| /external/iproute2/doc/actions/ |
| actions-general | 111 - an incoming packet from 10.0.0.21 is first given a firewall mark of 1.
|
| /external/iproute2/man/man8/ |
| tc.8 | 384 as well as on the firewall mark applied by ipchains or iptables.
|
| /external/iptables/iptables/ |
| iptables.8.in | 69 A firewall rule specifies criteria for a packet and a target. If the
|
| /external/libevent/include/event2/ |
| util.h | 386 (This may fail on some Windows hosts where firewall software has cleverly
|
| /external/libnl/lib/ |
| utils.c | 607 __ADD(NETLINK_FIREWALL,firewall)
|
| /external/nist-sip/java/gov/nist/javax/sip/stack/ |
| UDPMessageChannel.java | 709 // Use the socket from the message processor (for firewall [all...] |
| /external/scapy/scapy/modules/ |
| p0f.py | 555 You need to have your firewall at least accepting the TCP packets
|
| /external/tcpdump/ |
| print-ip.c | 625 * for the firewall guys, print id, offset.
|
| /external/webrtc/webrtc/p2p/base/ |
| p2ptransportchannel_unittest.cc | 117 // NATs (via Firewall/NATSocketServer) are used to simulate the various network 172 BLOCK_UDP, // Firewall, UDP in/out blocked 173 BLOCK_UDP_AND_INCOMING_TCP, // Firewall, UDP in/out and TCP in blocked 174 BLOCK_ALL_BUT_OUTGOING_HTTP, // Firewall, only TCP out on 80/443 [all...] |
| tcpport.cc | 183 LOG_J(LS_INFO, this) << "Not listening due to firewall restrictions.";
|
| /prebuilts/go/darwin-x86/doc/devel/ |
| pre_go1.html | 387 application-level firewall.
|
| /prebuilts/go/linux-x86/doc/devel/ |
| pre_go1.html | 387 application-level firewall.
|
| /system/netd/server/binder/android/net/ |
| INetd.aidl | 30 * Replaces the contents of the specified UID-based firewall chain.
|
| /external/curl/docs/ |
| MANUAL | 641 client. This is good if the client is behind a firewall that doesn't allow 646 If the server, for example, is behind a firewall that doesn't allow connections [all...] |
| /external/iptables/libiptc/ |
| libiptc.c | 1 /* Library which manipulates firewall rules. Version $Revision$ */ 3 /* Architecture of firewall rules is as follows: [all...] |
| /external/python/cpython2/Doc/whatsnew/ |
| 2.1.rst | 654 because passive mode is more likely to work from behind a firewall. This 656 use :mod:`ftplib` to retrieve files and then don't work from behind a firewall. [all...] |
| /external/python/cpython2/Lib/idlelib/ |
| help.html | [all...] |
| /external/python/cpython3/Doc/whatsnew/ |
| 2.1.rst | 654 because passive mode is more likely to work from behind a firewall. This 656 use :mod:`ftplib` to retrieve files and then don't work from behind a firewall. [all...] |
| /external/python/cpython3/Lib/idlelib/ |
| help.html | [all...] |
| NEWS2x.txt | 371 firewall software. Added same comment to README.txt.
|
| /external/iproute2/man/man7/ |
| tc-hfsc.7 | 330 NAT/firewall/etc. with 100Mbit+ connection to mentioned modem/router).
|
| /frameworks/opt/net/voip/src/jni/rtp/ |
| AudioGroup.cpp | 75 // proxies. A firewall might remove a port mapping when there is no outgoing
|
| /libcore/ojluni/src/main/java/java/net/ |
| ServerSocket.java | 43 * appropriate to the local firewall. [all...] |
| /external/libpcap/ |
| gencode.c | [all...] |
| /external/libevent/ |
| whatsnew-2.1.txt | 365 sometimes badly confuse people's firewall software, even though no [all...] |