background image

Packet Filter Policies

62

WatchGuard System Manager

SIP-proxy

If you use Voice-over-IP (VoIP) in your organization, you can add a SIP (Session Initiation Protocol) proxy 
policy to open the ports necessary to enable VoIP through your Firebox. These proxy policies have 
been created to work in a NAT environment to maintain security for privately-addressed conferencing 
equipment behind the Firebox.

SIP is a newer standard that is more common in hosted environments, where only endpoint devices 
such as phones are hosted at your business location and a VoIP provider manages the connectivity.

Characteristics

Internet Protocol(s): TCP, UDP

Port Number(s): TCP 5060, UDP 5060

SMTP-proxy

Simple Mail Transfer Protocol (SMTP) is the Internet standard protocol used to transmit and receive 
email messages. Usually SMTP servers are public servers. You use the SMTP proxy to control email 
messages and email content. The proxy scans SMTP messages for a number of filtered parameters, and 
compares them against the rules set in the proxy configuration.

 

When you use incoming static NAT with SMTP, you might see packets that come from the remote mail 
server being denied with destination port 113. In these cases, you can add an IDENT policy to Policy 
Manager. Configure IDENT to allow incoming connections to: 

Firebox

. This enables outgoing mail 

messages from behind the Firebox to the few SMTP servers on the Internet that use IDENT. 

If you do not want to use the SMTP proxy but want to use SMTP and have SMTP operate correctly, add a 
packet filter SMTP policy that uses TCP protocol and port 25.

Characteristics

Internet Protocol(s): TCP

Port Number(s): 25

TCP-UDP-proxy

The TCP-UDP proxy is included for these protocols on non-standard ports: HTTP, HTTPS, SIP, and FTP. 
For these protocols, the TCP-UDP proxy relays the traffic to the correct proxies for the protocols or 
allows you to allow or deny traffic. For other protocols, you can select to allow or deny traffic. 

Characteristics

Internet Protocol(s): TCP, UDP

Port Number(s): TCP 0 (Any), UDP 0 (Any)

Summary of Contents for Firebox X5500E

Page 1: ...Reference Guide Firebox X Core Peak e Series with WatchGuard System Manager Fireware v10 0 Firebox X Edge e Series v10 0 Revised 2 1 2008...

Page 2: ...h America Europe Asia Pacific and Latin America For more information please call 206 613 6600 or visit www watchguard com Notice to Users Information in this guide is subject to change without notice...

Page 3: ...s 6 Transfer Protocols 6 UDP 6 TCP 7 ICMP 7 Other protocols 7 Standard Ports and Random Ports 8 CHAPTER 2 MIME Content Types 9 CHAPTER 3 Services and Ports 21 Ports Used by WSM and Fireware 21 Ports U...

Page 4: ...r or DHCP Client 42 DNS 42 Entrust 42 finger 43 FTP 43 Gopher 43 GRE 43 HBCI 44 HTTP 44 HTTPS 44 IDENT 45 IGMP 45 IMAP 45 IPSec 45 IRC 46 Intel Video Phone 46 Kerberos v4 and Kerberos v5 46 L2TP 46 LD...

Page 5: ...king 52 SMTP 53 SNMP 53 SNMP Trap 53 SQL Net 53 SQL Server 53 SSH 54 SSL VPN 54 SunRPC 54 Syslog 54 TACACS 55 TACACS 55 TCP 55 TCP UDP 55 Telnet 55 Timbuktu 56 Time 56 Traceroute 56 UDP 56 UUCP 57 WAI...

Page 6: ...TCP UDP proxy 62 TFTP proxy 63 CHAPTER 6 Resources 65 Publishers 66 Books 66 Non Fiction 66 Fiction 66 Mailing Lists 67 General IT and Security Web Sites 67 White Hat Web Sites 69 Grey Hat Sites 70 Ot...

Page 7: ...eral Public License Library GPL 90 Java Platform Standard Edition License 96 bzip2 99 BusyBox 100 CGIC 100 ctengine 100 curl 100 dhcp 101 dmalloc 101 ElementTree 102 expat and libexpat 102 free extrac...

Page 8: ...m Manager OpenVPN 128 ossp_mm 129 PCRE 130 PPP 130 PostgreSQL Database Management System 136 py lib 136 pysqlite 137 Python 137 redboot 138 sasl 144 tinyxpath 145 traceroute 145 uClibc 145 wvstreams 1...

Page 9: ...l system and allows you to address a package and drop it into the system But there is no direct link between you and the recipient In other words there is no package Most networks mix IP with higher l...

Page 10: ...ype of service sets routing priorities It is usually not used because not many application layers can set it Tot_Len 16 bits Total length of packet measured in octets It is used to assemble fragments...

Page 11: ...ork Voice Protocol PUP 12 PUP ARGUS 13 ARGUS EMCON 14 EMCON XNET 15 Cross Net Debugger CHAOS 16 Chaos UDP 17 User Datagram Protocol MUX 18 Multiplexing DCN MEAS 19 DCN Measurement Subsystems HMP 20 Ho...

Page 12: ...tegrated Net Layer Security TUBA SWIPE 53 IP with Encryption NHRP 54 NBMA Next Hop Resolution Protocol 55 60 Unassigned 61 Any host internal protocol CFTP 62 CFTP 63 Any local network SAT EXPAK 64 SAT...

Page 13: ...te RPC Protocol LARP 91 Locus Address Resolution Protocol MTP 92 Multicast Transport Protocol AX 25 93 AX 25 Frames IPIP 94 IP within IP Encapsulation Protocol MICP 95 Mobile Internetworking Control P...

Page 14: ...tamp The time stamp option measures the time for a packet to make one full cycle source destination source Higher level time protocols or time stamp messages do this task better than the time stamp op...

Page 15: ...TCP packets are the SYN ACK and FIN bits The SYN bit is set only on the first packet sent in each direction for a given connection The ACK bit is set when the other side gets the data The FIN bit is...

Page 16: ...host Because telnet uses a well known service port number of 23 something must be different between these two connections The other port in these conditions is a port that is usually larger than 1023...

Page 17: ...es for your reference New registered MIME content types appear regularly We recommend frequent checks of an online source for the most current list One source of current MIME types is www iana org ass...

Page 18: ...n pgp signature RFC 3156 application pkcs10 RFC 2311 application pkcs7 mime RFC 2311 application pkcs7 signature RFC 2311 application postscript RFC 2045 RFC 2046 application prs alvestrand titrax she...

Page 19: ...n series Olsson application vnd ecowin seriesrequest Olsson application vnd ecowin seriesupdate Olsson application vnd enliven Santinelli application vnd epson quickanime Gu application vnd epson salt...

Page 20: ...lance Wattenberger application vnd lotus organizer Wattenberger application vnd lotus screencam Wattenberger application vnd lotus wordpro Wattenberger application vnd meridian slingshot Wedel applica...

Page 21: ...et alert wbxml Martin application vnd uplanet bearer choi wbxml Martin application vnd uplanet bearer choice Martin application vnd uplanet cacheop Martin application vnd uplanet cacheop wbxml Martin...

Page 22: ...tion x msaddr application x mms framed application x mswallet application x net install application x nokia 9000 add on software application x ns proxy autoconfig application x oleobject application x...

Page 23: ...on x wms LogStats application x400 bp application xml RFC 3023 application zip Lindner audio audio 32kadpcm RFC 2421 RFC 2422 audio basic RFC 2045 RFC 2046 audio echospeech audio vnd qcelp audio voxwa...

Page 24: ...aphics graphics x inventor image image cgm Francis image fif image g3fax image gif RFC 2045 RFC 2046 image ief RFC 1314 image jpeg RFC 2045 RFC 2046 image naplps Ferber image png Randers Pehrson image...

Page 25: ...y status RFC 1894 message disposition notification RFC 2298 message external body RFC 2045 RFC 2046 message http RFC 2616 message news RFC 1036 H Spencer message partial RFC 2045 RFC 2046 message rfc8...

Page 26: ...pt text plain RFC 2046 RFC 3676 text richtext RFC 2045 RFC 2046 text sgml RFC 1874 text tab separated values Lindner text uri list RFC 2483 text vbscript text vnd abc Allen text vnd fmiflexstor Hurtta...

Page 27: ...rkbook workbook formulaone x conference x cooltalk x form x openscape x model x mesh x music x midi x script x wfxclient x world x world x 3dmf x world x svr x world x vream x world x vrml x world x v...

Page 28: ...20 WatchGuard System Manager...

Page 29: ...Ports Used by WSM and Fireware The WatchGuard Firebox management station and WatchGuard servers use specified ports during usual operations Port Protocol Purpose 4100 TCP Authentication service 4107 4...

Page 30: ...UDP DNS Resolution 139 TCP Event Viewer 139 TCP File Sharing 137 138 139 UDP TCP Logon Sequence 138 UDP NetLogon 137 138 139 UDP TCP Pass Through Validation 139 TCP Performance Monitor 1723 47 TCP IP...

Page 31: ...es 119 TCP NNTP 563 TCP NNTP SSL Port s Protocol Purpose Service Name Port Protocol Description tcpmux 1 TCP UDP TCP Port Service Multiplexer compressnet 2 3 TCP UDP Management Utility rje 5 TCP UDP R...

Page 32: ...me Server xns ch 54 TCP UDP XNS Clearinghouse isi gl 55 TCP UDP ISI Graphics Language xns auth 56 TCP UDP XNS Authentication xns mail 58 TCP UDP XNS Mail ni mail 61 TCP UDP NI MAIL acas 62 TCP UDP ACA...

Page 33: ...ct 100 TCP unauthorized use hostname 101 TCP UDP NIC Host Name Server iso tsap 102 TCP UDP ISO TSAP gppitnp 103 TCP UDP Genesis Point to Point Trans Net acr nema 104 TCP UDP ACR NEMA Digital Imag Comm...

Page 34: ...35 TCP UDP DCE RPC Endpoint resolution profile 136 TCP UDP PROFILE naming system netbios ns 137 TCP UDP NETBIOS Name Service netbios dgm 138 TCP UDP NETBIOS Datagram Service netbios ssn 139 TCP UDP NE...

Page 35: ...3 fln spx 221 TCP UDP Berkeley rlogind with SPX auth rsh spx 222 TCP UDP Berkeley rshd with SPX auth backweb 371 UDP BackWeb ulistserv 372 TCP UDP Unix Listserv netware ip 396 TCP UDP Novell Netware o...

Page 36: ...CP UDP Novell NetWare Comm Service Platform novell lu6 2 1416 TCP UDP Novell LU6 2 netopia 1419 8000 UDP TCP Netopia Virtual Office ms sql s 1433 TCP UDP Microsoft SQL Server ms sql m 1434 TCP UDP Mic...

Page 37: ...UDP NCD Network Audio Server iphone 6670 TCP for connecting to the phone server iphone 22555 UDP for audio iphone 25793 TCP for the address server in 4 x and 5 0 iphone 1490 TCP for the conference eng...

Page 38: ...Well Known Services List 30 WatchGuard System Manager...

Page 39: ...fControl Searching for Blocked Sites To see whether WebBlocker is blocking a web site as part of a category block go to WatchGuard Test a Site on the SurfControl web site 1 Open a web browser and go t...

Page 40: ...othe rsubstances that are illegal to minors Alcohol and tobacco manufacturers commercial Web sites Information on legal highs glue sniffing misuse of prescription drugs or abuse of other legal substan...

Page 41: ...orientation Holocaust revisionist denial sites Coercion or recruitment for membership in a gang or cult Militancy extremist Note SurfControl does not include news historical or press incidents that m...

Page 42: ...legal highs glue sniffing misuse of prescription drugs or abuse of other legal substances Distributing illegal drugs free or for a charge Displaying selling or detailing the use of drug paraphernalia...

Page 43: ...opic specific search engines e g anthropology Society Culture Home life and family related topics including parenting tips gay lesbian bisexual non pornographic sites weddings births and funerals Fore...

Page 44: ...information computer buyer s guides computer parts and accessories and software Computer software Internet companies industry news and magazines Sites that desing and or maintain web pages including i...

Page 45: ...ies Money management investment services or firms General finances and companies that advise thereof Accountants actuaries banks mortgages and general insurance companies Government Government service...

Page 46: ...ot hate based Business General business corporate web sites International and multi national large general business corporate sites Business Associations Basic business sites such a s FedEx that enabl...

Page 47: ...trusted addresses Any Use an Any policy only to allow all traffic between two specified trusted IP or network addresses An Any policy opens a hole through the Firebox and allows all traffic to flow f...

Page 48: ...le protocol that can add redundancy to links to and from the Internet for LANs We recommend that you use this service only if you have enabled and configured BGP in the dynamic routing processes in th...

Page 49: ...give more security for Clarent command connections Characteristics Internet Protocol s UDP Port Numbers s 5001 5002 Clarent Gateway Clarent Corporation supplies IP telephone technology to mainstream...

Page 50: ...P Port Numbers s TCP 7648 UDP 7648 UDP 24032 DHCP Server or DHCP Client Dynamic Host Configuration Protocol DHCP gives a way to allocate dynamic IP addresses to devices on a network Characteristics In...

Page 51: ...the correct location You can configure the Firebox to add the source IP address to the Blocked Sites list whenever an FTP connection to a computer protected by the Firebox is denied The packet filter...

Page 52: ...cannot verify that these packets were actually sent from the correct location You can configure the Firebox to add the source IP address to the Blocked Sites list whenever an HTTP connection to a comp...

Page 53: ...We recommend that IDENT policies be allowed to and from the Firebox but know that hackers can use IDENT to collect user names Characteristics Internet Protocol s TCP Port Number s 113 IGMP The Intern...

Page 54: ...P IP networks This policy does not filter for dangerous content It does not support QpS or RSVP protocol and it does not support NAT Characteristics Internet Protocol s TCP Port Number s 522 1720 Kerb...

Page 55: ...tes Lotus Notes is a client server platform for conferencing databases and email It is also used to create and use documents This policy enables the proprietary Lotus Notes protocol Because the protoc...

Page 56: ...89 1720 NFS The Network File System NFS protocol is a client server software application created by Sun Microsystems to allow all network users to get access to shared files kept on computers of diffe...

Page 57: ...ers To enable this protocol add the PCAnywhere policy Then allow access from the hosts on the Internet that must get access to internal pcAnywhere servers and to the internal pcAnywhere servers pcAnyw...

Page 58: ...s in the tunnel use of this policy must be controlled Be sure to use the most current version of PPTP Characteristics Transport Protocol s TCP Internet Protocol s GRE PPTP Negotiation Port Number s 17...

Page 59: ...6 RADIUS ACCT RFC policy Port Number s UDP 1813 RDP The Microsoft Remote Desktop Protocol RDP supplies remote display and input abilities over network connections for Windows software applications tha...

Page 60: ...re Created by Security Dynamics Technologies Inc it uses SecurID tokens to generate codes and ACE Server software to corroborate the codes Characteristics Internet Protocol s TCP and UDP Port Number s...

Page 61: ...that an SNMP agent for example a router sends to a network management station These messages usually report an important event that must be examined Characteristics Internet Protocol s UDP Port Number...

Page 62: ...ll Sun RPC was developed by Sun Microsystems for connections between clients and servers in the Sun network file system Characteristics Internet Protocol s TCP UDP Port Number s TCP 111 UDP 111 Syslog...

Page 63: ...ections that do not match your specified policies do not complete unless you also configure TCP UDP TCP or the TCP Proxy This policy does not enable FTP which operates only with an FTP policy Characte...

Page 64: ...t Protocol s TCP UDP Port Number s TCP 37 UDP 37 Traceroute Traceroute is a software application that creates maps of networks It is used for network troubleshooting network route troubleshooting and...

Page 65: ...other ports much like HTTP servers WinFrame Citrix ICA is a protocol used by Citrix for its software applications which includes the Winframe product Winframe gives access to Windows from different ty...

Page 66: ...ecessary Characteristics Internet Protocol s TCP Port Number s 4107 4115 WG Mgmt Server When you use the WatchGuard Management Server Setup wizard to configure a Management Server the wizard automatic...

Page 67: ...connections to the WHOIS server such as rs internic net Characteristics Internet Protocol s TCP Port Number s 43 X11 The X Windows System Protocol has components that are used to create graphic deskt...

Page 68: ...r The FTP server can be a resource that keeps files on the same network or on a different network The FTP client can be in one of two modes for data transfer active or passive In active mode the serve...

Page 69: ...al certificate to encrypt and decrypt user page requests as well as the pages that are returned by the web server The HTTPS client is usually a web browser The HTTPS server is a remote resource that k...

Page 70: ...scans SMTP messages for a number of filtered parameters and compares them against the rules set in the proxy configuration When you use incoming static NAT with SMTP you might see packets that come fr...

Page 71: ...ed to transfer small files between hosts on the same network Some manufacturers use the TFTP protocol to send periodic updates to VoIP equipment under management If your equipment requires TFTP for up...

Page 72: ...Packet Filter Policies 64 WatchGuard System Manager...

Page 73: ...ch resources are most helpful to you These comments are from the LiveSecurity editorial team For more information like this log in to the LiveSecurity site and look over the LiveSecurity archive at ww...

Page 74: ...s 2005 ISBN 159327047x McClure Stewart Scambray Joel and Kurtz George Hacking Exposed Fifh Edition McGraw Hill Publishing 2005 ISBN 0072260815 Schneier Bruce Applied Cryptography Second Edition New Yo...

Page 75: ...t malicious code that hackers use Do not download or execute anything you do not fully understand WatchGuard Frequently Asked Questions www watchguard com support faqs www cerias purdue edu The Center...

Page 76: ...uter security resources csrc nist gov National Institute of Standards and Technology Computer Security Division www networkcomputing com Network Computing magazine part of the tech web business techno...

Page 77: ...ert service Rather Schneier s insights on security issues will over time teach you how to think about security in general for example how to assess whether a cure costs more than the risk it addresses...

Page 78: ...whether exploit code is publicly available monitor our LiveSecurity alerts and check some of the following sites Ryan1918 com On this site you ll find hackers selling and trading exploits including bo...

Page 79: ...m public sparkman netcalc htm A network calculator www winguides com registry A good site for information about the Windows registry www watchguard com glossary nav ic Online glossary of security term...

Page 80: ...from all your favorite sources Try out RSS and WatchGuard Wire They are free and keep you informed while saving you time Resources www watchguard com rss Aboutrss aspx An introduction to the WatchGuar...

Page 81: ...t Security Bulletins this is where you ll get early notification of what they plan to patch each month After Patch Day get more in depth explanation of Microsoft vulnerabilities at their Security Vuln...

Page 82: ...ve practical tips and insights Get the feed directly or from iTunes Risky Business This secuirty podcast from Australia provides a veteran perspective on secuirty issues all over the world and is the...

Page 83: ...WatchGuard the WatchGuard logo Firebox LiveSecurity and any other mark listed as a trademark in the Terms of Use portion of the WatchGuard Web site that is used herein are either registered trademarks...

Page 84: ...of the Apache License Apache XMLRPC log4j Xerces xmlrpc epi toolkit Specific copyright information for the above software if any can be found in subsequent pages of this Reference Guide The Apache Sof...

Page 85: ...ound in subsequent pages of this Reference Guide Apache License Version 2 0 January 2004 http www apache org licenses TERMS AND CONDITIONS FOR USE REPRODUCTION AND DISTRIBUTION 1 Definitions License s...

Page 86: ...tion patent license to make have made use offer to sell sell import and otherwise transfer the Work where such license applies only to those patent claims licensable by such Contributor that are neces...

Page 87: ...ITLE NON INFRINGEMENT MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE You are solely responsible for determining the appropriateness of using or redistributing the Work and assume any risks associ...

Page 88: ...for this service if you wish that you receive source code or can get it if you want it that you can change the software or use pieces of it in new free programs and that you know you can do these thin...

Page 89: ...these conditions You must cause the modified files to carry prominent notices stating that you changed the files and the date of any change You must cause any work that you distribute or publish that...

Page 90: ...compelled to copy the source along with the object code 4 You may not copy modify sublicense or distribute the Programexcept as expressly provided under this License Any attempt otherwise to copy modi...

Page 91: ...pplies to it and any later version you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation If the Program doe...

Page 92: ...we speak of free software we are referring to freedom of use not price Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software and charge...

Page 93: ...rary does the same job as widely used non free libraries In this case there is little to gain by limiting the free library to free software only so we use the Lesser General Public License In other ca...

Page 94: ...e You must cause the whole of the work to be licensed at no charge to all third parties under the terms of this License If a facility in the modified Library refers to a function or a table of data to...

Page 95: ...with the Library creates an executable that is a derivative of the Library because it contains portions of the Library rather than a work that uses the library The executable is therefore covered by t...

Page 96: ...orm with the major components compiler kernel and so on of the operating system on which the executable runs unless that component itself accompanies the executable It may happen that this requirement...

Page 97: ...e range of software distributed through that system in reliance on consistent application of that system it is up to the author donor to decide if he or she is willing to distribute software through a...

Page 98: ...or partially licensed under the GNU Library General Public License Library GPL etdFTPj iText libpthread Linux uClibc wvdial wvstreams Specific copyright information for the above software if any can...

Page 99: ...Library General Public License applies to certain designated libraries This license is quite different from the ordinary one be sure to read it in full and don t assume that anything in it is the same...

Page 100: ...ish on each copy an appropriate copyright notice and disclaimer of warranty keep intact all the notices that refer to this License and to the absence of any warranty and distribute a copy of this Lice...

Page 101: ...sed for software interchange If distribution of object code is made by offering access to copy from a designated place then offering equivalent access to copy the source code from the same place satis...

Page 102: ...fy that the user has already received a copy of these materials or that you have already sent this user a copy For an executable the required form of the work that uses the Library must include any da...

Page 103: ...ar circumstance the balance of the section is intended to apply and the section as a whole is intended to apply in other circumstances It is not the purpose of this section to induce you to infringe a...

Page 104: ...INABILITY TO USE THE LIBRARY INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE LIBRARY TO OPERATE WITH ANY OTH...

Page 105: ...ependent Implementation or products derived from it However except with respect to Independent Implementations and products derived from them that satisfy limitations a c from the previous paragraph Y...

Page 106: ...cification in any product In addition the Specification could include technical inaccuracies or typographical errors LIMITATION OF LIABILITY TO THE EXTENT NOT PROHIBITED BY LAW IN NO EVENT WILL SUN OR...

Page 107: ...in source and binary forms with or without modification are permitted provided that the following conditions are met 1 Redistributions of source code must retain the above copyright notice this list...

Page 108: ...Red Hat Inc in the United States and other countries Debian is a registered trademark of Software in the Public Interest Inc FreeBSD is a registered trademark of Wind River Systems Inc Slackware is a...

Page 109: ...ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE This software has been written for the Internet Software Consortium by Ted Lemon mellon fugue com...

Page 110: ...ULTING FROM LOSS OF USE DATA OR PROFITS WHETHER IN AN ACTION OF CONTRACT NEGLIGENCE OR OTHER TORTIOUS ACTION ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE expat and libe...

Page 111: ...copyright notice this list of conditions and the following disclaimer 2 Redistributions in binary form must reproduce the above copyright notice this list of conditions and the following disclaimer in...

Page 112: ...ation the name of Lars Fenneberg not be used in advertising or publicity pertaining to distribution of the program without specific prior permission and notice be given in supporting documentation tha...

Page 113: ...is provided as is without express or implied warranty of any kind These notices must be retained in any copies of any part of this documentation and or software iputils iputils contains several files...

Page 114: ...NCE OR OTHERWISE ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE iText iText is licensed under both the Mozilla Public License and the GNU Library...

Page 115: ...use of these programs JAXB Common Development and Distribution CDDL Version 1 0 1 Definitions 1 1 Contributor means each individual or entity that creates or contributes to the creation of Modificati...

Page 116: ...rt of a Larger Work and b under Patent Claims infringed by the making using or selling of Original Software to make have made use practice sell and offer for sale and or otherwise dispose of the Origi...

Page 117: ...fication You may not remove or alter any copyright patent or trademark notices contained within the Covered Software or any notices of licensing or any descriptive text giving attribution to any Contr...

Page 118: ...a rename the license and remove any references to the name of the license steward except to note that the license differs from this License and b otherwise make it clear that the license contains term...

Page 119: ...a commercial item as that term is defined in 48 C F R 2 101 Oct 1995 consisting of commercial computer software as that term is defined at 48 C F R 252 227 7014 a 1 and commercial computer software d...

Page 120: ...ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT INDIRECT INCIDENTAL SPECIAL EXEMPLARY OR CONSEQUENTIAL DAMAGES INCLUDING BUT NOT LIMITED TO PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE DATA OR PR...

Page 121: ...ed by any Contributor that the Program does not infringe the patent or other intellectual property rights of any other entity Each Contributor disclaims any liability to Recipient for claims brought b...

Page 122: ...fense and any related settlement negotiations The Indemnified Contributor may participate in any such claim at its own expense For example a Contributor might include the Program in a commercial produ...

Page 123: ...reement from time to time No one other than the Agreement Steward has the right to modify this Agreement IBM is the initial Agreement Steward IBM may assign the responsibility to serve as the Agreemen...

Page 124: ...therwise using Jython Licensee agrees to be bound by the terms and conditions of this License Agreement Jython 2 0 2 1 License Copyright 2000 2001 2002 2003 2004 2005 2006 2007 Jython Developers All r...

Page 125: ...INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED IN NO EVENT SHALL THE AUTHOR S BE LIABLE FOR ANY DIRECT INDIRECT INCIDENTAL S...

Page 126: ...s are met Redistributions of source code must retain the above copyright notice this list of conditions and the following disclaimer Redistributions in binary form must reproduce the above copyright n...

Page 127: ...her files instantiate templates or use macros or inline functions from these files or you compile these files and link them with other works to produce a work based on these files these files do not b...

Page 128: ...AR PURPOSE See the GNU General Public License for more details Lua Copyright 2003 2004 Tecgraf PUC Rio Permission is hereby granted free of charge to any person obtaining a copy of this software and a...

Page 129: ...on for any purpose and without fee is hereby granted provided that the above copyright notice appears in all copies and that both that copyright notice and this permission notice appear in supporting...

Page 130: ...S PROVIDED BY THE COPYRIGHT HOLDER AS IS AND ANY EXPRESS OR IMPLIED WARRANTIES INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIME...

Page 131: ...ES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT INDIRECT INCIDENTAL SPE CIAL EXEMPLARY OR CON...

Page 132: ...TE GOODS OR SERVICES LOSS OF USE DATA OR PROFITS OR BUSINESS INTERRUPTION HOWEVER CAUSED AND ON ANY THEORY OF LIABIL ITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERWISE...

Page 133: ...IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERWISE ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE The names of the authors an...

Page 134: ...ENT OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE DATA OR PROFITS OR BUSINESS INTERRUPTION HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE...

Page 135: ...FTWARE IS PROVIDED BY THE OpenSSL PROJECT AS IS AND ANY EXPRESSED OR IMPLIED WARRANTIES INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE...

Page 136: ...NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT INDIRECT INCIDENTAL SPECIAL EXEMPLARY OR CONSEQUENTIAL DAMAGES INCLUDING BUT NOT LIMITED TO PROCUREMENT OF SUBSTITUTE GOODS OR SERVI...

Page 137: ...isrepresented you must not claim that you wrote the original software 2 If you use this software in a product an acknowledgment in the product documentation would be appreciated but is not required 3...

Page 138: ...to endorse or promote products derived from this software without specific prior written permission THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS AS IS AND ANY EXPRESS OR IMPLIE...

Page 139: ...gram without specific prior permission and notice be given in supporting documentation that copying and distribution is by permission of Lars Fenneberg Lars Fenneberg makes no representations about th...

Page 140: ...disclaimer 2 Redistributions in binary form must reproduce the above copyright notice this list of conditions and the following disclaimer in the documentation and or other materials provided with the...

Page 141: ...st reproduce the above copyright notice this list of conditions and the following disclaimer in the documentation and or other materials provided with the distribution 3 All advertising materials ment...

Page 142: ...n and use in source and binary forms with or without modification are permitted provided that the following conditions are met 1 Redistributions of source code must retain the above copyright notice t...

Page 143: ...whatsoever must retain the following acknowledgment This product includes software developed by Tommi Komulainen Tommi Komulainen iki fi THE AUTHORS OF THIS SOFTWARE DISCLAIM ALL WARRANTIES WITH REGAR...

Page 144: ...Holger Krekel hpk trillke net merlinux GmbH Germany office merlinux de Armin Rigo arigo tunes org Carl Friedrich Bolz cfbolz merlinux de Maciek Fijalkowski fijal genesilico pl Guido Wesdorp guido mer...

Page 145: ...t perform and or display publicly prepare derivative works distribute and otherwise use the Software alone or in any derivative version provided however that the BeOpen Python License is retained in t...

Page 146: ...ontributor and the Modifications made by that particular Contributor 1 3 Covered Code means the Original Code or Modifications or the combination of the Original Code and Modifications in each case in...

Page 147: ...Initial Developer to make have made use and sell Utilize the Original Code or portions thereof but solely to the extent that any such patent is reasonably necessary to enable You to Utilize the Origin...

Page 148: ...4 Intellectual Property Matters a Third Party Claims If You have knowledge that a party claims an intellectual property right in particular functionality or code or its utilization under this License...

Page 149: ...Covered Code with other code not governed by the terms of this License and distribute the Larger Work as a single product In such a case You must make sure the requirements of this License are fulfill...

Page 150: ...N ESSENTIAL PART OF THIS LICENSE NO USE OF ANY COVERED CODE IS AUTHORIZED HEREUNDER EXCEPT UNDER THIS DISCLAIMER 8 TERMINATION This License and the rights granted hereunder will terminate automaticall...

Page 151: ...on of rights under this License based on the number of copies of Covered Code you made available the revenues you received from utilizing such rights and other relevant factors You agree to work with...

Page 152: ...s are met 1 Redistributions of source code must retain the above copyright notice this list of conditions and the following disclaimer 2 Redistributions in binary form must reproduce the above copyrig...

Page 153: ...ote products derived from this software without specific prior written permission THIS SOFTWARE IS PROVIDED AS IS AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES INCLUDING WITHOUT LIMITATION THE IMPLIED...

Page 154: ...S IS AND ANY EXPRESS OR IMPLIED WARRANTIES INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ALL OF WHICH ARE HEREBY DISCLAIMED IN NO EVENT SH...

Page 155: ...VER CAUSED AND ON ANY THE ORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERWISE ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE EVEN IF ADVISED OF THE POS...

Page 156: ...Licensing 148 WatchGuard System Manager...

Page 157: ...1 CU SeeMe policy 42 D DHCP Server policy 42 DNS policy for 42 DNS proxy described 60 E e mail messages and the SMTP proxy 62 Entrust policy 42 ESP 7 F finger policy 43 FTP policy 43 FTP proxy describ...

Page 158: ...licy 47 Lotus Notes policy 47 M MS Win Media policy 48 MSSQL Monitor policy 47 MSSQL Server policy 47 N NetMeeting policy 48 Network File System 6 Network File System NFS policy 48 Network Time Protoc...

Page 159: ...scribed 62 TCP IP 1 TCP UDP policy 55 telnet policy 55 Timbuktu policy 56 Time policy 56 traceroute policy 56 transfer protocols described 6 ESP 7 GGP 7 GRE 7 ICMP 7 IGMP 7 IPIP 7 TCP 7 UDP 6 Transmis...

Page 160: ...152 WatchGuard System Manager...

Reviews: