Monday, June 4, 2007

Internet Protocol keyword

Most Windows have the ability to define Internet Protocol (IP) packet filters for protocol numbers. IP packet filters are commonly used to restrict traffic in and out of each interface.

We used this Protocol number to configure firewalls, routers and proxy. Next session i want to write about network firewall. This is as reference only, so if you want to know more about this visit the associated, like Microsoft, cisco, etc..etc


Internet Protocol Number:

Decimal

Keyword

Protocol

0


Reserved

1

ICMP

Internet Control Message

2

IGMP

Internet Group Management

3

GGP

Gateway-To-Gateway

4

IP

IP in IP (Encapsulation)

5

ST

Stream

6

TCP

Transmission Control

7

UCL

UCL

8

EGP

Exterior Gateway Protocol

9

IGP

Any Private Interior Gateway

10

BBN-RCC-MON

BBN RCC Monitoring

11

NVP-II

Network Voice Protocol

12

PUP

PUP

13

ARGUS

ARGUS

14

EMCON

EMCON

15

XNET

Cross Net Debugger

16

CHAOS

Chaos

17

UDP

User Datagram

18

MUX

Multiplexing

19

DCN-MEAS

DCN Measurement Subsystems

20

HMP

Host Monitoring

21

PRM

Packet Radio Measurement

2

XNS-IDP

Xerox NS IDP

23

TRUNK-1

Trunk-1

24

TRUNK-2

Trunk-2

25

LEAF-1

LEAF-1

26

LEAF-2

LEAF2

27

RDP

Reliable Data Protocol

28

IRTP

Internet Reliable Transaction

29

ISO-TP4

ISO Transport Protocol Class 4

30

NETBLT

Bulk Data Transfer Protocol

31

MFE-NSP

MFE Network Services Protocol

32

MERIT-INP

MERIT Internodal Protocol

33

SEP

Sequential Exchange Protocol

34

3PC

Third Party Connect Protocol

35

IDPR

Inter-Domain Policy Routing Protocol

36

XTP

XTP

37

DDP

Datagram Delivery Protocol

38

IDPR-CMTP

IDPR Control Message Transport Protocol

39

TP++

TP++ Transport Protocol

40

IL

IL Transport Protocol

41

SIP

Simple Internet Protocol

42

SDRP

Source Demand Routing Protocol

43

SIP-SR

SIP Source Route

44

SIP-FRAG

SIP Fragment

45

IDRP

Inter Domain Routing Protocol

46

RSVP

Reservation Protocol

47

GRE

General Routing Encapsulation

48

MHRP

Mobile Host Routing Protocol

49

BNA

BNA

50

SIPP-ESP

SIPP Encap Security Payload

51

SIPP-AH

SIPP Authentication Header

52

I-NLSP

Integrated Net Layer Security TUBA

53

SWIPE

IP With Encryption

54

NHRP

NBMA Next Hoop Resolution Protocol

55 - 60


Unassigned

61


Any Host Internal Protocol

62

CFTP

CFTP

63


Any Local Network

64

SAT-EXPAK

SATNET and Backroom EXPAK

65

KRYPTOLAN

Kryptolan

66

RVD

MIT Remote Virtual Disk Protocol

67

IPPC

Internet Pluribus Packet Core

68


Any distributed File System

69

SAT-MON

SATNET Monitoring

70

VISA

VISA Protocol

71

IPCV

Internet Packet Core Utility

72

CPNX

Computer Protocol Network Executive

73

CPHB

Computer Protocol Heart Beat

74

WSN

Wang Span Network

75

PVP

Packet Video Protocol

76

BR-SAT-MON

Backroom SATNET Monitoring

77

SUN-ND

SUN ND PROTOCOL-Temporary

78

WB-MON

WIDEBAND Monitoring

79

WB-EXPAK

WIDEBAND Expak

80

ISO-IP

ISO Internet Protocol

81

VMTP

VMTP

82

SECURE-VMTP

Secure - VMTP

83

VINES

VINES

84

TTP

TTP

85

NSFNET-IGP

NSFNET-IGP

86

DGP

Dissimilar Gateway Protocol

87

TCF

TCF

88

IGRP

IGRP

89

OSPFIGP

OSPFIGP

90

SPRITE-RPC

Sprite RPC Protocol

91

LARP

Locus Address Resolution Protocol

92

MTP

Multicast Transport Protocol

93

AX.25

AX.25 Frames

94

IPIP

IP-within-IP Encapsulation Protocol

95

MICP

Mobile Internetworking Control Pro

96

SCC-SP

Semaphore Communication Sec. Pro

97

ETHERIP

Ethernet-within-IP Encapsulation

98

ENCAP

Encapsulation Header

99


Any Private Encryption Scheme

100

GMTP

GMTP

101-254


Unassigned

255


Reserved






No comments:

Linux Software RAID

Introduction The main goals of using redundant arrays of inexpensive disks (RAID) are to improve disk data performance and provide data re...