enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. VLAN access control list - Wikipedia

    en.wikipedia.org/wiki/VLAN_access_control_list

    A VLAN access control list (VACL) provides access control for all packets that are bridged within a VLAN or that are routed into or out of a VLAN. Unlike regular Cisco IOS access control lists that are configured on router interfaces and applied on routed packets only, VACLs apply to all packets.

  3. Port mirroring - Wikipedia

    en.wikipedia.org/wiki/Port_mirroring

    Port mirroring on a Cisco Systems switch is generally referred to as Switched Port Analyzer (SPAN) or Remote Switched Port Analyzer (RSPAN). Other vendors have different names for it, such as Roving Analysis Port (RAP) on 3Com switches. Network engineers or administrators use port mirroring to analyze and debug data or diagnose errors on a ...

  4. Access-control list - Wikipedia

    en.wikipedia.org/wiki/Access-control_list

    In computer security, an access-control list (ACL) is a list of permissions [a] associated with a system resource (object or facility). An ACL specifies which users or system processes are granted access to resources, as well as what operations are allowed on given resources. [1] Each entry in a typical ACL specifies a subject and an operation.

  5. Context-based access control - Wikipedia

    en.wikipedia.org/wiki/Context-based_access_control

    Context-based access control (CBAC) is a feature of firewall software, which intelligently filters TCP and UDP packets based on application layer protocol session information. It can be used for intranets , extranets and internets .

  6. List of TCP and UDP port numbers - Wikipedia

    en.wikipedia.org/wiki/List_of_TCP_and_UDP_port...

    Cisco IOS IP Service Level Agreements Control Protocol [citation needed] 1972: Yes: InterSystems Caché, and InterSystems IRIS versions 2020.3 and later 1984: Yes: Big Brother: Unofficial: Arweave mining node [161] 1985: Assigned: Yes: Cisco Hot Standby Router Protocol (HSRP) [162] [self-published source] 1998: Yes: Cisco X.25 over TCP service ...

  7. Wildcard mask - Wikipedia

    en.wikipedia.org/wiki/Wildcard_mask

    In the Cisco IOS, [1] they are used in several places, for example: To indicate the size of a network or subnet for some routing protocols, such as OSPF. To indicate what IP addresses should be permitted or denied in access control lists (ACLs). A wildcard mask can be thought of as an inverted subnet mask.

  8. List of router and firewall distributions - Wikipedia

    en.wikipedia.org/wiki/List_of_router_and...

    Windows Routing and Remote Access Service is a feature that can be installed on Windows (mainly server) Operating Systems, and can perform routing functions, NAT, and implement firewall rules. Zentyal (formerly eBox Platform) Active: Ubuntu derivative: x86, x86-64: Open source: Free with paid services available

  9. Internet Protocol Options - Wikipedia

    en.wikipedia.org/wiki/Internet_Protocol_Options

    A general options category. 0 is for control options, and 2 is for debugging and measurement. 1 and 3 are reserved. Option Number: 5: Specifies an option. Option Length: 8: Indicates the size of the entire option (including this field). This field may not exist for simple options. Option Data: Variable: Option-specific data.