1 of 5 5/19/05 9:48 AM
|
|
- Arabella Cunningham
- 5 years ago
- Views:
Transcription
1 1 of 5 5/19/05 9:48 AM
2 "Well Known" TCP and UDP Ports Used By Apple Software Products This document lists TCP and UDP ports used by Apple software products, such as Mac OS 9, Mac OS X, Mac OS X Server, AppleShare IP, Network Assistant, Apple Remote Desktop, Macintosh Manager, and.mac. Many of these are referred to as "well known," industry standard ports. About this table The Service or Protocol Name column lists services registered with the Internet Assigned Numbers Authority ( except where noted as "unregistered use." The names of Apple products that use these services or protocols appear in the Used By/Additional Information column. The RFC column lists the number of the Request For Comment document that defines the particular service or protocol, which may be used for reference. RFC documents are maintained by RFC Editor ( If multiple RFCs define a protocol, there may only be one listed here. This document is updated periodically, and the information listed is that available at time of publication. This document is intended as a quick reference and should not be regarded as comprehensive. Apple products listed in the table are the most commonly used examples, not a comprehensive list. For more information, review the Notes below the table. 7 echo File Transport Protocol (FTP) 21 FTP control Secure Shell (SSH) Telnet Simple Mail Transport Protocol (SMTP) 821 Mail (for sending ) 53 Domain Name System 1034 MacDNS (DNS) 79 Finger Hypertext Transfer Protocol 2068 World Wide Web,.Mac, Sherlock, QuickTime Installer, itunes Music Store and (HTTP) Radio, Software Update, RAID Admin, Backup, ical calendar publishing, Virex eupdate, iphoto HomePage publishing 88 Kerberos Password Server - Mac OS X Server Password Server 110 Post Office Protocol (POP3) 1081 Mail (for receiving ) Authentication Post Office Protocol (APOP) 111 Remote Procedure Call (RPC) 1057 Portmap (sunrpc) 113 Authentication Service Secure File Transfer Program (SFTP) - Note: Some authorities reference a "Simple File Transport Protocol" or "Secured File Transport Protocol" on this port. 119 Network News Transfer Protocol (NNTP) 977 Used by applications that read newsgroups. 123 Network Time Protocol (NTP) 1119 Date & Time preferences. Used for network time server synchronization. 139 Server Message Block (SMB)100 Used by Microsoft Windows file and print services, such as Windows Sharing in Mac OS X. 143 Internet Message Access Protocol (IMAP) 2060 Mail (for receiving ) 311 AppleShare IP WebAdmin - AppleShare IP remote Web administration, Server Monitor, Server Status (servermgrd), Workgroup Manager (DirectoryService), Server Admin (10.3 and later) 389 Lightweight Directory 1777 Used by applications that look up addresses, such as Mail and Address Book. Access Protocol (LDAP) 427 Service Location Protocol (SLP) 2608 Network Browser 443 Secure Sockets Layer (SSL, - Secured websites, itunes Music Store, iphoto HomePage publishing, isync or "HTTPS") 514 shell of 5 5/19/05 9:48 AM
3 515 Line Printer (LPR), Line Printer Daemon (LPD) 1179 Used for printing to a network printer, Printer Sharing in Mac OS X. 532 netnews Apple Filing Protcol (AFP) over TCP - AppleShare, Personal File Sharing, Apple File Service 554 Real Time Streaming Protocol (RTSP) 2326 QuickTime Streaming Server (QTSS), streaming media players Mac OS X RPC-based - Used by NetInfo, for example. services 625 Directory Service Proxy (DSProxy) - DirectoryService, Open Directory Assistant, Workgroup Manager Note: This port is registered to DEC DLM. 631 Internet Printing Protocol (IPP) 2910 Mac OS X Printer Sharing 626 AppleShare Imap Admin - IMAP Administration (Mac OS X Server or earlier, AppleShare IP 6) (ASIA) 660 MacOS Server Admin - Server Admin (both AppleShare IP and Mac OS X Server), Server Settings 687 asipregistry - AppleShare IP Shared Users and Groups, Server Monitor, Server Status (servermgrd) 1220 QT Server Admin - Used for administration of QuickTime Streaming Server PPTP - Mac OS X Server VPN service 2236 Macintosh Manager - Macintosh Manager 3031 Remote AppleEvents - Program Linking, Remote Apple Events 3283 Net Assistant - Apple Remote Desktop 2.0 or later (Reporting feature) 3659 Simple Authentication and - Mac OS X Server Password Server Security Layer (SASL) 3689 Digital Audio Access - itunes Music Sharing Protocol (DAAP) AirPort Admin Utility, AirPort Express Assistant Mac OS X camera and scanner sharing 5190 America Online (AOL) - ichat and AOL Instant Messenger, file transfer ichat (local traffic), Rendezvous ichat (local traffic), Rendezvous 5900 Virtual Network Computing - Apple Remote Desktop 2.0 or later (Observe/Control feature) (VNC) 5988 WBEM HTTP - Apple Remote Desktop 2.0 or later (see RTSP - QuickTime Streaming Server (RTSP) Automatic Router Configuration Protocol (ARCP - Registered Use) Web service, itunes Radio streams Web service with performance cache Web service with performance cache itunes Radio streams 7 echo Domain Name System (DNS) Bootstrap Protocol Server (BootP, - NetBoot via DHCP bootps) 68 Bootstrap Protocol Client (bootpc) 951 NetBoot via DHCP 69 Trivial File Transfer Protocol (TFTP) Remote Procedure Call (RPC) 1057, Network Time Protocol (NTP) Windows Internet Naming Service - - (WINS) 138 NETBIOS Datagram Service - Windows Datagram Service, Windows Network Neighborhood 161 Simple Network Management Protocol (SNMP) AirPort Base Station PPP status or discovery (certain configurations), AirPort Admin Utility, AirPort Express Assistant 427 Service Location Protocol (SLP) of 5 5/19/05 9:48 AM
4 497 dantz - Retrospect backup software, by Dantz. 500 ISAKMP/IKE - Mac OS X Server VPN service 513 who Syslog Real Time Streaming Protocol (RTSP) - QuickTime Streaming Server Mac OS X RPC-based services - Used by NetInfo, for example L2TP - Mac OS X Server VPN service 2049 Network File System (NFS) Remote AppleEvents - Program Linking, Remote Apple Events 3283 Net Assistant - Apple Network Assistant, Apple Remote Desktop 1.x, Apple Remote Desktop 2.x (All other services not using TCP Ports 5900, 3283, and 5988) 3659 Simple Authentication and Security - Mac OS X Server Password Server Layer (SASL) 4500 IKE NAT Traversal - Mac OS X Server VPN service 5060 Session Initiation Protocol (SIP) 2543 ichat AV 5190 America Online (AOL) - ichat and AOL Instant Messenger, file transfer ichat (local traffic), Rendezvous 5353 Multicast DNS (MDNS) - Rendezvous (mdnsresponder) 5678 SNATMAP server QuickTime Streaming Server 7070 RTSP alternate - QuickTime Streaming Server Real-Time Transport Protocol (RTP), - ichat AV (Audio RTP, RTCP; Video RTP, RTCP) Real-Time Control Protocol (RTCP) Notes Not all ports and services listed are present in or used by all software products. Some applications, such as Workgroup Manager, require more than one port and are listed accordingly. Network administrators may wish to use port-watching software in addition to this information when making decisions about how to set up firewalls or similar access control schemes. 3. For an explanation of what a TCP or UDP port is, see the "IP Ports" section of technical document , "Mac OS X: What Is a Port?" 4. In Mac OS X Server and later, some services that do not use well-known ports register with portmap. Use the rpcinfo -p command in Terminal to see what is registered with portmap The NetInfo parent-child model has replaced Shared Users and Groups in Mac OS X Server and later. Remote Admin on port 311 has been removed in Mac OS X Server and later. 7. With performance cache enabled in Mac OS X Server and later, Apache is on port and cache is on port This table includes features and ports used by Mac OS X 10.3 Panther. Earlier versions of Mac OS X do not have all the features listed here. 9. For Mac OS X Server 10.3 VPN service: PPTP uses the IP-GRE protocol (IP protocol 47). L2TP/IPsec uses the IP-ESP protocol (IP protocol 50, ESP). Important: Information about products not manufactured by Apple is provided for information purposes only, and does not constitute Apple's recommendation or endorsement. Please contact the vendor for additional information. Document 17159, "Locating Vendor Information" can help you search for a particular vendor's address and phone number. Article ID: Date Created: August 27, 2001 Date Modified: March 16, of 5 5/19/05 9:48 AM
5 Copyright 2005 Apple Computer, Inc. All rights reserved. 5 of 5 5/19/05 9:48 AM
TCP, UDP Ports, and ICMP Message Types1
Appendix A APPENDIX A TCP, UDP Ports, and ICMP Message Types1 I list useful TCP, UDP ports, and ICMP message types in this appendix. A comprehensive list of registered TCP and UDP services may be found
More informationAddresses, Protocols, and Ports Reference
APPENDIXA Addresses, Protocols, and Ports Reference This appendix provides a quick reference for the following topics: IP Addresses and Subnet Masks Protocols and Applications TCP and UDP Ports ICMP Types
More informationSupported services. 21/tcp FTP File transfer. 22/tcp SSH Secure shell. 23/tcp Telnet Terminal access. 37/tcp Time Time. 80/tcp HTTP WWW pages
Supported services For security reasons stricter rules are applied to networks engaged in the eduroam project. The eduroam network is connected to Internet via Cisco PIX firewall. Everything that is not
More informationIntroduction to Networking
Introduction to Networking Chapters 1 and 2 Outline Computer Network Fundamentals Defining a Network Networks Defined by Geography Networks Defined by Topology Networks Defined by Resource Location OSI
More informationGranular Protocol Inspection
The feature adds flexibility to the Cisco IOS Firewall by allowing it to perform a higher degree of inspection of TCP and User Data Protocol (UDP) traffic for most RFC 1700 application types. Finding Feature
More informationAddresses, Protocols, and Ports
This chapter provides a quick reference for IP addresses, protocols, and applications. IPv4 Addresses and Subnet Masks, page 1 IPv6 Addresses, page 5 Protocols and Applications, page 11 and Ports, page
More informationDownload the latest version of the DNS2Go Client from:
Using DNS2Go with your Linksys Cable / DSL Router Many users with Cable and xdsl broadband connections are using hardware routers such as the Linksys Cable/DSL Routers to connect their local area network
More informationAddresses, Protocols, and Ports
APPENDIXB This appendix provides a quick reference for IP addresses, protocols, and applications. This appendix includes the following sections: IPv4 Addresses and Subnet Masks, page B-1 IPv6 Addresses,
More informationNetwork-Based Application Recognition
Network-Based Application Recognition Last updated: September 2008 Common questions and answers regarding Cisco Network-Based Application Recognition (NBAR) follow. Q. What is NBAR? A. NBAR, an important
More informationA+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 8 Networking Essentials
A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e Chapter 8 Networking Essentials Objectives Learn about the protocols and standards Windows uses for networking Learn how to connect
More informationPort Utilization in Unified CVP
Utilization in Unified CVP Utilization Table Columns, page 1 Unified CVP Utilization, page 2 Utilization Table Columns The columns in the port utilization tables in this document describe the following:
More informationIdentify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS)
Course Outline Network+ Duration: 5 days (30 hours) Learning Objectives: Install and configure a network card Define the concepts of network layers Understand and implement the TCP/IP protocol Install
More informationIntroduction to TCP/IP
Introduction to TCP/IP Properties and characteristics of TCP/IP IPv4 IPv6 Public vs private vs APIPA/link local Static vs dynamic Client-side DNS settings Client-side DHCP Subnet mask vs CIDR Gateway TCP/IP
More informationMicrosoft Microsoft TS: MS Internet Security & Acceleration Server 2006, Configuring. Practice Test. Version:
Microsoft 70-351 Microsoft 70-351 TS: MS Internet Security & Acceleration Server 2006, Configuring Practice Test Version: 2.2 QUESTION NO: 1 Your network consists of a single Active Directory domain named
More informationIxLoad Data Streaming (RTSP, RTP)
IxLoad Data Streaming (RTSP, RTP) IxLoad can be used to: Benchmark the performance of streaming media servers and media caches Measure the impact of network degradation on the quality of media delivered
More informationLegal and notice information
Legal and notice information Copyright 2017 Trend Micro Incorporated. All rights reserved. TippingPoint, the TippingPoint logo, and Digital Vaccine are trademarks or registered trademarks of Trend Micro
More informationSecure Router 1001,1001S, 1002, 1004, and 3120
Secure Router 1001,1001S, 1002, 1004, and 3120 Software Release 9.2.5 Readme Notes 1. Release Summary Release Date: 21-September-2007 Purpose: Software maintenance release to address customer found software
More informationBGP. bgp. Name/CLI Keyword. Border Gateway Protocol. Full Name
BGP bgp Border Gateway Protocol Border Gateway Protocol (BGP) is a protocol designed to share network information (for example network reachability) between autonomous systems (AS). According to the information,
More informationGeneral Terms Node - File Permissions - file permissions file
CIS 375 General Terms Node - A networked computing device that takes a protocol address andcan initiate and respond to communication from other networked devices that employ similar protocols. File Permissions
More informationLecture-4. TCP/IP-Overview:
Lecture-4 TCP/IP-Overview: The history goes back to ARPANET a research network sponsored by DoD US Govt. It eventually connected hundreds of universities and govt installations, using leased telephone
More informationTCP/IP Filtering. Main TCP/IP Filtering Dialog Box. Route Filters Button. Packet Filters Button CHAPTER
CHAPTER 11 Main Dialog Box To access this dialog box (Figure 11-1), select Global/Filtering/ from the Device View. Figure 11-1 Main Configuration Dialog Box Route Filters Button This button brings up a
More informationWindows Compatibility and Mac OS X
Windows Compatibility and Mac OS X From sharing documents to sharing networks, Mac OS X makes it easy to use your Mac in a Windows environment. Features Use more than 12,000 applications, including Microsoft
More informationOER uses the following default value if this command is not configured or if the no form of this command is entered: timer: 300
holddown holddown To configure the Optimized Edge Routing (OER) prefix route dampening timer to set the minimum period of time that a new exit must be used before an alternate exit can be selected, use
More informationDefault Application Policies
APPENDIXA The WAAS software includes more than 150 default application policies that help your WAAS system classify and optimize some of the most common traffic on your network. lists the default applications
More informationDifferent Layers Lecture 21
Different Layers Lecture 21 10/17/2003 Jian Ren 1 The Transport Layer 10/17/2003 Jian Ren 2 Transport Services and Protocols Provide logical communication between app processes running on different hosts
More informationGlobal Information Assurance Certification Paper
Global Information Assurance Certification Paper Copyright SANS Institute Author Retains Full Rights This paper is taken from the GIAC directory of certified professionals. Reposting is not permited without
More informationList of Applications and Protocols
List of Applications and Protocols On the next pages, you will find a detailed description of all XenaAppMix protocols and applications. For more information about XenaAppMix please visit our webpage.
More informationService TCP UDP Notes SSH 22 Secure Shell * HTTP 80 HyperText Transfer Protocol * (e.g. for web browsing). Currently ( ) HTTP/1.
Service TCP UDP Notes SSH 22 Secure Shell * HTTP 80 HyperText Transfer Protocol * (e.g. for web browsing). Currently (2003-07-05) HTTP/1.1 is officially described in RFC 2616. HOSTS2 Name Server 81 81
More informationNetwork+ Week 5: Introduction to TCP/IP
Network+ Week 5: Introduction to TCP/IP IP Terminology Bit A bit is one digit, either a 1 or a 0. Byte A byte is 7 or 8 bits, depending on whether parity is used. Assume 8. Also called an Octet. Network
More informationHP ArcSight Port and Protocol Information
Important Notice HP ArcSight Port and Protocol Information The information (data) contained on all sheets of this document constitutes confidential information of Hewlett- Packard Company or its affiliates
More informationPROGRAMMING Kyriacou E. Frederick University Cyprus. Network communication examples
ACSC424 NETWORK APPLICATION PROGRAMMING Kyriacou E. Frederick University Cyprus communication examples The OSI reference model (proposed by ISO) Application A Application B 2 Application Application Presentation
More informationList of Applications and Protocols
List of Applications and Protocols Table of Contents OVERVIEW 2 PROTOCOLS 3 APPLICATIONS 10 For more information about XenaAppMix please visit our webpage. 1 Overview Protocols: (Click on protocol name
More informationACL Rule Configuration on the WAP371
Article ID: 5089 ACL Rule Configuration on the WAP371 Objective A network access control list (ACL) is an optional layer of security that acts as a firewall for controlling traffic in and out of a subnet.
More informationIntegrate Cisco VPN Concentrator
Integrate Cisco VPN Concentrator EventTracker v7.x Publication Date: July 24, 2014 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract This guide provides instructions to
More informationRouters use access lists to control incoming or outgoing traffic. You should know the following characteristics of an access list.
8.1. Access List Routers use access lists to control incoming or outgoing traffic. You should know the following characteristics of an access list. Access lists describe the traffic type that will be controlled.
More informationFirewall Simulation COMP620
Firewall Simulation COMP620 Firewall Simulation The simulation allows participants to configure their own simulated firewalls using Cisco-like syntax. Participants can take benign or malicious actions
More informationaccess link basic service set (BSS) broadband cable ad hoc wireless network Address Resolution Protocol (ARP) broadcast broadcast domain
G l o s s a r y A access link A port on a switch that is used to link to an individual device. Most ports on switches are access links. ad hoc wireless network Offers equal sharing between devices without
More informationNBAR2 Standard Protocol Pack 1.0
Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 951341706 USA http://www.cisco.com Tel: 408 5264000 800 553NETS (6387) Fax: 408 5270883 2013 Cisco Systems, Inc. All rights
More informationMTA_98-366_Vindicator930
MTA_98-366_Vindicator930 Number: 98-366 Passing Score: 700 Time Limit: 45 min File Version: 1.0 http://www.gratisexam.com/ Microsoft Technology Associate Networking Fundamentals MTA 98-366 Exam A QUESTION
More informationExtended ACL Configuration Mode Commands
Extended ACL Configuration Mode Commands To create and modify extended access lists on a WAAS device for controlling access to interfaces or applications, use the ip access-list extended global configuration
More informationZENworks for Desktops Preboot Services
3.2 Novell ZENworks for Desktops Preboot Services DEPLOYMENT www.novell.com Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,
More informationFile Services. File Services at a Glance
File Services High-performance workgroup and Internet file sharing for Mac, Windows, and Linux clients. Features Native file services for Mac, Windows, and Linux clients Comprehensive file services using
More informationVII. Corente Services SSL Client
VII. Corente Services SSL Client Corente Release 9.1 Manual 9.1.1 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Table of Contents Preface... 5 I. Introduction... 6 Chapter 1. Requirements...
More informationGeneral Important Protocols for Examination of IA Examination 2018
Protocol General Important Protocols for Examination of IA Examination 2018 DNS - Domain Name System - translates network address (such as IP addresses) into terms understood by humans (such as Domain
More informationA Division of Cisco Systems, Inc. Broadband Router. with 2 Phone Ports. User Guide WIRED RT41P2-AT. Model No.
A Division of Cisco Systems, Inc. WIRED Broadband Router with 2 Phone Ports User Guide Model No. RT41P2-AT Copyright and Trademarks Specifications are subject to change without notice. Linksys is a registered
More informationCisco Unified Communications Manager TCP and UDP Port
Cisco TCP and UDP Port Usage This chapter provides a list of the TCP and UDP ports that Cisco uses for intracluster connections and for communication with external applications or devices. You will also
More informationYou will save an Auto Server Setup file and use it in the next exercise.
Initial Mac OS X Server Configuration 51 30 You are now at the Review pane. Do not click the Set Up button. Instead, leave your Mac OS X Server at this Review pane. You will save an Auto Server Setup file
More informationCCNA Exploration Network Fundamentals. Chapter 3 Application Layer Functionality and Protocols
CCNA Exploration Network Fundamentals Chapter 3 Application Layer Functionality and Protocols Application Layer Functionality and Protocols Applications: The Interface Between the Networks Horny/Coufal
More informationVigor2900 Series Broadband Security Router Highly integrated broadband security router, combining high-speed routing technology with a comprehensive
Vigor2900 Series Broadband Security Router Highly integrated broadband security router, combining high-speed routing technology with a comprehensive security suite of firewall, VPN, URL content filtering
More informationCisco Unified Communications Manager TCP and UDP Port
Cisco TCP and UDP Port Usage This chapter provides a list of the TCP and UDP ports that Cisco uses for intracluster connections and for communication with external applications or devices. You will also
More informationNAT and Firewall ALG Support on Cisco ASR 1000 Series Aggregation Services Routers
NAT and Firewall ALG Support on Cisco ASR 1000 Series Aggregation Services Routers First Published: February 06, 2009 Last Updated: October 10, 2017 The following tables summarize Network Address Translation
More informationGigabit SSL VPN Security Router
As Internet becomes essential for business, the crucial solution to prevent your Internet connection from failure is to have more than one connection. PLANET is the ideal to help the SMBs increase the
More informationMac OS X Server QuickTime Streaming and Broadcasting Administration For Version 10.5 Leopard
Mac OS X Server QuickTime Streaming and Broadcasting Administration For Version 10.5 Leopard K Apple Inc. 2007 Apple Inc. All rights reserved. The owner or authorized user of a valid copy of QuickTime
More informationAppendix B Policies and Filters
Appendix B Policies and Filters NOTE: This appendix does not describe Access Control Lists (ACLs) or IPX SAP ACLs, which are additional methods for filtering packets. See Software-Based IP Access Control
More informationGuide to TCP/IP, Third. Chapter 6: Basic TCP/IP Services
Guide to TCP/IP, Third Edition Chapter 6: Basic TCP/IP Services Objectives Understand how TCP/IP Application layer protocols and services work Explain the capabilities, message types, and request/reply
More information5.4 Release README January 2005
5.4 Release README January 2005 Known Issues with this Release In rare situations, the NSE may fail to send LCP Echo-Requests to the PPPoE server, even though configured to do so. When this occurs, a physical
More informationQuestion No: 1 HOTSPOT In the screenshot, click the Icon of the preference pane where you turn on the OS X personal firewall.
Volume: 49 Questions Question No: 1 HOTSPOT In the screenshot, click the Icon of the preference pane where you turn on the OS X personal firewall. Question No: 2 What Windows Server technology provides
More informationManually Open Ports Internet Connection Firewall Windows 7
Manually Open Ports Internet Connection Firewall Windows 7 and equivalent editions of later Windows OS such as Windows 7, Windows 8, By default, Remote Desktop is using port 3389 TCP (UDP to stream audio
More informationNBAR Protocol Pack. Finding Feature Information. Prerequisites for the NBAR Protocol Pack
The NBAR protocol pack provides an easy way to update protocols supported by NBAR without replacing the base IOS image that is already present in the device. A protocol pack is a set of protocols developed
More information4. The transport layer
4.1 The port number One of the most important information contained in the header of a segment are the destination and the source port numbers. The port numbers are necessary to identify the application
More informationApplication Layer: OSI and TCP/IP Models
Application Layer Application Layer: OSI and TCP/IP Models The communication process between two communicating nodes is actually a communication process between two applications on these devices. Service
More informationTechnical Brief. Network Port & Routing Requirements Active Circle 4.5 May Page 1 sur 15
Technical Brief Network Port & Routing Requirements Active Circle 4.5 May 2017 Page 1 sur 15 INDEX 1. INTRODUCTION... 3 1.1. SCOPE OF THE DOCUMENT... 3 1.2. AUDIENCE... 3 1.3. ORGANIZATION OF THE INFORMATION...
More informationPASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year
PASS4TEST IT Certification Guaranteed, The Easy Way! \ http://www.pass4test.com We offer free update service for one year Exam : 1T6-323 Title : Microsoft Windows 2000 Network Analysis and Troubleshooting
More informationBarracuda Firewall Release Notes 6.6.X
Please Read Before Upgrading Before installing the new firmware version, back up your configuration and read all of the release notes that apply to the versions that are more current than the version that
More informationProtocol & Port Information for the deployment of. and. within IP Networks
Protocol & Port Information for the deployment of and within IP Networks SpliceCom Ltd The Hall Business Centre Berry Lane Chorleywood Herts WD3 5EX Phone: 01923-287700 Fax: 01923-287722 E-mail: info@splicecom.com
More informationTCP/IP Protocol Suite and IP Addressing
TCP/IP Protocol Suite and IP Addressing CCNA 1 v3 Module 9 10/11/2005 NESCOT CATC 1 Introduction to TCP/IP U.S. DoD created the TCP/IP model. Provides reliable data transmission to any destination under
More informationAdministrator's Guide
Administrator's Guide Contents Administrator's Guide... 7 Using Web Config Network Configuration Software... 8 About Web Config... 8 Accessing Web Config... 8 Changing the Administrator Password in Web
More informationInternet Applications. Dr Steve Gordon ICT, SIIT
Internet Applications Dr Steve Gordon ICT, SIIT Contents Network Application Models Transport Layer Interface Selected Applications and Services Naming Resources Web Access Email Network Management Other
More informationCOPYRIGHTED MATERIAL. Con t e n t s. Chapter 1 Introduction to Networking 1. Chapter 2 Overview of Networking Components 21.
Con t e n t s Introduction xix Chapter 1 Introduction to Networking 1 Comparing Logical and Physical Networks.... 1 Networking Home Computers........................................... 2 Networking Small
More informationChapter 10: Application Layer CCENT Routing and Switching Introduction to Networks v6.0
Chapter 10: Application Layer CCENT Routing and Switching Introduction to Networks v6.0 CCNET v6 10 Chapter 10 - Sections & Objectives 10.1 Application Layer Protocols Explain the operation of the application
More informationOER Commands. November Cisco IOS Optimized Edge Routing Command Reference OER-3
OER-3 active-probe active-probe To configure an Optimized Edge Routing (OER) active probe for a target prefix, use the active-probe command in OER master controller configuration mode. To disable the active
More informationAdministrator's Guide
Administrator's Guide Contents Administrator's Guide... 7 Using Web Config Network Configuration Software... 8 About Web Config... 8 Accessing Web Config... 8 Restricting Features Available for Users...
More informationConfiguring Port to Application Mapping
Configuring Port to Application Mapping Last Updated: January 19, 2012 This chapter describes the Cisco IOS Firewall Port to Application Mapping (PAM) feature. PAM enables CBAC-supported applications to
More informationHands-On TCP/IP Networking
Hands-On Course Description In this Hands-On TCP/IP course, the student will work on a live TCP/IP network, reinforcing the discussed subject material. TCP/IP is the communications protocol suite on which
More informationAdministrator's Guide
Administrator's Guide Contents Administrator's Guide... 7 Using Web Config Network Configuration Software... 8 About Web Config... 8 Accessing Web Config... 8 Restricting Features Available for Users...
More informationSUPERSTACK 3 FIREWALL FIRMWARE VERSION RELEASE NOTES
SUPERSTACK 3 FIREWALL FIRMWARE VERSION 6.0.2 RELEASE NOTES Please use these notes in conjunction with the following documents: SuperStack 3 Firewall User Guide Part number: DUA1611-0AAA02 SuperStack 3
More informationAdding Groups to Groups
108 Authenticating and Authorizing Accounts 4 Select the Project X group, and drag it from the Groups drawer to the Other Groups list. Notice that as you drag the group, the pointer changes from an arrow
More informationMAC OS X 10 6 SERVER REPAIR MANUAL
31 December, 2017 MAC OS X 10 6 SERVER REPAIR MANUAL Document Filetype: PDF 464.81 KB 0 MAC OS X 10 6 SERVER REPAIR MANUAL Mono supports Mac OS X version 10.7 (Lion) and later. Erase and Install Method
More informationSolved MCQ of Computer networking. Set-1
Solved MCQ of Computer networking Set-1 1. The computer network is A) Network computer with cable B) Network computer without cable C) Both of the above D) None of the above 2. FDDI used which type of
More informationTable A-1 defines the acronyms and abbreviations that are used in this publication.
APPENDIXA defines the acronyms and abbreviations that are used in this publication. AAA ACL ACPI API ARP AS AUP BA BGP BIOS CAR CD CDNFS CDS CDSM CIFS CLF CLI CLNS CMS CoS CSNP CSS CTE DC List of authentication,
More informationI N D E X. Numerics. 3DES (triple Data Encryption Standard), 199
I N D E X Numerics A 3DES (triple Data Encryption Standard), 199 AAA (Authentication, Authorization, and Accounting), 111 114, 236 configuring, 114, 144 145 CSACS, 116 122 floodguard, 168 169 servers,
More informationIP Communications Required by Cisco Unity Connection
IP Communications Required by Cisco Unity IP Communications Required by Cisco Unity, page 1 IP Communications Required by Cisco Unity Ports Table 1: TCP and UDP Ports Used for Inbound s to Cisco Unity
More informationEthernet / TCP-IP - Training Suite Application level protocols
Ethernet / TCP-IP - Training Suite 05 - Application level protocols Application layer protocols 2 World Wide Web HTTP I want HTTP this resource. Hypertext Transfer Protocol (HTTP) Used by the World Wide
More informationChapter 2. Communicating Over The Network. CCNA1-1 Chapter 2
Chapter 2 Communicating Over The Network CCNA1-1 Chapter 2 Communicating Over the Network The Platform for Communications CCNA1-2 Chapter 2 Elements of Communication People communicate in many different
More informationSoftware User Manual. Omnitech Innovation, Inc.
Software User Manual Omnitech Innovation, Inc. MCS7 2 Bay My Cloud Storage Private Cloud Server Index: 1. Method of Search IP address... 2 2. Disk Setup Utility... 4 3. Explanation of Disk Raid Modes...
More informationCisco ISE Ports Reference
Cisco ISE Infrastructure, page 1 Cisco ISE Administration Node Ports, page 2 Cisco ISE Monitoring Node Ports, page 3 Cisco ISE Policy Service Node Ports, page 4 Cisco ISE pxgrid Service Ports, page 8 OCSP
More informationAqua Connect Terminal Server 3.5 Advanced User Manual
Advanced User Manual Table of Contents Chapter 1: Getting Ready for Aqua Connect Terminal Server... 3 Preparing our Mac OS X Server...3 Preparing our Network and Internet Connection...5 Chapter 2: Deciding
More informationIPSec. Dr.Talal Alkharobi. IPsec (IP security)
IPSec IPsec (IP security) 2 A suite of protocols for securing Internet Protocol (IP) communications by authenticating and/or encrypting each IP packet in a data stream. IPsec also includes protocols for
More informationProtocol Filters APPENDIX
APPENDIX B The tables in this appendix list some of the protocols that you can filter on the access point. The tables include: Table A-1, Ethertype s Table A-2, IP s Table A-3, IP Port s In each table,
More informationKillTest. 半年免费更新服务
KillTest 质量更高 服务更好 学习资料 http://www.killtest.cn 半年免费更新服务 Exam : 9L0-506 Title : Apple Certified Technical Coordinator Version : Demo 1 / 4 1.How did you prepare for this exam? A. none of the above B. Apple
More informationTCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12
TCP/IP Networking Training Details Training Time : 9 Hours Capacity : 12 Prerequisites : There are no prerequisites for this course. About Training About Training TCP/IP is the globally accepted group
More informationKey Features DATA SHEETS. Application centric analysis software delivering answers for application performance problems.
DATA SHEETS Unpublished ClearSight Analyzer The award winning ClearSight Analyzer (CSA) offers advanced application centric monitoring and performance analysis, enabling enterprise Network Administrators
More information13. Internet Applications 최양희서울대학교컴퓨터공학부
13. Internet Applications 최양희서울대학교컴퓨터공학부 Internet Applications Telnet File Transfer (FTP) E-mail (SMTP) Web (HTTP) Internet Telephony (SIP/SDP) Presence Multimedia (Audio/Video Broadcasting, AoD/VoD) Network
More informationRelease Notes for DrayTek Vigor 2955 (UK/Ireland)
Release Notes for DrayTek Vigor 2955 (UK/Ireland) Firmware Version Release Type Build Date 22nd December 2016 Release Date 17th January 2017 Revision 61450 Applicable Models Vigor 2955 UK & Ireland Only
More informationTransport Layer (TCP/UDP)
Transport Layer (TCP/UDP) Where we are in the Course Moving on up to the Transport Layer! Application Transport Network Link Physical CSE 461 University of Washington 2 Recall Transport layer provides
More informationIC Port Maps and Data Flow Diagrams
IC Port Maps and Data Flow Diagrams Technical Reference Interactive Intelligence Customer Center (CIC ) Version 4.0 Last updated April 2, 2014 Abstract The port map and data flow diagrams illustrate the
More informationScanning. Course Learning Outcomes for Unit III. Reading Assignment. Unit Lesson UNIT III STUDY GUIDE
UNIT III STUDY GUIDE Course Learning Outcomes for Unit III Upon completion of this unit, students should be able to: 1. Recall the terms port scanning, network scanning, and vulnerability scanning. 2.
More informationConfiguring and Managing the IP Camera
CHAPTER 3 The Cisco Video Surveillance IP Camera provides configuration windows that you use to configure and manage the IP camera. This chapter explains how to access the configuration windows, describes
More informationThe Halcyon Guide to IBM Services Monitoring Templates
The Halcyon Guide to IBM Services Monitoring Templates Contents Foreword... 8 About Ash Giddings... 9 Overview... 10 Actions... 10 Installation of Customized Environment... 10 TCP/IP Rules... 12 SERVICES
More informationCisco ISE Ports Reference
Cisco ISE Infrastructure Cisco ISE Infrastructure, on page 1 Cisco ISE Administration Node Ports, on page 2 Cisco ISE Monitoring Node Ports, on page 4 Cisco ISE Policy Service Node Ports, on page 5 Inline
More information