background image

Reference Guide

Firebox X Core/Peak e-Series

with WatchGuard System Manager/Fireware v10.0

Firebox X Edge e-Series v10.0

Revised: 

2

/

1

/2008

Содержание Firebox X5500E

Страница 1: ...Reference Guide Firebox X Core Peak e Series with WatchGuard System Manager Fireware v10 0 Firebox X Edge e Series v10 0 Revised 2 1 2008...

Страница 2: ...h America Europe Asia Pacific and Latin America For more information please call 206 613 6600 or visit www watchguard com Notice to Users Information in this guide is subject to change without notice...

Страница 3: ...s 6 Transfer Protocols 6 UDP 6 TCP 7 ICMP 7 Other protocols 7 Standard Ports and Random Ports 8 CHAPTER 2 MIME Content Types 9 CHAPTER 3 Services and Ports 21 Ports Used by WSM and Fireware 21 Ports U...

Страница 4: ...r or DHCP Client 42 DNS 42 Entrust 42 finger 43 FTP 43 Gopher 43 GRE 43 HBCI 44 HTTP 44 HTTPS 44 IDENT 45 IGMP 45 IMAP 45 IPSec 45 IRC 46 Intel Video Phone 46 Kerberos v4 and Kerberos v5 46 L2TP 46 LD...

Страница 5: ...king 52 SMTP 53 SNMP 53 SNMP Trap 53 SQL Net 53 SQL Server 53 SSH 54 SSL VPN 54 SunRPC 54 Syslog 54 TACACS 55 TACACS 55 TCP 55 TCP UDP 55 Telnet 55 Timbuktu 56 Time 56 Traceroute 56 UDP 56 UUCP 57 WAI...

Страница 6: ...TCP UDP proxy 62 TFTP proxy 63 CHAPTER 6 Resources 65 Publishers 66 Books 66 Non Fiction 66 Fiction 66 Mailing Lists 67 General IT and Security Web Sites 67 White Hat Web Sites 69 Grey Hat Sites 70 Ot...

Страница 7: ...eral Public License Library GPL 90 Java Platform Standard Edition License 96 bzip2 99 BusyBox 100 CGIC 100 ctengine 100 curl 100 dhcp 101 dmalloc 101 ElementTree 102 expat and libexpat 102 free extrac...

Страница 8: ...m Manager OpenVPN 128 ossp_mm 129 PCRE 130 PPP 130 PostgreSQL Database Management System 136 py lib 136 pysqlite 137 Python 137 redboot 138 sasl 144 tinyxpath 145 traceroute 145 uClibc 145 wvstreams 1...

Страница 9: ...l system and allows you to address a package and drop it into the system But there is no direct link between you and the recipient In other words there is no package Most networks mix IP with higher l...

Страница 10: ...ype of service sets routing priorities It is usually not used because not many application layers can set it Tot_Len 16 bits Total length of packet measured in octets It is used to assemble fragments...

Страница 11: ...ork Voice Protocol PUP 12 PUP ARGUS 13 ARGUS EMCON 14 EMCON XNET 15 Cross Net Debugger CHAOS 16 Chaos UDP 17 User Datagram Protocol MUX 18 Multiplexing DCN MEAS 19 DCN Measurement Subsystems HMP 20 Ho...

Страница 12: ...tegrated Net Layer Security TUBA SWIPE 53 IP with Encryption NHRP 54 NBMA Next Hop Resolution Protocol 55 60 Unassigned 61 Any host internal protocol CFTP 62 CFTP 63 Any local network SAT EXPAK 64 SAT...

Страница 13: ...te RPC Protocol LARP 91 Locus Address Resolution Protocol MTP 92 Multicast Transport Protocol AX 25 93 AX 25 Frames IPIP 94 IP within IP Encapsulation Protocol MICP 95 Mobile Internetworking Control P...

Страница 14: ...tamp The time stamp option measures the time for a packet to make one full cycle source destination source Higher level time protocols or time stamp messages do this task better than the time stamp op...

Страница 15: ...TCP packets are the SYN ACK and FIN bits The SYN bit is set only on the first packet sent in each direction for a given connection The ACK bit is set when the other side gets the data The FIN bit is...

Страница 16: ...host Because telnet uses a well known service port number of 23 something must be different between these two connections The other port in these conditions is a port that is usually larger than 1023...

Страница 17: ...es for your reference New registered MIME content types appear regularly We recommend frequent checks of an online source for the most current list One source of current MIME types is www iana org ass...

Страница 18: ...n pgp signature RFC 3156 application pkcs10 RFC 2311 application pkcs7 mime RFC 2311 application pkcs7 signature RFC 2311 application postscript RFC 2045 RFC 2046 application prs alvestrand titrax she...

Страница 19: ...n series Olsson application vnd ecowin seriesrequest Olsson application vnd ecowin seriesupdate Olsson application vnd enliven Santinelli application vnd epson quickanime Gu application vnd epson salt...

Страница 20: ...lance Wattenberger application vnd lotus organizer Wattenberger application vnd lotus screencam Wattenberger application vnd lotus wordpro Wattenberger application vnd meridian slingshot Wedel applica...

Страница 21: ...et alert wbxml Martin application vnd uplanet bearer choi wbxml Martin application vnd uplanet bearer choice Martin application vnd uplanet cacheop Martin application vnd uplanet cacheop wbxml Martin...

Страница 22: ...tion x msaddr application x mms framed application x mswallet application x net install application x nokia 9000 add on software application x ns proxy autoconfig application x oleobject application x...

Страница 23: ...on x wms LogStats application x400 bp application xml RFC 3023 application zip Lindner audio audio 32kadpcm RFC 2421 RFC 2422 audio basic RFC 2045 RFC 2046 audio echospeech audio vnd qcelp audio voxwa...

Страница 24: ...aphics graphics x inventor image image cgm Francis image fif image g3fax image gif RFC 2045 RFC 2046 image ief RFC 1314 image jpeg RFC 2045 RFC 2046 image naplps Ferber image png Randers Pehrson image...

Страница 25: ...y status RFC 1894 message disposition notification RFC 2298 message external body RFC 2045 RFC 2046 message http RFC 2616 message news RFC 1036 H Spencer message partial RFC 2045 RFC 2046 message rfc8...

Страница 26: ...pt text plain RFC 2046 RFC 3676 text richtext RFC 2045 RFC 2046 text sgml RFC 1874 text tab separated values Lindner text uri list RFC 2483 text vbscript text vnd abc Allen text vnd fmiflexstor Hurtta...

Страница 27: ...rkbook workbook formulaone x conference x cooltalk x form x openscape x model x mesh x music x midi x script x wfxclient x world x world x 3dmf x world x svr x world x vream x world x vrml x world x v...

Страница 28: ...20 WatchGuard System Manager...

Страница 29: ...Ports Used by WSM and Fireware The WatchGuard Firebox management station and WatchGuard servers use specified ports during usual operations Port Protocol Purpose 4100 TCP Authentication service 4107 4...

Страница 30: ...UDP DNS Resolution 139 TCP Event Viewer 139 TCP File Sharing 137 138 139 UDP TCP Logon Sequence 138 UDP NetLogon 137 138 139 UDP TCP Pass Through Validation 139 TCP Performance Monitor 1723 47 TCP IP...

Страница 31: ...es 119 TCP NNTP 563 TCP NNTP SSL Port s Protocol Purpose Service Name Port Protocol Description tcpmux 1 TCP UDP TCP Port Service Multiplexer compressnet 2 3 TCP UDP Management Utility rje 5 TCP UDP R...

Страница 32: ...me Server xns ch 54 TCP UDP XNS Clearinghouse isi gl 55 TCP UDP ISI Graphics Language xns auth 56 TCP UDP XNS Authentication xns mail 58 TCP UDP XNS Mail ni mail 61 TCP UDP NI MAIL acas 62 TCP UDP ACA...

Страница 33: ...ct 100 TCP unauthorized use hostname 101 TCP UDP NIC Host Name Server iso tsap 102 TCP UDP ISO TSAP gppitnp 103 TCP UDP Genesis Point to Point Trans Net acr nema 104 TCP UDP ACR NEMA Digital Imag Comm...

Страница 34: ...35 TCP UDP DCE RPC Endpoint resolution profile 136 TCP UDP PROFILE naming system netbios ns 137 TCP UDP NETBIOS Name Service netbios dgm 138 TCP UDP NETBIOS Datagram Service netbios ssn 139 TCP UDP NE...

Страница 35: ...3 fln spx 221 TCP UDP Berkeley rlogind with SPX auth rsh spx 222 TCP UDP Berkeley rshd with SPX auth backweb 371 UDP BackWeb ulistserv 372 TCP UDP Unix Listserv netware ip 396 TCP UDP Novell Netware o...

Страница 36: ...CP UDP Novell NetWare Comm Service Platform novell lu6 2 1416 TCP UDP Novell LU6 2 netopia 1419 8000 UDP TCP Netopia Virtual Office ms sql s 1433 TCP UDP Microsoft SQL Server ms sql m 1434 TCP UDP Mic...

Страница 37: ...UDP NCD Network Audio Server iphone 6670 TCP for connecting to the phone server iphone 22555 UDP for audio iphone 25793 TCP for the address server in 4 x and 5 0 iphone 1490 TCP for the conference eng...

Страница 38: ...Well Known Services List 30 WatchGuard System Manager...

Страница 39: ...fControl Searching for Blocked Sites To see whether WebBlocker is blocking a web site as part of a category block go to WatchGuard Test a Site on the SurfControl web site 1 Open a web browser and go t...

Страница 40: ...othe rsubstances that are illegal to minors Alcohol and tobacco manufacturers commercial Web sites Information on legal highs glue sniffing misuse of prescription drugs or abuse of other legal substan...

Страница 41: ...orientation Holocaust revisionist denial sites Coercion or recruitment for membership in a gang or cult Militancy extremist Note SurfControl does not include news historical or press incidents that m...

Страница 42: ...legal highs glue sniffing misuse of prescription drugs or abuse of other legal substances Distributing illegal drugs free or for a charge Displaying selling or detailing the use of drug paraphernalia...

Страница 43: ...opic specific search engines e g anthropology Society Culture Home life and family related topics including parenting tips gay lesbian bisexual non pornographic sites weddings births and funerals Fore...

Страница 44: ...information computer buyer s guides computer parts and accessories and software Computer software Internet companies industry news and magazines Sites that desing and or maintain web pages including i...

Страница 45: ...ies Money management investment services or firms General finances and companies that advise thereof Accountants actuaries banks mortgages and general insurance companies Government Government service...

Страница 46: ...ot hate based Business General business corporate web sites International and multi national large general business corporate sites Business Associations Basic business sites such a s FedEx that enabl...

Страница 47: ...trusted addresses Any Use an Any policy only to allow all traffic between two specified trusted IP or network addresses An Any policy opens a hole through the Firebox and allows all traffic to flow f...

Страница 48: ...le protocol that can add redundancy to links to and from the Internet for LANs We recommend that you use this service only if you have enabled and configured BGP in the dynamic routing processes in th...

Страница 49: ...give more security for Clarent command connections Characteristics Internet Protocol s UDP Port Numbers s 5001 5002 Clarent Gateway Clarent Corporation supplies IP telephone technology to mainstream...

Страница 50: ...P Port Numbers s TCP 7648 UDP 7648 UDP 24032 DHCP Server or DHCP Client Dynamic Host Configuration Protocol DHCP gives a way to allocate dynamic IP addresses to devices on a network Characteristics In...

Страница 51: ...the correct location You can configure the Firebox to add the source IP address to the Blocked Sites list whenever an FTP connection to a computer protected by the Firebox is denied The packet filter...

Страница 52: ...cannot verify that these packets were actually sent from the correct location You can configure the Firebox to add the source IP address to the Blocked Sites list whenever an HTTP connection to a comp...

Страница 53: ...We recommend that IDENT policies be allowed to and from the Firebox but know that hackers can use IDENT to collect user names Characteristics Internet Protocol s TCP Port Number s 113 IGMP The Intern...

Страница 54: ...P IP networks This policy does not filter for dangerous content It does not support QpS or RSVP protocol and it does not support NAT Characteristics Internet Protocol s TCP Port Number s 522 1720 Kerb...

Страница 55: ...tes Lotus Notes is a client server platform for conferencing databases and email It is also used to create and use documents This policy enables the proprietary Lotus Notes protocol Because the protoc...

Страница 56: ...89 1720 NFS The Network File System NFS protocol is a client server software application created by Sun Microsystems to allow all network users to get access to shared files kept on computers of diffe...

Страница 57: ...ers To enable this protocol add the PCAnywhere policy Then allow access from the hosts on the Internet that must get access to internal pcAnywhere servers and to the internal pcAnywhere servers pcAnyw...

Страница 58: ...s in the tunnel use of this policy must be controlled Be sure to use the most current version of PPTP Characteristics Transport Protocol s TCP Internet Protocol s GRE PPTP Negotiation Port Number s 17...

Страница 59: ...6 RADIUS ACCT RFC policy Port Number s UDP 1813 RDP The Microsoft Remote Desktop Protocol RDP supplies remote display and input abilities over network connections for Windows software applications tha...

Страница 60: ...re Created by Security Dynamics Technologies Inc it uses SecurID tokens to generate codes and ACE Server software to corroborate the codes Characteristics Internet Protocol s TCP and UDP Port Number s...

Страница 61: ...that an SNMP agent for example a router sends to a network management station These messages usually report an important event that must be examined Characteristics Internet Protocol s UDP Port Number...

Страница 62: ...ll Sun RPC was developed by Sun Microsystems for connections between clients and servers in the Sun network file system Characteristics Internet Protocol s TCP UDP Port Number s TCP 111 UDP 111 Syslog...

Страница 63: ...ections that do not match your specified policies do not complete unless you also configure TCP UDP TCP or the TCP Proxy This policy does not enable FTP which operates only with an FTP policy Characte...

Страница 64: ...t Protocol s TCP UDP Port Number s TCP 37 UDP 37 Traceroute Traceroute is a software application that creates maps of networks It is used for network troubleshooting network route troubleshooting and...

Страница 65: ...other ports much like HTTP servers WinFrame Citrix ICA is a protocol used by Citrix for its software applications which includes the Winframe product Winframe gives access to Windows from different ty...

Страница 66: ...ecessary Characteristics Internet Protocol s TCP Port Number s 4107 4115 WG Mgmt Server When you use the WatchGuard Management Server Setup wizard to configure a Management Server the wizard automatic...

Страница 67: ...connections to the WHOIS server such as rs internic net Characteristics Internet Protocol s TCP Port Number s 43 X11 The X Windows System Protocol has components that are used to create graphic deskt...

Страница 68: ...r The FTP server can be a resource that keeps files on the same network or on a different network The FTP client can be in one of two modes for data transfer active or passive In active mode the serve...

Страница 69: ...al certificate to encrypt and decrypt user page requests as well as the pages that are returned by the web server The HTTPS client is usually a web browser The HTTPS server is a remote resource that k...

Страница 70: ...scans SMTP messages for a number of filtered parameters and compares them against the rules set in the proxy configuration When you use incoming static NAT with SMTP you might see packets that come fr...

Страница 71: ...ed to transfer small files between hosts on the same network Some manufacturers use the TFTP protocol to send periodic updates to VoIP equipment under management If your equipment requires TFTP for up...

Страница 72: ...Packet Filter Policies 64 WatchGuard System Manager...

Страница 73: ...ch resources are most helpful to you These comments are from the LiveSecurity editorial team For more information like this log in to the LiveSecurity site and look over the LiveSecurity archive at ww...

Страница 74: ...s 2005 ISBN 159327047x McClure Stewart Scambray Joel and Kurtz George Hacking Exposed Fifh Edition McGraw Hill Publishing 2005 ISBN 0072260815 Schneier Bruce Applied Cryptography Second Edition New Yo...

Страница 75: ...t malicious code that hackers use Do not download or execute anything you do not fully understand WatchGuard Frequently Asked Questions www watchguard com support faqs www cerias purdue edu The Center...

Страница 76: ...uter security resources csrc nist gov National Institute of Standards and Technology Computer Security Division www networkcomputing com Network Computing magazine part of the tech web business techno...

Страница 77: ...ert service Rather Schneier s insights on security issues will over time teach you how to think about security in general for example how to assess whether a cure costs more than the risk it addresses...

Страница 78: ...whether exploit code is publicly available monitor our LiveSecurity alerts and check some of the following sites Ryan1918 com On this site you ll find hackers selling and trading exploits including bo...

Страница 79: ...m public sparkman netcalc htm A network calculator www winguides com registry A good site for information about the Windows registry www watchguard com glossary nav ic Online glossary of security term...

Страница 80: ...from all your favorite sources Try out RSS and WatchGuard Wire They are free and keep you informed while saving you time Resources www watchguard com rss Aboutrss aspx An introduction to the WatchGuar...

Страница 81: ...t Security Bulletins this is where you ll get early notification of what they plan to patch each month After Patch Day get more in depth explanation of Microsoft vulnerabilities at their Security Vuln...

Страница 82: ...ve practical tips and insights Get the feed directly or from iTunes Risky Business This secuirty podcast from Australia provides a veteran perspective on secuirty issues all over the world and is the...

Страница 83: ...WatchGuard the WatchGuard logo Firebox LiveSecurity and any other mark listed as a trademark in the Terms of Use portion of the WatchGuard Web site that is used herein are either registered trademarks...

Страница 84: ...of the Apache License Apache XMLRPC log4j Xerces xmlrpc epi toolkit Specific copyright information for the above software if any can be found in subsequent pages of this Reference Guide The Apache Sof...

Страница 85: ...ound in subsequent pages of this Reference Guide Apache License Version 2 0 January 2004 http www apache org licenses TERMS AND CONDITIONS FOR USE REPRODUCTION AND DISTRIBUTION 1 Definitions License s...

Страница 86: ...tion patent license to make have made use offer to sell sell import and otherwise transfer the Work where such license applies only to those patent claims licensable by such Contributor that are neces...

Страница 87: ...ITLE NON INFRINGEMENT MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE You are solely responsible for determining the appropriateness of using or redistributing the Work and assume any risks associ...

Страница 88: ...for this service if you wish that you receive source code or can get it if you want it that you can change the software or use pieces of it in new free programs and that you know you can do these thin...

Страница 89: ...these conditions You must cause the modified files to carry prominent notices stating that you changed the files and the date of any change You must cause any work that you distribute or publish that...

Страница 90: ...compelled to copy the source along with the object code 4 You may not copy modify sublicense or distribute the Programexcept as expressly provided under this License Any attempt otherwise to copy modi...

Страница 91: ...pplies to it and any later version you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation If the Program doe...

Страница 92: ...we speak of free software we are referring to freedom of use not price Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software and charge...

Страница 93: ...rary does the same job as widely used non free libraries In this case there is little to gain by limiting the free library to free software only so we use the Lesser General Public License In other ca...

Страница 94: ...e You must cause the whole of the work to be licensed at no charge to all third parties under the terms of this License If a facility in the modified Library refers to a function or a table of data to...

Страница 95: ...with the Library creates an executable that is a derivative of the Library because it contains portions of the Library rather than a work that uses the library The executable is therefore covered by t...

Страница 96: ...orm with the major components compiler kernel and so on of the operating system on which the executable runs unless that component itself accompanies the executable It may happen that this requirement...

Страница 97: ...e range of software distributed through that system in reliance on consistent application of that system it is up to the author donor to decide if he or she is willing to distribute software through a...

Страница 98: ...or partially licensed under the GNU Library General Public License Library GPL etdFTPj iText libpthread Linux uClibc wvdial wvstreams Specific copyright information for the above software if any can...

Страница 99: ...Library General Public License applies to certain designated libraries This license is quite different from the ordinary one be sure to read it in full and don t assume that anything in it is the same...

Страница 100: ...ish on each copy an appropriate copyright notice and disclaimer of warranty keep intact all the notices that refer to this License and to the absence of any warranty and distribute a copy of this Lice...

Страница 101: ...sed for software interchange If distribution of object code is made by offering access to copy from a designated place then offering equivalent access to copy the source code from the same place satis...

Страница 102: ...fy that the user has already received a copy of these materials or that you have already sent this user a copy For an executable the required form of the work that uses the Library must include any da...

Страница 103: ...ar circumstance the balance of the section is intended to apply and the section as a whole is intended to apply in other circumstances It is not the purpose of this section to induce you to infringe a...

Страница 104: ...INABILITY TO USE THE LIBRARY INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE LIBRARY TO OPERATE WITH ANY OTH...

Страница 105: ...ependent Implementation or products derived from it However except with respect to Independent Implementations and products derived from them that satisfy limitations a c from the previous paragraph Y...

Страница 106: ...cification in any product In addition the Specification could include technical inaccuracies or typographical errors LIMITATION OF LIABILITY TO THE EXTENT NOT PROHIBITED BY LAW IN NO EVENT WILL SUN OR...

Страница 107: ...in source and binary forms with or without modification are permitted provided that the following conditions are met 1 Redistributions of source code must retain the above copyright notice this list...

Страница 108: ...Red Hat Inc in the United States and other countries Debian is a registered trademark of Software in the Public Interest Inc FreeBSD is a registered trademark of Wind River Systems Inc Slackware is a...

Страница 109: ...ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE This software has been written for the Internet Software Consortium by Ted Lemon mellon fugue com...

Страница 110: ...ULTING FROM LOSS OF USE DATA OR PROFITS WHETHER IN AN ACTION OF CONTRACT NEGLIGENCE OR OTHER TORTIOUS ACTION ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE expat and libe...

Страница 111: ...copyright notice this list of conditions and the following disclaimer 2 Redistributions in binary form must reproduce the above copyright notice this list of conditions and the following disclaimer in...

Страница 112: ...ation the name of Lars Fenneberg not be used in advertising or publicity pertaining to distribution of the program without specific prior permission and notice be given in supporting documentation tha...

Страница 113: ...is provided as is without express or implied warranty of any kind These notices must be retained in any copies of any part of this documentation and or software iputils iputils contains several files...

Страница 114: ...NCE OR OTHERWISE ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE iText iText is licensed under both the Mozilla Public License and the GNU Library...

Страница 115: ...use of these programs JAXB Common Development and Distribution CDDL Version 1 0 1 Definitions 1 1 Contributor means each individual or entity that creates or contributes to the creation of Modificati...

Страница 116: ...rt of a Larger Work and b under Patent Claims infringed by the making using or selling of Original Software to make have made use practice sell and offer for sale and or otherwise dispose of the Origi...

Страница 117: ...fication You may not remove or alter any copyright patent or trademark notices contained within the Covered Software or any notices of licensing or any descriptive text giving attribution to any Contr...

Страница 118: ...a rename the license and remove any references to the name of the license steward except to note that the license differs from this License and b otherwise make it clear that the license contains term...

Страница 119: ...a commercial item as that term is defined in 48 C F R 2 101 Oct 1995 consisting of commercial computer software as that term is defined at 48 C F R 252 227 7014 a 1 and commercial computer software d...

Страница 120: ...ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT INDIRECT INCIDENTAL SPECIAL EXEMPLARY OR CONSEQUENTIAL DAMAGES INCLUDING BUT NOT LIMITED TO PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE DATA OR PR...

Страница 121: ...ed by any Contributor that the Program does not infringe the patent or other intellectual property rights of any other entity Each Contributor disclaims any liability to Recipient for claims brought b...

Страница 122: ...fense and any related settlement negotiations The Indemnified Contributor may participate in any such claim at its own expense For example a Contributor might include the Program in a commercial produ...

Страница 123: ...reement from time to time No one other than the Agreement Steward has the right to modify this Agreement IBM is the initial Agreement Steward IBM may assign the responsibility to serve as the Agreemen...

Страница 124: ...therwise using Jython Licensee agrees to be bound by the terms and conditions of this License Agreement Jython 2 0 2 1 License Copyright 2000 2001 2002 2003 2004 2005 2006 2007 Jython Developers All r...

Страница 125: ...INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED IN NO EVENT SHALL THE AUTHOR S BE LIABLE FOR ANY DIRECT INDIRECT INCIDENTAL S...

Страница 126: ...s are met Redistributions of source code must retain the above copyright notice this list of conditions and the following disclaimer Redistributions in binary form must reproduce the above copyright n...

Страница 127: ...her files instantiate templates or use macros or inline functions from these files or you compile these files and link them with other works to produce a work based on these files these files do not b...

Страница 128: ...AR PURPOSE See the GNU General Public License for more details Lua Copyright 2003 2004 Tecgraf PUC Rio Permission is hereby granted free of charge to any person obtaining a copy of this software and a...

Страница 129: ...on for any purpose and without fee is hereby granted provided that the above copyright notice appears in all copies and that both that copyright notice and this permission notice appear in supporting...

Страница 130: ...S PROVIDED BY THE COPYRIGHT HOLDER AS IS AND ANY EXPRESS OR IMPLIED WARRANTIES INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIME...

Страница 131: ...ES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT INDIRECT INCIDENTAL SPE CIAL EXEMPLARY OR CON...

Страница 132: ...TE GOODS OR SERVICES LOSS OF USE DATA OR PROFITS OR BUSINESS INTERRUPTION HOWEVER CAUSED AND ON ANY THEORY OF LIABIL ITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERWISE...

Страница 133: ...IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERWISE ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE The names of the authors an...

Страница 134: ...ENT OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE DATA OR PROFITS OR BUSINESS INTERRUPTION HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE...

Страница 135: ...FTWARE IS PROVIDED BY THE OpenSSL PROJECT AS IS AND ANY EXPRESSED OR IMPLIED WARRANTIES INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE...

Страница 136: ...NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT INDIRECT INCIDENTAL SPECIAL EXEMPLARY OR CONSEQUENTIAL DAMAGES INCLUDING BUT NOT LIMITED TO PROCUREMENT OF SUBSTITUTE GOODS OR SERVI...

Страница 137: ...isrepresented you must not claim that you wrote the original software 2 If you use this software in a product an acknowledgment in the product documentation would be appreciated but is not required 3...

Страница 138: ...to endorse or promote products derived from this software without specific prior written permission THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS AS IS AND ANY EXPRESS OR IMPLIE...

Страница 139: ...gram without specific prior permission and notice be given in supporting documentation that copying and distribution is by permission of Lars Fenneberg Lars Fenneberg makes no representations about th...

Страница 140: ...disclaimer 2 Redistributions in binary form must reproduce the above copyright notice this list of conditions and the following disclaimer in the documentation and or other materials provided with the...

Страница 141: ...st reproduce the above copyright notice this list of conditions and the following disclaimer in the documentation and or other materials provided with the distribution 3 All advertising materials ment...

Страница 142: ...n and use in source and binary forms with or without modification are permitted provided that the following conditions are met 1 Redistributions of source code must retain the above copyright notice t...

Страница 143: ...whatsoever must retain the following acknowledgment This product includes software developed by Tommi Komulainen Tommi Komulainen iki fi THE AUTHORS OF THIS SOFTWARE DISCLAIM ALL WARRANTIES WITH REGAR...

Страница 144: ...Holger Krekel hpk trillke net merlinux GmbH Germany office merlinux de Armin Rigo arigo tunes org Carl Friedrich Bolz cfbolz merlinux de Maciek Fijalkowski fijal genesilico pl Guido Wesdorp guido mer...

Страница 145: ...t perform and or display publicly prepare derivative works distribute and otherwise use the Software alone or in any derivative version provided however that the BeOpen Python License is retained in t...

Страница 146: ...ontributor and the Modifications made by that particular Contributor 1 3 Covered Code means the Original Code or Modifications or the combination of the Original Code and Modifications in each case in...

Страница 147: ...Initial Developer to make have made use and sell Utilize the Original Code or portions thereof but solely to the extent that any such patent is reasonably necessary to enable You to Utilize the Origin...

Страница 148: ...4 Intellectual Property Matters a Third Party Claims If You have knowledge that a party claims an intellectual property right in particular functionality or code or its utilization under this License...

Страница 149: ...Covered Code with other code not governed by the terms of this License and distribute the Larger Work as a single product In such a case You must make sure the requirements of this License are fulfill...

Страница 150: ...N ESSENTIAL PART OF THIS LICENSE NO USE OF ANY COVERED CODE IS AUTHORIZED HEREUNDER EXCEPT UNDER THIS DISCLAIMER 8 TERMINATION This License and the rights granted hereunder will terminate automaticall...

Страница 151: ...on of rights under this License based on the number of copies of Covered Code you made available the revenues you received from utilizing such rights and other relevant factors You agree to work with...

Страница 152: ...s are met 1 Redistributions of source code must retain the above copyright notice this list of conditions and the following disclaimer 2 Redistributions in binary form must reproduce the above copyrig...

Страница 153: ...ote products derived from this software without specific prior written permission THIS SOFTWARE IS PROVIDED AS IS AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES INCLUDING WITHOUT LIMITATION THE IMPLIED...

Страница 154: ...S IS AND ANY EXPRESS OR IMPLIED WARRANTIES INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ALL OF WHICH ARE HEREBY DISCLAIMED IN NO EVENT SH...

Страница 155: ...VER CAUSED AND ON ANY THE ORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERWISE ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE EVEN IF ADVISED OF THE POS...

Страница 156: ...Licensing 148 WatchGuard System Manager...

Страница 157: ...1 CU SeeMe policy 42 D DHCP Server policy 42 DNS policy for 42 DNS proxy described 60 E e mail messages and the SMTP proxy 62 Entrust policy 42 ESP 7 F finger policy 43 FTP policy 43 FTP proxy describ...

Страница 158: ...licy 47 Lotus Notes policy 47 M MS Win Media policy 48 MSSQL Monitor policy 47 MSSQL Server policy 47 N NetMeeting policy 48 Network File System 6 Network File System NFS policy 48 Network Time Protoc...

Страница 159: ...scribed 62 TCP IP 1 TCP UDP policy 55 telnet policy 55 Timbuktu policy 56 Time policy 56 traceroute policy 56 transfer protocols described 6 ESP 7 GGP 7 GRE 7 ICMP 7 IGMP 7 IPIP 7 TCP 7 UDP 6 Transmis...

Страница 160: ...152 WatchGuard System Manager...

Отзывы: