/external/chromium/third_party/libjingle/source/talk/base/ |
D | asynchttprequest.h | 56 void set_firewall(FirewallManager * firewall) { in set_firewall() argument 57 firewall_ = firewall; in set_firewall()
|
D | httprequest.h | 56 void set_firewall(FirewallManager * firewall) { in set_firewall() argument 57 firewall_ = firewall; in set_firewall()
|
/external/chromium_org/third_party/libjingle/source/talk/base/ |
D | httprequest.h | 56 void set_firewall(FirewallManager * firewall) { in set_firewall() argument 57 firewall_ = firewall; in set_firewall()
|
D | asynchttprequest.h | 62 void set_firewall(FirewallManager * firewall) { in set_firewall() argument 63 firewall_ = firewall; in set_firewall()
|
/external/iptables/extensions/ |
D | libxt_TCPMSS.man | 12 firewall/router, but machines behind it can never exchange large 21 Workaround: activate this option and add a rule to your firewall
|
D | libxt_physdev.man | 3 a transparent bridging IP firewall and is only useful for kernel versions
|
D | libxt_recent.man | 5 to port 139 on your firewall and then DROP all future packets from them without
|
/external/dropbear/ |
D | SMALL | 31 essential, although agent-forwarding is often useful even on firewall boxes.
|
/external/ipsec-tools/src/racoon/samples/ |
D | racoon.conf.sample-natt | 12 # traffic. Don't forget to open these ports on your firewall!
|
/external/chromium_org/third_party/libjingle/source/talk/p2p/client/ |
D | connectivitychecker.h | 107 FirewallInfo firewall; member
|
/external/dnsmasq/ |
D | FAQ | 7 that most firewall setups block incoming packets _to_ port 53, in order 191 The second potential problem relates to firewall rules: since the ISC 192 daemon in some configurations bypasses the kernel firewall rules 393 Q: I'm using dnsmasq on a machine with the Firestarter firewall, and 401 Q: I'm using dnsmasq on a machine with the shorewall firewall, and
|
/external/mdnsresponder/ |
D | PrivateDNS.txt | 55 dnsextd has been modified to behave much like a DNS firewall. The "real" 178 * If there is a firewall between you and nameservers you want
|
/external/libppp/src/ |
D | README.nat | 68 itself. There is, in effect, a partial firewall. Of course, if this is 148 fairly efficient one-way firewall. The default is no, which will allow
|
D | ppp.8.m4 | 3554 to punch holes in the firewall for FTP or IRC DCC connections. 3555 This is done dynamically by installing termporary firewall rules which 3557 the firewall. 3564 will be used for punching firewall holes. 3569 If no arguments are given, firewall punching is disabled.
|
/external/iptables/utils/ |
D | pf.os | 162 # the case that X is a NAT firewall. While nmap is talking to the 163 # device itself, p0f is fingerprinting the guy behind the firewall 183 # system (and probably not quite to the firewall either).
|
/external/iproute2/doc/actions/ |
D | actions-general | 111 - an incoming packet from 10.0.0.21 is first given a firewall mark of 1.
|
/external/iproute2/doc/ |
D | ip-tunnels.tex | 329 Be careful, it means that without carefully installed firewall rules
|
D | ip-cref.tex | 2877 structure. It does not firewall, it {\em forwards.}
|
/external/chromium_org/components/policy/resources/ |
D | policy_templates.json | 493 'caption': '''Enable firewall traversal from remote access client''', 497 … machine can discover and connect to remote host machines even if they are separated by a firewall. 499 …If this setting is disabled and outgoing UDP connections are filtered by the firewall, then this m… 512 'caption': '''Enable firewall traversal from remote access host''', 515 … remote clients can discover and connect to this machines even if they are separated by a firewall. 517 …If this setting is disabled and outgoing UDP connections are filtered by the firewall, then this m…
|
/external/chromium_org/net/data/proxy_resolver_perftest/ |
D | no-ads.pac | 26 // **** ISP or firewall, then change the line below, replacing
|
/external/chromium/net/data/proxy_resolver_perftest/ |
D | no-ads.pac | 26 // **** ISP or firewall, then change the line below, replacing
|
/external/qemu/ |
D | CHANGES.TXT | 860 - as a special case, -debug-slirp enables logging of the router/firewall
|
/external/chromium_org/third_party/WebKit/PerformanceTests/Parser/resources/ |
D | final-url-en | 43349 http://www.freeswan.org/freeswan_trees/freeswan-1.99/doc/quickstart-firewall.html
|