TECHNICAL NOTE. Oracle Protocol Agent Overview. Version 2.5 TECN04_SG2.5_

Size: px
Start display at page:

Download "TECHNICAL NOTE. Oracle Protocol Agent Overview. Version 2.5 TECN04_SG2.5_"

Transcription

1 Version 2.5 TECHNICAL NOTE Oracle Protocol Agent Overview Stonesoft Corp. Itälahdenkatu 22A, FIN Helsinki Finland Tel (9) Fax (9) Copyright 2002 Stonesoft Corp. All rights reserved. All trademarks or registered trademarks are property of their respective owners.

2 Protocol Overview Oracle is a well-scalable (up to large enterprise systems) SQL-based Relational Database Management System (RDBMS) produced and marketed by Oracle Corporation. Oracle s networking technology Oracle Net8 (called SQL*Net prior to Oracle8) facilitates the use of Oracle services across multiple network protocols (like IP) and operating systems. Oracle Net8 is available for at least the following platforms: Microsoft Windows 95/98 (client only) Microsoft Windows NT (client and server) Solaris for Sun SPARC (client and server) Linux (client and server) HP-UX (client and server) IBM AIX (client and server) Caldera SCO UnixWare (client and server) Because this document focuses on topics affecting firewalling issues, it does not intend to cover the overall communication scheme in Oracle environments. The reader is assumed to be familiar with the documentation of Oracle Server and Oracle Corporation's support services like Oracle Technology Network (OTN) and Oracle MetaLink SM. Documentation of the Protocol Oracle Corporation has not published specification of the SQL*Net protocol. Information about communication model and configuring is available on Oracle Technology Network (OTN). Useful references: Oracle Technology Network: otn.oracle.com Oracle MetaLink Support Services: metalink.oracle.com Oracle Net8 FAQ: TECHNICAL NOTE 2

3 SQL*Net, Net7 and Net8 SQL*Net is Oracle's client/server middleware product that offers a transparent connection from client tools to the database or from one database to another. SQL*Net v2 is the basic communication software for Oracle 7 servers. Users have many options for allowing client access to Oracle7 servers via SQL*Net v2.x. Net8 is the successor to SQL*Net v2. Net8 is fully backward compatible, over the wire, with all the currently supported production releases of SQL*Net v2.x. Net8 clients can interact with either SQL*Net v2 or Net8 services. SQL*Net v2 clients can interact with Net8 services. The Net8 Listener supports both Oracle7 and Oracle8 databases allowing only one listener per node. TNS Protocol TNS (Transparent Network Substrate) is Oracle's networking architecture. TNS provides a uniform application interface to enable network applications to access the underlying network protocols transparently. The TNS architecture consists of three software components: TNS-based applications, Oracle Protocol Adapters, and networking software like TCP/IP. A TNS message is divided into two logical parts of variable lengths: binary type header and payload part. The header is in network byte order. The length of the header depends on the version of SQL*Net and it is not directly stored in the message. The length of the payload part is stored in the header. In most cases the payload part is in ASCII format. Oracle Application Proxies Some other firewall vendors also offer the Net8 Firewall Proxy function in their firewall. The Net8 Firewall Proxy has the same functionality as the Oracle Connection Manager. Oracle JServer and GIOP service Clients use the General Inter-ORB Protocol (GIOP) connection communicating with Oracle JServer. TECHNICAL NOTE 3

4 Communication Model Components Communication between an Oracle client and a server has three components (see Figure 1.1) concerning a firewall: client, Oracle Listener and Oracle database (the client wants to connect to). FIGURE 1.1 Communication components Client StoneGate Listener Database From StoneGate's point of view a client can be any kind of application communicating with a Listener by TNS protocol over TCP. Listener is an application that negotiates with the client how a database connection can be opened. Database is a service that is identified by an alias. Clients use aliases to access databases. Usually, there is an instance of a Listener running in the server providing Oracle database services. Thus, it cannot be presumed that also the database connection tries to pass a firewall, if a Listener connection has succeeded in it. Communication Process There are two main types of connections that may go through the firewall. At first, a client opens a Listener connection and sends a request for a database connection to it. The client can store its IP address or host name in the request. After receiving a response from the Listener, the client can close the connection and open a new connection to the database depending on the response. TECHNICAL NOTE 4

5 From the firewall's point of view, there are two alternative communication models: database connection redirection (see Figure 1.2) and dispatching (see Figure 1.3). On UNIX systems, the Listener process will fork a new Oracle process to deal with the new incoming connection. With UNIX, forked processes will inherit the resources of the parent process, in other words: file handles and TCP sockets. With earlier releases of SQL*Net for Windows NT, there is no capability of sharing a TCP socket between two processes and no way to inherit a TCP socket. To work around this restriction the main Oracle process creates a new thread of execution and thus, a local connection is made between the Listener and this new thread. The newly created database thread dynamically selects a new TCP port to use for the connection request and informs the Listener of the new port to be used. The Listeners requests the client to redirect the connection to this port. Listener Connection A client opens the Listener connection typically to destination port 1521 (with SQL*Net v1 to port 1525). Transport level protocol is TCP either plain or SSL encrypted. Payload data contains TNS messages, and the first TNS message (after the TCP handshake ) goes from the client to Listener. FIGURE 1.2 Database connection redirection Listener Client 1 StoneGate 2 3 Database 4 When the Listener is configured to use connection redirection (as in Figure 1.2), it responds to the client's request (phase 1) with an ANSWER message (phase 2). The text part of this response contains the IP address and a dynamically selected destination port number of the requested database service. After receiving the response client closes the Listener connection and tries to open a database connection (phase 3) to the negotiated address. TECHNICAL NOTE 5

6 Note: The negotiated database address is not necessarily behind the same firewall. FIGURE 1.3 Database connection dispatching Client 1, 5 StoneGate 4, 8 Listener Database 2, 6 3, 7 In database connection dispatching (Figure 1.3), a client does not open a separate connection to the database. Instead, the Listener communicates directly with the database and relays messages between the client and the database. When the Listener receives a request (phase 1) from a client, it checks the availability of the requested database service (phases 2 and 3) and responds to the client by an ACCEPT message (phase 4), which indicates connection dispatching. Typically, the Listener sends a RESEND message back to the client to get some time for checking the database service but still avoiding timeout on the client side. After detecting the RESEND message, the client sends same request again to the Listener. When the client has seen an ACCEPT message, the actual database communication takes place by DATA messages (phases 5, 6, 7 and 8). Database Connection A client opens a separate database connection directly to a dynamically selected destination port of the database server (in redirection mode). The source port of the connection is dynamic as well. The specification of this database connection is not known, but it is not used to negotiate other related connections. TECHNICAL NOTE 6

7 Useful Tools Sql*plus SQL*Plus is a command line SQL and PL/SQL language interface and reporting tool that ships with the Oracle Database Server. It can be used interactively or driven from scripts. The predecessor for SQL*Plus was called UFI (User Friendly Interface). UFI was included in the first releases of Oracle, its interface was primitive and not very user-friendly. Tnsping Tnsping is a command line utility, which determines whether or not a Listener is reachable. It, however, never actually connects with the Listener. A socket is never created and opened. It only checks to ascertain that a Listener is present on the server side. When one connects to a Listener using Tnsping, an estimate of the round trip time (RTT) in milliseconds appears. If Tnsping fails, a network error message appears without the resource use of a database connection. TOAD TOAD is Windows based software called a Tool for Oracle Application Developers. It is developed by Toadsoft company ( Toad is used, e.g., for generating many kinds of traffic between a client and a database. TECHNICAL NOTE 7

8 Protocol Agent Description This document refers to the Oracle TNS Protocol Agent delivered with StoneGate Engine version and later. The Usage of the PA The Oracle TNS PA is needed for Listener connections if any of following cases occurs: An IP address of a client is NATed (source NAT of the Listener connection) An IP address of a Listener is NATed (destination NAT of the Listener connection) The length of TNS messages is limited The number of addresses of database services where clients are allowed to connect is limited A Listener uses redirection of database connection (negotiation of related connection). This has been found to take place only when Oracle Server is run on Windows NT with WinSock API v Differences between SQL*Net Proxy and the PA The SQL*Net Proxy, provided by Oracle Corp., acts as an userspace proxy, but the Oracle TNS PA runs on kernel space as a non-proxy. Therefore the PA reaches the high performance and throughput, which can be important in case the Listener is not using connection redirection. The Oracle TNS PA supports all the common features of StoneGate engine, i.e. HA, NAT and load balancing. The Oracle TNS PA is fully transparent to the Oracle client, to the Listener and to the database server. The Oracle TNS PA is a stateful component and it sees all the connection data, both as a TCP stream and as individual packets. The Oracle TNS PA has security features, (e.g. the configurable limitation of the network), from where clients can connect the database. Operation The Oracle TNS PA has four main functions: Allowing a database connection through the firewall, if negotiated by a client and a Listener TECHNICAL NOTE 8

9 Modifying payload data of the Listener connection due to NAT Performing minimal protocol sanity checking Performing message length and database address verifying when configured. The Protocol Agent appears fully transparent both to a client and a Listener. The data of the Listener connection remains unchanged when NAT is not used for it. NAT modifications are directed only to CONNECT and ANSWER type TNS messages. Protocol Validation One TNS message can be divided to one or several TCP data stream portions. The PA uses a value of the TNS header field Packet Length to recognise message boundaries. Every TNS message has to contain valid binary header of 8 bytes. Request validation The PA recognises a TNS message to be a valid connection request, if: it is sent by the client type of the message is CONNECT. Response validation The PA recognises a TNS message to be a valid response, if: it is sent by the Listener type of the message is either ACCEPT or ANSWER. Database Connection Opening The PA allows a related database connection to open through the firewall when: a valid ANSWER type response is recognized the response contains HOST and PORT fields in the payload part the database address is allowed in the PA's configuration. TECHNICAL NOTE 9

10 A database connection is allowed to open from the same IP address as the client used in the Listener connection, but the client can use any source port. The database connection is allowed to open to an IP address in the HOST field and to port in the PORT field. If the HOST field contains host name instead of a plain IP address as a value, the PA generates an error to log and does not allow the data connection to open. NAT Modifications to Payload Data The PA modifies the payload data of a Listener connection in two cases: If destination NAT is applied to a Listener connection and a client stores Listener's IP address in a connection request, the PA changes a non-nated IP to a NATed one. Also, if the checksums of a TNS message are in use (greater than zeroes), the PA restores them to zeroes depending on the configuration of the PA. If a Listener suggests connection redirection to a connected Listener's IP address and this IP is destination NATed, the PA changes the non-nated IP to a NATed one. Also, if the checksums of a TNS message are in use (greater than zeroes), the PA restores them to zeroes depending on the configuration of the PA. Exceptions, Limitations and Assumptions Following general limitations have to be taken into account, if a Listener uses connection redirection: The Listener has to be configured to use IP addresses instead of host names, if a database connection is to open through the firewall. A client has to use same IP address as the source address of both the Listener and a database connection using, if the database connection is to open through the firewall. Database location and destination NAT When a database is running on a different host than the Listener and the address of the database is NATed, the Listener has to respond with the type of (non-nated) IP address to which the client can connect from the other side of the firewall. TECHNICAL NOTE 10

11 Checksums of TNS messages The PA leaves checksums of a TNS message unchanged after modification of the message data. When checksums are in use, it is recommended to configure the PA to reset checksums to zeroes after message modification. Net7 and TNS message splicing Most Net7 clients send at least data connection requests spliced into two parts (TCP stream portions). If the IP address of the database to be connected is destination NATed, the Oracle PA has to make modifications to both parts of the request message: to message length field in the first part and to database IP address in the second one. The PA has to delay the first part, because a new message length cannot be solved before analyzing the second part. Delaying means removing all TCP payload data from the first part and letting this empty TCP packet go on to the Listener. When the PA has got and modified the second part, it attaches data removed from the first packet to the beginning and allow whole message go to the Listener. As a result of this operation the whole request message arrives to Listener in one part. Net7, Windows NT and destination NAT Connections from Oracle Net7 client to Oracle Listener on Windows NT 4 cannot be destination NATed. Host Names in listener configuration The PA cannot process unresolved host names in Listener responses, and due to that a separate database connection cannot pass the firewall. In this case, the PA generates a log entry but does not drop the Listener connection. A Listener should be configured to answer plain IP addresses to clients to in order to avoid this problem. Security Benefits Oracle PA performs only minimal checking to payload data of the connection, because there is no official description of the TNS protocol available. TECHNICAL NOTE 11

12 Security benefits can be achieved by the use of two configuration parameters, which limit the length of TNS packets and the destination addresses of the separate database connection. Solving Typical Problems When running into a problem with Oracle PA, following actions should be performed to help an inspection: In which port a Listener is waiting for client connections? Typically the port is Check that the destination port in the rule allowing Listener connections is correct. Does the Listener use host names instead of plain IP addresses? In this case, change host names to IP addresses or ensure that the Listener can access a DNS server. Does the Listener propose to open a separate connection to the database? If it does not, try not to use the PA with Listener connections. Does the Listener use plain TCP instead of encrypted SSL connections? If it does not, change the connection type to normal TCP in Listener configuration. If the actions do not help to solve a problem, try to collect the following information: Switch Protocol Agents to diagnostic mode and check what kind of information appears to the log. What versions of Oracle client and server is used and on which platforms? Between which ports the Oracle client tries to open a separate database connection? Check the availability of the Listener using tnsping command line utility on the client side. Does the Listener run on same host than the database to be connected? What kind of special client software (other than standard Oracle components) is used? Get a tcpdump of Listener connections (typically opening to port 1521) from both sides of the firewall. The tcpdump has to be stored in binary format for example by command: tcpdump -s w <output_file> -i<interface> -n port 1521 Performance The use of Oracle PA does not have any significant effect on the firewall's performance. The PA is attached to the Listener connection until it terminates, which induces a very small processing overhead for every type of TNS packet in the connection. TECHNICAL NOTE 12

13 Run-time memory usage of the PA is quite small. It allocates typically less than 128 bytes of memory space for every connection passing through. Fail-over transparency The Oracle PA implements all the normal high availability features of Protocol Agents, like connection fail-over between firewall nodes. In case of fail-over of a firewall node handling a redirected database connection, the Listener connection has to be reopened and negotiation has to take place to allow new database connection to pass through the firewall. Supported Environments The PA supports following Oracle environments: Oracle Net7 for Windows NT 4 Oracle Net8 for Windows NT 4 Oracle Net9 for Windows 2000 Server Oracle Net8 for Solaris v. 8 (Sun UltraSPARC 5) Oracle Net8 for Linux. Configuration of the PA Oracle PA supports following three configuration parameters. Maximum length of TNS packets The parameter limits the maximum length of TNS messages (measured as the length of TCP payload data). It is recommended to set this parameter only when a Listener uses database connection redirection, because in this case the PA is not handling packets containing actual database information. TABLE 1.1 Maximum length of TNS packets Parameter type integer Valid values Default value 4096 TECHNICAL NOTE 13

14 TNS packet checksum clearing This parameter affects handling of the checksum of a plain header and the whole message when the contents of the TNS message is modified by the PA due to NAT. Special value 0 means that the checksum is not calculated and it should not be used to check the integrity of a TNS message. The Oracle PA cannot recalculate checksums, if they are in use in a modified message. In this case the parameter can be used to force the PA to reset checksums to zero. However, the effect of this feature on Oracle components is unknown. TABLE 1.2 TNS packet checksum clearing Parameter type Valid values Default value string yes, no yes Allowed addresses of database connections This parameter limit destination addresses where a client can open separate database connection. TABLE 1.3 Allowed addresses of database connections Parameter type Valid values IP address network masks in form n.n.n.n Default value Known Issues Oracle Server in HP-UX Oracle Listener runs in HP-UX has been found to act in an exceptional way when communicating with a client. The Listener can also send CONNECT type messages to the client. These messages do not contain an ASCII part, because they are obviously not used to negotiate end points of a new connection. TECHNICAL NOTE 14

15 Socket Sharing in Windows Some releases of SQL*Net for Windows NT use the Winsock API version 1.1, which does not have the capability to share a TCP socket between the Listener process and database process. To avoid this problem the Listener uses database connection redirection. Connection redirection can be avoided by changing an NT's system registry, if the Winsock API is of version 2.0 or later. A new parameter of type REG_EXPAND_SZ can be created under the path HKEY_LOCAL_MACHINE\Software\Oracle\<home>. The name of this parameter is USE_SHARED_SOCKET and value is TRUE. If the Oracle server manages several home structures, this parameter has to be created for each home path into the system registry. TECHNICAL NOTE 15

Configuring Inspection of Database and Directory Protocols

Configuring Inspection of Database and Directory Protocols CHAPTER 43 Configuring Inspection of Database and Directory Protocols This chapter describes how to configure application layer protocol inspection. Inspection engines are required for services that embed

More information

Intro to LAN/WAN. Transport Layer

Intro to LAN/WAN. Transport Layer Intro to LAN/WAN Transport Layer Transport Layer Topics Introduction (6.1) Elements of Transport Protocols (6.2) Internet Transport Protocols: TDP (6.5) Internet Transport Protocols: UDP (6.4) socket interface

More information

TECHNICAL NOTE. Switch Compatibility with Stonesoft Cluster Products

TECHNICAL NOTE. Switch Compatibility with Stonesoft Cluster Products TECHNICAL NOTE Switch Compatibility with Stonesoft Cluster Products Copyright 2000 2003 Stonesoft Corp. All rights reserved. All trademarks or registered trademarks are property of their respective owners.

More information

OpenEdge Developers Kit

OpenEdge Developers Kit OpenEdge Developers Kit The OpenEdge Developers Kit (OEDK) includes the latest Major release of OpenEdge development products. The additional content varies according to the Edition to which you have subscribed

More information

StoneGate Management Center Release Notes for Version 4.2.1

StoneGate Management Center Release Notes for Version 4.2.1 StoneGate Management Center Release Notes for Version 4.2.1 Created: July 24, 2008 Table of Contents What s New... 3 System Requirements... 4 Build Version... 5 Compatibility... 5 Installation Instructions...

More information

STONEBEAT RELEASE NOTES WebCluster 2.5 Build 2549 Service Pack 8-4

STONEBEAT RELEASE NOTES WebCluster 2.5 Build 2549 Service Pack 8-4 STONEBEAT RELEASE NOTES WebCluster 2.5 Build 2549 Service Pack 8-4 April 4, 2004 Stonesoft Corporation Itälahdenkatu 22 A FIN-00210 HELSINKI FINLAND Copyright 1996-2004 Stonesoft Corporation All Rights

More information

TFTP and FTP Basics BUPT/QMUL

TFTP and FTP Basics BUPT/QMUL TFTP and FTP Basics BUPT/QMUL 2017-04-24 Agenda File transfer and access TFTP (Trivial File Transfer Protocol) FTP (File Transfer Protocol) NFS (Network File System) 2 File Transfer And Access 3 File Transfer

More information

6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1

6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1 6. Transport Layer 6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1 6.1 Internet Transport Layer Architecture The

More information

Stonesoft Management Center. Release Notes for Version 5.6.1

Stonesoft Management Center. Release Notes for Version 5.6.1 Stonesoft Management Center Release Notes for Version 5.6.1 Updated: January 9, 2014 Table of Contents What s New... 3 Fixes... 3 System Requirements... 6 Basic Management System Hardware Requirements...

More information

Chapter 6. What happens at the Transport Layer? Services provided Transport protocols UDP TCP Flow control Congestion control

Chapter 6. What happens at the Transport Layer? Services provided Transport protocols UDP TCP Flow control Congestion control Chapter 6 What happens at the Transport Layer? Services provided Transport protocols UDP TCP Flow control Congestion control OSI Model Hybrid Model Software outside the operating system Software inside

More information

StoneGate Management Center. Release Notes for Version 4.0.1

StoneGate Management Center. Release Notes for Version 4.0.1 StoneGate Management Center Release Notes for Version 4.0.1 Table of Contents What s New................................. page 3 System Requirements......................... page 6 Build Version...............................

More information

OpenEdge Developers Kit

OpenEdge Developers Kit Developers Kit The Developers Kit (OEDK) includes the latest Major release of development products. The additional content varies according to the Edition to which you have subscribed and may cover all

More information

Stonesoft Firewall/VPN Express. Release Notes for Version 5.5.7

Stonesoft Firewall/VPN Express. Release Notes for Version 5.5.7 Stonesoft Firewall/VPN Express Release Notes for Version 5.5.7 Created: April 9, 2014 Table of Contents What s New... 3 Fixes... 3 System Requirements... 5 Stonesoft Firewall/VPN Appliances... 5 Build

More information

User Datagram Protocol

User Datagram Protocol Topics Transport Layer TCP s three-way handshake TCP s connection termination sequence TCP s TIME_WAIT state TCP and UDP buffering by the socket layer 2 Introduction UDP is a simple, unreliable datagram

More information

Configuring the Oracle Network Environment. Copyright 2009, Oracle. All rights reserved.

Configuring the Oracle Network Environment. Copyright 2009, Oracle. All rights reserved. Configuring the Oracle Network Environment Objectives After completing this lesson, you should be able to: Use Enterprise Manager to: Create additional listeners Create Oracle Net Service aliases Configure

More information

Avaya Port Matrix: Avaya Proprietary Use pursuant to the terms of your signed agreement or Avaya policy.

Avaya Port Matrix: Avaya Proprietary Use pursuant to the terms of your signed agreement or Avaya policy. Avaya Matrix: Release 3.0 Issue 2 April 2016 April 2016 Avaya Matrix: 3.0 1 ALL INFORMATION IS BELIEVED TO BE CORRECT AT THE TIME OF PUBLICATION AND IS PROVIDED "AS IS". AVAYA INC. DISCLAIMS ALL WARRANTIES,

More information

Outline. What is TCP protocol? How the TCP Protocol Works SYN Flooding Attack TCP Reset Attack TCP Session Hijacking Attack

Outline. What is TCP protocol? How the TCP Protocol Works SYN Flooding Attack TCP Reset Attack TCP Session Hijacking Attack Attacks on TCP Outline What is TCP protocol? How the TCP Protocol Works SYN Flooding Attack TCP Reset Attack TCP Session Hijacking Attack TCP Protocol Transmission Control Protocol (TCP) is a core protocol

More information

Oracle Fusion Middleware

Oracle Fusion Middleware Oracle Fusion Middleware Quick Installation Guide for Oracle Identity Management 11g Release 1 (11.1.1) E10033-01 May 2009 This guide is designed to help you quickly install the most common Oracle Identity

More information

Configuring Advanced Firewall Settings

Configuring Advanced Firewall Settings Configuring Advanced Firewall Settings This section provides advanced firewall settings for configuring detection prevention, dynamic ports, source routed packets, connection selection, and access rule

More information

Configuring Virtual Servers

Configuring Virtual Servers 3 CHAPTER This section provides an overview of server load balancing and procedures for configuring virtual servers for load balancing on an ACE appliance. Note When you use the ACE CLI to configure named

More information

OpenEdge Developers Kit

OpenEdge Developers Kit OpenEdge Developers Kit The OpenEdge Developers Kit (OEDK) includes the Major release of OpenEdge development products. The additional content varies according to the Edition to which you have subscribed

More information

the Corba/Java Firewall

the Corba/Java Firewall Firewall Security for Corba and J2EE/EJB with the IIOP Domain Boundary Controller Corba and Java-RMI based applications can be directly and securely made accessible to users outside the internal network,

More information

Politecnico di Milano Scuola di Ingegneria Industriale e dell Informazione. 09 Intranetting. Fundamentals of Communication Networks

Politecnico di Milano Scuola di Ingegneria Industriale e dell Informazione. 09 Intranetting. Fundamentals of Communication Networks Politecnico di Milano Scuola di Ingegneria Industriale e dell Informazione 09 Intranetting Fundamentals of Communication Networks 1 Private networks and Intranets EG subnet IG IG Private network IG o Private

More information

Avaya Proprietary Use pursuant to the terms of your signed agreement or Avaya policy.

Avaya Proprietary Use pursuant to the terms of your signed agreement or Avaya policy. Matrix Equinox 3.0 Issue 1.0 December 15, 2016 Proprietary Use pursuant to the terms of your signed agreement or policy. December 2016 Matrix: Equinox 3.0 1 ALL INFORMATION IS BELIEVED TO BE CORRECT AT

More information

StoneGate SSL VPN. Release Notes for Version 1.4.5

StoneGate SSL VPN. Release Notes for Version 1.4.5 StoneGate SSL VPN Release Notes for Version 1.4.5 Created: March 3, 2011 Table of Contents What s New... 3 Enhancements... 3 Fixes... 3 System Requirements... 4 StoneGate Appliances... 4 Build Version...

More information

Chapter 5.6 Network and Multiplayer

Chapter 5.6 Network and Multiplayer Chapter 5.6 Network and Multiplayer Multiplayer Modes: Event Timing Turn-Based Easy to implement Any connection type Real-Time Difficult to implement Latency sensitive 2 Multiplayer Modes: Shared I/O Input

More information

T-Server Fundamentals

T-Server Fundamentals This chapter provides general information about T-Server features and functionality and about its configuration and installation. Generally, this chapter presents overview information that applies to all

More information

Configuring Answers and Answer Groups

Configuring Answers and Answer Groups CHAPTER 6 Configuring Answers and Answer Groups This chapter describes how to create and configure answers and answer groups for your GSS network. It contains the following major sections: Configuring

More information

Configuring Answers and Answer Groups

Configuring Answers and Answer Groups CHAPTER 6 This chapter describes how to create and configure answers and answer groups for your GSS network. It contains the following major sections: Configuring and Modifying Answers Configuring and

More information

Stonesoft Firewall/VPN Express. Release Notes for Version 5.5.2

Stonesoft Firewall/VPN Express. Release Notes for Version 5.5.2 Stonesoft Firewall/VPN Express Release Notes for Version 5.5.2 Created: September 24, 2013 Table of Contents What s New... 3 Fixes... 3 System Requirements... 4 Stonesoft Firewall/VPN Appliances... 4 Build

More information

Oracle8i. Release Notes

Oracle8i. Release Notes Oracle8i Release Notes Release 3 (8.1.7) for Intel UNIX (DG/UX Intel and SCO UnixWare) April 2001 A88736-01 These release notes contain important last minute information not included in the documentation

More information

Cisco Expressway with Jabber Guest

Cisco Expressway with Jabber Guest Cisco Expressway with Jabber Guest Deployment Guide First Published: Decemeber 2016 Cisco Expressway X8.9 Cisco Jabber Guest Server 10.6.9 (or later) Cisco Systems, Inc. www.cisco.com Contents Preface

More information

Extending the Domino System. Powered by Notes. The First Groupware and Server for the Net R E L E A S E

Extending the Domino System. Powered by Notes. The First Groupware and  Server for the Net R E L E A S E Extending the Domino System Powered by Notes The First Groupware and E-mail Server for the Net R E L E A S E COPYRIGHT Under the copyright laws, neither the documentation nor the software may be copied,

More information

StoneGate Management Center. Release Notes for Version 4.1.2

StoneGate Management Center. Release Notes for Version 4.1.2 StoneGate Management Center Release Notes for Version 4.1.2 Table of Contents What s New........................... page 3 System Requirements................... page 8 Build Version.........................

More information

Configuring NAT for IP Address Conservation

Configuring NAT for IP Address Conservation This module describes how to configure Network Address Translation (NAT) for IP address conservation and how to configure inside and outside source addresses. This module also provides information about

More information

Q.1. (a) [4 marks] List and briefly explain four reasons why resource sharing is beneficial.

Q.1. (a) [4 marks] List and briefly explain four reasons why resource sharing is beneficial. Q.1. (a) [4 marks] List and briefly explain four reasons why resource sharing is beneficial. Reduces cost by allowing a single resource for a number of users, rather than a identical resource for each

More information

HP Load Balancing Module

HP Load Balancing Module HP Load Balancing Module Load Balancing Configuration Guide Part number: 5998-4218 Software version: Feature 3221 Document version: 6PW100-20130326 Legal and notice information Copyright 2013 Hewlett-Packard

More information

DQpowersuite. Superior Architecture. A Complete Data Integration Package

DQpowersuite. Superior Architecture. A Complete Data Integration Package DQpowersuite Superior Architecture Since its first release in 1995, DQpowersuite has made it easy to access and join distributed enterprise data. DQpowersuite provides an easy-toimplement architecture

More information

ECE 650 Systems Programming & Engineering. Spring 2018

ECE 650 Systems Programming & Engineering. Spring 2018 ECE 650 Systems Programming & Engineering Spring 2018 Networking Transport Layer Tyler Bletsch Duke University Slides are adapted from Brian Rogers (Duke) TCP/IP Model 2 Transport Layer Problem solved:

More information

Finding Feature Information

Finding Feature Information This module describes how to configure Network Address Translation (NAT) for IP address conservation and how to configure inside and outside source addresses. This module also provides information about

More information

Resonate Central Dispatch User Guide. Version 3.3

Resonate Central Dispatch User Guide. Version 3.3 Resonate Central Dispatch User Guide Version 3.3 Copyright 1996 2000 Resonate, Inc. All rights reserved. Resonate Incorporated and its licensors retain all ownership rights to the Central Dispatch computer

More information

The Transport Layer. Internet solutions. Nixu Oy PL 21. (Mäkelänkatu 91) Helsinki, Finland. tel fax.

The Transport Layer. Internet solutions. Nixu Oy PL 21. (Mäkelänkatu 91) Helsinki, Finland. tel fax. The Transport Layer Nixu Oy PL 21 (Mäkelänkatu 91) 00601 Helsinki, Finland tel. +358 9 478 1011 fax. +358 9 478 1030 info@nixu.fi http://www.nixu.fi OVERVIEW User Datagram Protocol Transmission Control

More information

Version 2.0 HOW-TO GUIDELINES. Setting up a Clustered VPN between StoneGate and Check Point NG TECHN11SG2.1-3/4/03

Version 2.0 HOW-TO GUIDELINES. Setting up a Clustered VPN between StoneGate and Check Point NG TECHN11SG2.1-3/4/03 Version 2.0 HOW-TO GUIDELINES Setting up a Clustered VPN between StoneGate and Check Point NG TECHN11SG2.1-3/4/03 Introduction This document outlines the steps necessary to set up a clustered site-to-site

More information

Avaya Port Matrix: Avaya Aura Appliance Virtualization Platform 7.0

Avaya Port Matrix: Avaya Aura Appliance Virtualization Platform 7.0 Avaya Port Matrix: Avaya Aura Appliance Virtualization Platform 7.0 Issue 1.0 August 24, 2015 August 2015 Avaya Port Matrix: Avaya Aura Appliance Virtualization Platform 7.0 1 ALL INFORMATION IS BELIEVED

More information

4. Basic IP Support Protocols

4. Basic IP Support Protocols 4. Basic IP Support Protocols There are a number of protocols that support the operation of IP. This section will only discuss the most basic three: ICMP, RARP, and ARP. Other more sophisticated protocols

More information

Load Balancing Microsoft IIS. Deployment Guide v Copyright Loadbalancer.org

Load Balancing Microsoft IIS. Deployment Guide v Copyright Loadbalancer.org Load Balancing Microsoft IIS Deployment Guide v1.6.4 Copyright Loadbalancer.org Table of Contents 1. About this Guide...4 2. Loadbalancer.org Appliances Supported...4 3. Loadbalancer.org Software Versions

More information

Arctic Modbus Gateway Configuration Manual

Arctic Modbus Gateway Configuration Manual Copyright and Trademark Copyright 2004, Viola Systems Ltd. All rights to this manual are owned solely by Viola Systems Ltd. (referred in this manual as Viola Systems). All rights reserved. No part of the

More information

Stonesoft Next Generation Firewall

Stonesoft Next Generation Firewall Stonesoft Next Generation Firewall Release Notes 6.1.3 Revision B Contents About this release on page 2 Lifecycle model on page 2 System requirements on page 3 Build version on page 6 Compatibility on

More information

Measuring MPLS overhead

Measuring MPLS overhead Measuring MPLS overhead A. Pescapè +*, S. P. Romano +, M. Esposito +*, S. Avallone +, G. Ventre +* * ITEM - Laboratorio Nazionale CINI per l Informatica e la Telematica Multimediali Via Diocleziano, 328

More information

Applied IT Security. System Security. Dr. Stephan Spitz 6 Firewalls & IDS. Applied IT Security, Dr.

Applied IT Security. System Security. Dr. Stephan Spitz 6 Firewalls & IDS. Applied IT Security, Dr. Applied IT Security System Security Dr. Stephan Spitz Stephan.Spitz@de.gi-de.com Overview & Basics System Security Network Protocols and the Internet Operating Systems and Applications Operating System

More information

StoneGate Management Center. Release Notes for Version 5.3.4

StoneGate Management Center. Release Notes for Version 5.3.4 StoneGate Management Center Release Notes for Version 5.3.4 Created: December 20, 2011 Table of Contents What s New... 3 Fixes... 3 Other Changes... 5 System Requirements... 6 Basic Management System Hardware

More information

Systemwalker Service Quality Coordinator. Technical Guide. Windows/Solaris/Linux

Systemwalker Service Quality Coordinator. Technical Guide. Windows/Solaris/Linux Systemwalker Service Quality Coordinator Technical Guide Windows/Solaris/Linux J2X1-6800-02ENZ0(00) November 2010 Preface Purpose of this manual This manual explains the functions and usage of Systemwalker

More information

Systemwalker Service Quality Coordinator. Technical Guide. Windows/Solaris/Linux

Systemwalker Service Quality Coordinator. Technical Guide. Windows/Solaris/Linux Systemwalker Service Quality Coordinator Technical Guide Windows/Solaris/Linux J2X1-6800-03ENZ0(00) May 2011 Preface Purpose of this manual This manual explains the functions and usage of Systemwalker

More information

McAfee Next Generation Firewall 5.9.1

McAfee Next Generation Firewall 5.9.1 Release Notes Revision A McAfee Next Generation Firewall 5.9.1 Contents About this release New features Enhancements Resolved issues Installation instructions Known issues Find product documentation About

More information

Foundations of Python

Foundations of Python Foundations of Python Network Programming The comprehensive guide to building network applications with Python Second Edition Brandon Rhodes John Goerzen Apress Contents Contents at a Glance About the

More information

StoneGate SSL VPN Release Notes for Version 1.2.0

StoneGate SSL VPN Release Notes for Version 1.2.0 StoneGate SSL VPN Release Notes for Version 1.2.0 Created: November 6, 2008 Table of Contents What s New... 3 System Requirements... 4 Build Version... 4 Product Binary Checksums... 4 Compatibility...

More information

ECE4110 Internetwork Programming. Introduction and Overview

ECE4110 Internetwork Programming. Introduction and Overview ECE4110 Internetwork Programming Introduction and Overview 1 EXAMPLE GENERAL NETWORK ALGORITHM Listen to wire Are signals detected Detect a preamble Yes Read Destination Address No data carrying or noise?

More information

StoneGate IPsec VPN Client Release Notes for Version 4.3.1

StoneGate IPsec VPN Client Release Notes for Version 4.3.1 StoneGate IPsec VPN Client Release Notes for Version 4.3.1 Created: October 13, 2008 Table of Contents What s New... 3 System Requirements... 4 Build Version... 4 Product Binary Checksums... 4 Compatibility...

More information

Extended Search Administration

Extended Search Administration IBM Lotus Extended Search Extended Search Administration Version 4 Release 0.1 SC27-1404-02 IBM Lotus Extended Search Extended Search Administration Version 4 Release 0.1 SC27-1404-02 Note! Before using

More information

What is New in Cisco ACE 4710 Application Control Engine Software Release 3.1

What is New in Cisco ACE 4710 Application Control Engine Software Release 3.1 What is New in Cisco ACE 4710 Application Control Engine Software Release 3.1 PB478675 Product Overview The Cisco ACE Application Control Engine 4710 represents the next generation of application switches

More information

Lecture 11: IP routing, IP protocols

Lecture 11: IP routing, IP protocols Lecture 11: IP routing, IP protocols Contents Routing principles Local datagram delivery ICMP Protocol UDP Protocol TCP/IP Protocol Assuring requirements for streaming TPC Building and terminating TCP

More information

K2289: Using advanced tcpdump filters

K2289: Using advanced tcpdump filters K2289: Using advanced tcpdump filters Non-Diagnostic Original Publication Date: May 17, 2007 Update Date: Sep 21, 2017 Topic Introduction Filtering for packets using specific TCP flags headers Filtering

More information

Stonesoft User Agent. Release Notes for Version 1.1.3

Stonesoft User Agent. Release Notes for Version 1.1.3 Stonesoft User Agent Release Notes for Version 1.1.3 Created: November 26, 2012 Table of Contents What s New... 3 Features... 3 Enhancements... 3 Fixes... 3 Changes... 4 System Requirements... 4 General

More information

Eduardo

Eduardo Eduardo Silva @edsiper eduardo@treasure-data.com About Me Eduardo Silva Github & Twitter Personal Blog @edsiper http://edsiper.linuxchile.cl Treasure Data Open Source Engineer Fluentd / Fluent Bit http://github.com/fluent

More information

Network Implementation

Network Implementation CS 256/456: Operating Systems Network Implementation John Criswell! University of Rochester 1 Networking Overview 2 Networking Layers Application Layer Format of Application Data Transport Layer Which

More information

Avaya Port Matrix: Avaya Communicator for Microsoft Lync 6.4. Avaya Proprietary Use pursuant to the terms of your signed agreement or Avaya policy.

Avaya Port Matrix: Avaya Communicator for Microsoft Lync 6.4. Avaya Proprietary Use pursuant to the terms of your signed agreement or Avaya policy. Matrix: for Microsoft Lync 6.4 Issue 1 July 28, 2015 Proprietary Use pursuant to the terms of your signed agreement or policy. July 2015 Matrix: for Microsoft Lync 1 ALL INFORMATION IS BELIEVED TO BE CORRECT

More information

Load Balancing Bloxx Web Filter. Deployment Guide v Copyright Loadbalancer.org

Load Balancing Bloxx Web Filter. Deployment Guide v Copyright Loadbalancer.org Load Balancing Bloxx Web Filter Deployment Guide v1.3.5 Copyright Loadbalancer.org Table of Contents 1. About this Guide...4 2. Loadbalancer.org Appliances Supported...4 3. Loadbalancer.org Software Versions

More information

DEPLOYMENT GUIDE DEPLOYING F5 WITH ORACLE ACCESS MANAGER

DEPLOYMENT GUIDE DEPLOYING F5 WITH ORACLE ACCESS MANAGER DEPLOYMENT GUIDE DEPLOYING F5 WITH ORACLE ACCESS MANAGER Table of Contents Table of Contents Introducing the F5 and Oracle Access Manager configuration Prerequisites and configuration notes... 1 Configuration

More information

ICS 351: Networking Protocols

ICS 351: Networking Protocols ICS 351: Networking Protocols IP packet forwarding application layer: DNS, HTTP transport layer: TCP and UDP network layer: IP, ICMP, ARP data-link layer: Ethernet, WiFi 1 Networking concepts each protocol

More information

Stonesoft Management Center. Release Notes for Version 5.4.6

Stonesoft Management Center. Release Notes for Version 5.4.6 Stonesoft Management Center Release Notes for Version 5.4.6 Created: June 19, 2013 Table of Contents What s New... 3 Fixes... 3 Other Changes... 4 System Requirements... 6 Basic Management System Hardware

More information

Lab - Using Wireshark to Examine TCP and UDP Captures

Lab - Using Wireshark to Examine TCP and UDP Captures Topology Part 1 (FTP) Part 1 will highlight a TCP capture of an FTP session. This topology consists of a PC with Internet access. Topology Part 2 (TFTP) Part 2 will highlight a UDP capture of a TFTP session.

More information

APP NOTES TeamLink and Firewall Detect

APP NOTES TeamLink and Firewall Detect APP NOTES TeamLink and Firewall Detect May 2017 Table of Contents 1. Overview... 4 1.1 When is TeamLink Used?... 4 1.2 Onsight Connect Solution Architecture... 4 1.3 Three Stages of Onsight Connectivity...

More information

DHCP and DDNS Services for Threat Defense

DHCP and DDNS Services for Threat Defense The following topics explain DHCP and DDNS services and how to configure them on Threat Defense devices. About DHCP and DDNS Services, on page 1 Guidelines for DHCP and DDNS Services, on page 3 Configure

More information

ET4254 Communications and Networking 1

ET4254 Communications and Networking 1 Topic 9 Internet Protocols Aims:- basic protocol functions internetworking principles connectionless internetworking IP IPv6 IPSec 1 Protocol Functions have a small set of functions that form basis of

More information

MSMQ-MQSeries Bridge Configuration Guide White Paper

MSMQ-MQSeries Bridge Configuration Guide White Paper MSMQ-MQSeries Bridge Configuration Guide White Paper Published: November 2000 Table of Contents Table of Contents...1 Introduction...1 Definitions... 2 How the Bridge Works...5 MSMQ-MQSeries Bridge Installation...

More information

FUJITSU Software Interstage Information Integrator V11

FUJITSU Software Interstage Information Integrator V11 FUJITSU Software V11 An Innovative WAN optimization solution to bring out maximum network performance October, 2013 Fujitsu Limited Contents Overview Key technologies Supported network characteristics

More information

Subnets. IP datagram format. The Internet Network layer. IP Fragmentation and Reassembly. IP Fragmentation & Reassembly. IP Addressing: introduction

Subnets. IP datagram format. The Internet Network layer. IP Fragmentation and Reassembly. IP Fragmentation & Reassembly. IP Addressing: introduction The Network layer Host, network layer functions: Network layer Routing protocols path selection R, OSPF, BGP Transport layer: TCP, forwarding table Link layer physical layer protocol addressing conventions

More information

UNIT IV -- TRANSPORT LAYER

UNIT IV -- TRANSPORT LAYER UNIT IV -- TRANSPORT LAYER TABLE OF CONTENTS 4.1. Transport layer. 02 4.2. Reliable delivery service. 03 4.3. Congestion control. 05 4.4. Connection establishment.. 07 4.5. Flow control 09 4.6. Transmission

More information

Deploying WAN-Optimized Acceleration for VMware vmotion Between Two BIG-IP Systems

Deploying WAN-Optimized Acceleration for VMware vmotion Between Two BIG-IP Systems Deployment Guide Deploying WAN-Optimized Acceleration for VMware vmotion Between Two BIG-IP Systems Welcome to the F5 deployment guide for VMware vmotion. This document contains guidance on configuring

More information

DEPLOYMENT GUIDE Version 1.0. Deploying F5 with Oracle Fusion Middleware WebCenter 11gR1

DEPLOYMENT GUIDE Version 1.0. Deploying F5 with Oracle Fusion Middleware WebCenter 11gR1 DEPLOYMENT GUIDE Version 1.0 Deploying F5 with Oracle Fusion Middleware WebCenter 11gR1 Introducing the F5 and Oracle WebCenter configuration Welcome to the F5 and Oracle WebCenter deployment guide. This

More information

Router Architecture Overview

Router Architecture Overview Chapter 4: r Introduction (forwarding and routing) r Review of queueing theory r Router design and operation r IP: Internet Protocol m IPv4 (datagram format, addressing, ICMP, NAT) m Ipv6 r Generalized

More information

Application Protocol Breakdown

Application Protocol Breakdown Snort 2.0: Protocol Flow Analyzer Authors: Daniel Roelker Sourcefire Inc. Marc Norton Sourcefire Inc. Abstract The Snort 2.0 Protocol Flow Analyzer

More information

Lixia Zhang M. I. T. Laboratory for Computer Science December 1985

Lixia Zhang M. I. T. Laboratory for Computer Science December 1985 Network Working Group Request for Comments: 969 David D. Clark Mark L. Lambert Lixia Zhang M. I. T. Laboratory for Computer Science December 1985 1. STATUS OF THIS MEMO This RFC suggests a proposed protocol

More information

Lecture 3. The Network Layer (cont d) Network Layer 1-1

Lecture 3. The Network Layer (cont d) Network Layer 1-1 Lecture 3 The Network Layer (cont d) Network Layer 1-1 Agenda The Network Layer (cont d) What is inside a router? Internet Protocol (IP) IPv4 fragmentation and addressing IP Address Classes and Subnets

More information

MTAT Enterprise System Integration. Lecture 2: Middleware & Web Services

MTAT Enterprise System Integration. Lecture 2: Middleware & Web Services MTAT.03.229 Enterprise System Integration Lecture 2: Middleware & Web Services Luciano García-Bañuelos Slides by Prof. M. Dumas Overall view 2 Enterprise Java 2 Entity classes (Data layer) 3 Enterprise

More information

Oracle E-Business Suite 11i with Cisco ACE Series Application Control Engine Deployment Guide, Version 1.0

Oracle E-Business Suite 11i with Cisco ACE Series Application Control Engine Deployment Guide, Version 1.0 Design Guide Oracle E-Business Suite 11i with Cisco ACE Series Application Control Engine Deployment Guide, Version 1.0 This design guide describes how to deploy the Cisco Application Control Engine (Cisco

More information

BIG-IP Analytics: Implementations. Version 12.1

BIG-IP Analytics: Implementations. Version 12.1 BIG-IP Analytics: Implementations Version 12.1 Table of Contents Table of Contents Setting Up Application Statistics Collection...5 What is Analytics?...5 About HTTP Analytics profiles...5 Overview: Collecting

More information

Networking interview questions

Networking interview questions Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected

More information

Transport Layer. Application / Transport Interface. Transport Layer Services. Transport Layer Connections

Transport Layer. Application / Transport Interface. Transport Layer Services. Transport Layer Connections Application / Transport Interface Application requests service from transport layer Transport Layer Application Layer Prepare Transport service requirements Data for transport Local endpoint node address

More information

StoneGate Management Center. Release Notes for Version 5.1.4

StoneGate Management Center. Release Notes for Version 5.1.4 StoneGate Management Center Release Notes for Version 5.1.4 Created: August 20, 2010 Table of Contents What s New... 3 Enhancements... 3 Fixes... 3 Major Changes Introduced in Version 5.1... 4 System Requirements...

More information

CMSC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. October 25, 2018

CMSC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. October 25, 2018 CMSC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala Message, Segment, Packet, and Frame host host HTTP HTTP message HTTP TCP TCP segment TCP router router IP IP packet IP IP packet IP

More information

Kent State University

Kent State University CS 4/54201 Computer Communication Network Kent State University Dept. of Computer Science www.mcs.kent.edu/~javed/class-net06f/ 1 A Course on Networking and Computer Communication LECT-10, S-2 IP- Internet

More information

Configuring MWTM to Run with Various Networking Options

Configuring MWTM to Run with Various Networking Options APPENDIXH Configuring MWTM to Run with Various Networking Options In addition to running on standard IP-connected networks, the Cisco Mobile Wireless Transport Manager (MWTM) has the flexibility to adapt

More information

Chapter 23 Process-to-Process Delivery: UDP, TCP, and SCTP 23.1

Chapter 23 Process-to-Process Delivery: UDP, TCP, and SCTP 23.1 Chapter 23 Process-to-Process Delivery: UDP, TCP, and SCTP 23.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 23-1 PROCESS-TO-PROCESS DELIVERY 23.2 The transport

More information

The World Wide Web is widely used by businesses, government agencies, and many individuals. But the Internet and the Web are extremely vulnerable to

The World Wide Web is widely used by businesses, government agencies, and many individuals. But the Internet and the Web are extremely vulnerable to 1 The World Wide Web is widely used by businesses, government agencies, and many individuals. But the Internet and the Web are extremely vulnerable to compromises of various sorts, with a range of threats

More information

Announcements Computer Networking. Outline. Transport Protocols. Transport introduction. Error recovery & flow control. Mid-semester grades

Announcements Computer Networking. Outline. Transport Protocols. Transport introduction. Error recovery & flow control. Mid-semester grades Announcements 15-441 Computer Networking Lecture 16 Transport Protocols Mid-semester grades Based on project1 + midterm + HW1 + HW2 42.5% of class If you got a D+,D, D- or F! must meet with Dave or me

More information

NGFW Security Management Center

NGFW Security Management Center NGFW Security Management Center Release Notes 6.5.3 Revision A Contents About this release on page 2 System requirements on page 2 Build number and checksums on page 4 Compatibility on page 5 New features

More information

Security Configuration Guide: Denial of Service Attack Prevention, Cisco IOS Release 12.2SX

Security Configuration Guide: Denial of Service Attack Prevention, Cisco IOS Release 12.2SX Security Configuration Guide: Denial of Service Attack Prevention, Cisco IOS Release 12.2SX Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com

More information

Chariot and IP Multicast

Chariot and IP Multicast Chariot and IP Multicast Application Note by John Q. Walker, NetIQ Corporation johnq@netiq.com Contents Emulating IP Multicast Applications...2 Streaming Scripts...3 Modifying the Multimedia Run Options

More information

Stonesoft Next Generation Firewall. Release Notes Revision C

Stonesoft Next Generation Firewall. Release Notes Revision C Stonesoft Next Generation Firewall Release Notes 5.10.4 Revision C Table of contents 1 About this release...3 System requirements... 3 Build version...6 Compatibility...7 2 New features...8 3 Enhancements...

More information