
Over:
Over:
Revision:
1
Risk level:
5
Tag:
Anonymizer
Tag:
Tunnels
Tag:
Masquerading Tunnels
28.4. Control And Provisioning of Wireless Access Points
CAPWAP stands for Control And Provisioning of Wireless Access Points. It is a standard,
interoperable protocol that enables a controller to manage a collection of wireless access points.
Family:
Tunneling
Over:
Revision:
13
Risk level:
3
Tag:
Tunnels
28.5. CCProxy
CCProxy is a windows based software proxy.
Family:
Tunneling
Over:
Revision:
1
Risk level:
2
Tag:
Network Utilities
Tag:
Business Applications
28.6. Ethernet Over IP
The EtherIP protocol is used to encapsulate Ethernet frames in IP packets.
Family:
Tunneling
Over:
Revision:
17
Risk level:
5
Tag:
Tunnels
28.7. ETSI Lawful Interception TS 10 232-1 V2.1.1
Etsi LI is a protocol which forms a standard for telecoms operators and networks operators.
Family:
Tunneling
Over:
Revision:
17
Risk level:
4
Tag:
Information Leaking
Tag:
Application Layer Protocols
Chapter 28: Tunneling
322