WSM User Guide - WatchGuard Technologies
WSM User Guide - WatchGuard Technologies
WSM User Guide - WatchGuard Technologies
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
APPENDIX A Copyright and Licensing .............................................................................................349Licenses ...................................................................................................................................................355SSL Licenses ........................................................................................................................................355Apache Software License, Version 2.0, January 2004 ................................................................357PCRE License ......................................................................................................................................359GNU Lesser General Public License ................................................................................................360GNU General Public License ............................................................................................................365Sleepycat License ..............................................................................................................................368Sourcefire License .............................................................................................................................369Expat-MIT HTML Parser Toolkit License ........................................................................................373Curl Software MIT-X License ............................................................................................................373APPENDIX B <strong>WatchGuard</strong> File Locations .........................................................................................375Default File Locations .........................................................................................................................376APPENDIX C Types of Policies ...............................................................................................................379Packet Filter Policies ...........................................................................................................................379Any .......................................................................................................................................................379AOL ......................................................................................................................................................380archie ..................................................................................................................................................380auth .....................................................................................................................................................380BGP ......................................................................................................................................................380Citrix ....................................................................................................................................................380Clarent-gateway ...............................................................................................................................381Clarent-command ............................................................................................................................381CU-SeeMe ...........................................................................................................................................382DHCP-Server or DHCP-Client ..........................................................................................................382DNS ......................................................................................................................................................382Entrust .................................................................................................................................................382finger ...................................................................................................................................................383FTP .......................................................................................................................................................383Gopher ................................................................................................................................................383GRE ......................................................................................................................................................383HTTP ....................................................................................................................................................384HTTPS ..................................................................................................................................................384HBCI .....................................................................................................................................................384IDENT ...................................................................................................................................................384IGMP ....................................................................................................................................................385IKE ........................................................................................................................................................385IMAP ....................................................................................................................................................385IPSec ....................................................................................................................................................385IRC ........................................................................................................................................................386Intel Video Phone ..............................................................................................................................386Kerberos v 4 and Kerberos v 5 .........................................................................................................386L2TP .....................................................................................................................................................386LDAP ....................................................................................................................................................386LDAP-SSL ............................................................................................................................................387Lotus Notes .........................................................................................................................................387<strong>User</strong> <strong>Guide</strong>xv