), Public Law (P.L.) 107-347. NIST is responsible for developing information security standards and guidelines, including minimum requirements for Federal information systems, but such standards and guidelines shall not apply to national security systems without the express approval of appropriate Federal officials exercising policy authority over such systems. This guideline is consistent with the requirements of the Office of Management and Budget (OMB) Circular A-130, Section 8b(3), Securing Agency Information Systems, as analyzed in Circular A-130, Appendix IV: Analysis of Key Sections. Supplemental information is provided in Circular A-130, Appendix III, Security of Federal Automated Information Resources. Nothing in this publication should be taken to contradict the standards and guidelines made mandatory and binding on Federal agencies by the Secretary of Commerce under statutory authority.
    [Show full text]
  • IT Acronyms.Docx
    List of computing and IT abbreviations /.—Slashdot 1GL—First-Generation Programming Language 1NF—First Normal Form 10B2—10BASE-2 10B5—10BASE-5 10B-F—10BASE-F 10B-FB—10BASE-FB 10B-FL—10BASE-FL 10B-FP—10BASE-FP 10B-T—10BASE-T 100B-FX—100BASE-FX 100B-T—100BASE-T 100B-TX—100BASE-TX 100BVG—100BASE-VG 286—Intel 80286 processor 2B1Q—2 Binary 1 Quaternary 2GL—Second-Generation Programming Language 2NF—Second Normal Form 3GL—Third-Generation Programming Language 3NF—Third Normal Form 386—Intel 80386 processor 1 486—Intel 80486 processor 4B5BLF—4 Byte 5 Byte Local Fiber 4GL—Fourth-Generation Programming Language 4NF—Fourth Normal Form 5GL—Fifth-Generation Programming Language 5NF—Fifth Normal Form 6NF—Sixth Normal Form 8B10BLF—8 Byte 10 Byte Local Fiber A AAT—Average Access Time AA—Anti-Aliasing AAA—Authentication Authorization, Accounting AABB—Axis Aligned Bounding Box AAC—Advanced Audio Coding AAL—ATM Adaptation Layer AALC—ATM Adaptation Layer Connection AARP—AppleTalk Address Resolution Protocol ABCL—Actor-Based Concurrent Language ABI—Application Binary Interface ABM—Asynchronous Balanced Mode ABR—Area Border Router ABR—Auto Baud-Rate detection ABR—Available Bitrate 2 ABR—Average Bitrate AC—Acoustic Coupler AC—Alternating Current ACD—Automatic Call Distributor ACE—Advanced Computing Environment ACF NCP—Advanced Communications Function—Network Control Program ACID—Atomicity Consistency Isolation Durability ACK—ACKnowledgement ACK—Amsterdam Compiler Kit ACL—Access Control List ACL—Active Current
    [Show full text]