
UAG Series User’s Guide
447
C
H A P T E R
4 0
Services
40.1 Overview
Use service objects to define TCP applications, UDP applications, and ICMP messages. You can also
create service groups to refer to multiple service objects in other features.
40.1.1 What You Can Do in this Chapter
• Use the
Service
) to view and configure the UAG’s list of
services and their definitions.
• Use the
Service Group
screens (
) to view and configure the UAG’s list
of service groups.
40.1.2 What You Need to Know
IP Protocols
IP protocols are based on the eight-bit protocol field in the IP header. This field represents the next-
level protocol that is sent in this packet. This section discusses three of the most common IP
protocols.
Computers use Transmission Control Protocol (TCP, IP protocol 6) and User Datagram Protocol
(UDP, IP protocol 17) to exchange data with each other. TCP guarantees reliable delivery but is
slower and more complex. Some uses are FTP, HTTP, SMTP, and TELNET. UDP is simpler and faster
but is less reliable. Some uses are DHCP, DNS, RIP, and SNMP.
TCP creates connections between computers to exchange data. Once the connection is established,
the computers exchange data. If data arrives out of sequence or is missing, TCP puts it in sequence
or waits for the data to be re-transmitted. Then, the connection is terminated.
In contrast, computers use UDP to send short messages to each other. There is no guarantee that
the messages arrive in sequence or that the messages arrive at all.
Both TCP and UDP use ports to identify the source and destination. Each port is a 16-bit number.
Some port numbers have been standardized and are used by low-level system processes; many
others have no particular meaning.
Unlike TCP and UDP, Internet Control Message Protocol (ICMP, IP protocol 1) is mainly used to send
error messages or to investigate problems. For example, ICMP is used to send the response if a
computer cannot be reached. Another use is ping. ICMP does not guarantee delivery, but networks
often treat ICMP messages differently, sometimes looking at the message itself to decide where to
send it.
Содержание UAG2100
Страница 171: ...Chapter 10 Interfaces UAG Series User s Guide 171 Figure 118 Configuration Network Interface PPP Add ...
Страница 185: ...Chapter 10 Interfaces UAG Series User s Guide 185 Figure 124 Configuration Network Interface Bridge Add ...
Страница 247: ...Chapter 19 UPnP UAG Series User s Guide 247 Figure 166 Network Connections My Network Places Properties Example ...
Страница 319: ...Chapter 26 Billing UAG Series User s Guide 319 Figure 226 Configuration Billing Payment Service Desktop View ...
Страница 320: ...Chapter 26 Billing UAG Series User s Guide 320 Figure 227 Configuration Billing Payment Service Mobile View ...
Страница 342: ...Chapter 30 IPSec VPN UAG Series User s Guide 342 Figure 242 Configuration VPN IPSec VPN VPN Connection Add Edit ...
Страница 349: ...Chapter 30 IPSec VPN UAG Series User s Guide 349 Figure 244 Configuration VPN IPSec VPN VPN Gateway Add Edit ...
Страница 365: ...Chapter 30 IPSec VPN UAG Series User s Guide 365 ...
Страница 507: ...Chapter 46 System UAG Series User s Guide 507 Figure 341 Configuration System WWW Login Page Desktop View ...
Страница 535: ...Chapter 47 Log and Report UAG Series User s Guide 535 Figure 375 Configuration Log Report Email Daily Report ...
Страница 539: ...Chapter 47 Log and Report UAG Series User s Guide 539 Figure 377 Configuration Log Report Log Settings Edit System Log ...
Страница 602: ...Appendix B Legal Information UAG Series User s Guide 602 Environmental Product Declaration ...