Searched refs:firewall (Results 1 – 19 of 19) sorted by relevance
/external/chromium_org/third_party/webrtc/base/ |
D | httprequest.h | 39 void set_firewall(FirewallManager * firewall) { in set_firewall() argument 40 firewall_ = firewall; in set_firewall()
|
D | asynchttprequest.h | 45 void set_firewall(FirewallManager * firewall) { in set_firewall() argument 46 firewall_ = firewall; in set_firewall()
|
/external/iptables/extensions/ |
D | libxt_TCPMSS.man | 12 firewall/router, but machines behind it can never exchange large 21 Workaround: activate this option and add a rule to your firewall
|
D | libxt_physdev.man | 3 a transparent bridging IP firewall and is only useful for kernel versions
|
D | libxt_recent.man | 5 to port 139 on your firewall and then DROP all future packets from them without
|
/external/ipsec-tools/src/racoon/samples/ |
D | racoon.conf.sample-natt | 12 # traffic. Don't forget to open these ports on your firewall!
|
/external/chromium_org/third_party/libjingle/source/talk/p2p/client/ |
D | connectivitychecker.h | 107 FirewallInfo firewall; member
|
/external/dnsmasq/ |
D | FAQ | 7 that most firewall setups block incoming packets _to_ port 53, in order 191 The second potential problem relates to firewall rules: since the ISC 192 daemon in some configurations bypasses the kernel firewall rules 393 Q: I'm using dnsmasq on a machine with the Firestarter firewall, and 401 Q: I'm using dnsmasq on a machine with the shorewall firewall, and
|
/external/mdnsresponder/ |
D | PrivateDNS.txt | 55 dnsextd has been modified to behave much like a DNS firewall. The "real" 178 * If there is a firewall between you and nameservers you want
|
/external/iptables/utils/ |
D | pf.os | 162 # the case that X is a NAT firewall. While nmap is talking to the 163 # device itself, p0f is fingerprinting the guy behind the firewall 183 # system (and probably not quite to the firewall either).
|
/external/libnl/lib/ |
D | utils.c | 442 __ADD(NETLINK_FIREWALL,firewall)
|
/external/iproute2/doc/actions/ |
D | actions-general | 111 - an incoming packet from 10.0.0.21 is first given a firewall mark of 1.
|
/external/fio/ |
D | README | 19 When inside a corporate firewall, git:// URL sometimes does not work.
|
/external/iproute2/doc/ |
D | ip-tunnels.tex | 329 Be careful, it means that without carefully installed firewall rules
|
D | ip-cref.tex | 2877 structure. It does not firewall, it {\em forwards.}
|
/external/chromium_org/components/policy/resources/ |
D | policy_templates.json | 576 'caption': '''Enable firewall traversal from remote access client''', 580 … machine can discover and connect to remote host machines even if they are separated by a firewall. 582 …If this setting is disabled and outgoing UDP connections are filtered by the firewall, then this m… 595 'caption': '''Enable firewall traversal from remote access host''', 598 … remote clients can discover and connect to this machines even if they are separated by a firewall. 600 …If this setting is disabled and outgoing UDP connections are filtered by the firewall, then this m… 726 …nect to this machine when a direct connection is not available (e.g. due to firewall restrictions).
|
/external/qemu/ |
D | CHANGES.TXT | 860 - as a special case, -debug-slirp enables logging of the router/firewall
|
/external/chromium_org/net/data/proxy_resolver_perftest/ |
D | no-ads.pac | 26 // **** ISP or firewall, then change the line below, replacing
|
/external/chromium_org/third_party/WebKit/PerformanceTests/Parser/resources/ |
D | final-url-en | 43349 http://www.freeswan.org/freeswan_trees/freeswan-1.99/doc/quickstart-firewall.html
|