Application Control Application Control

Browse the Fortiguard Labs extensive encyclopedia of applications. Click any title to view more details of the application. Can't find what you are looking for? Try using the search bar above to find a specific application description.

This indicates an attempt to use the CBT protocol.Core-Based Trees is a multicast routing protocol that has a routing tree made...

Jan 13, 2009 RISK: POPULARITY:
This indicates an attempt to use the BBN RCC Monitoring protocol.It has the ID number 10 in the IP protocol list.

Jan 13, 2009 RISK: POPULARITY:
This indicates an attempt to use the MUX protocol.MUX is the acronym for Multiplexing. It has the ID number 18 in the IP protocol...

Jan 13, 2009 RISK: POPULARITY:
This indicates an attempt to use the DCN-MEAS protocol.DCN-MEAS is the acronym for DCN Measurement Subsystems. It has the ID number...

Jan 13, 2009 RISK: POPULARITY:
This indicates an attempt to use the TRUNK-2 protocol.It has the ID number 24 in the IP protocol list.

Jan 13, 2009 RISK: POPULARITY:
This indicates an attempt to use IRTP protocol.IRTP is the acronym for Internet Reliable Transaction Protocol. It has the ID number...

Jan 13, 2009 RISK: POPULARITY:
This indicates an attempt to tunnel IPv6 packets via IPv4.IPv6 packets can be encapsulated and carried as payload within another...

Jan 13, 2009 RISK: POPULARITY:
This indicates an attempt to use SDRP protocol.Source Demand Routing Protocol (SDRP) is a protocol that supports source-initiated...

Jan 13, 2009 RISK: POPULARITY:
This indicates detection of IPv6 Fragment header packets.IPv6 Fragment header (IPv6-Frag) is used by the IPv6 source to send a...

Jan 13, 2009 RISK: POPULARITY:
This indicates an attempt to use the GRE protocol.Generic Routing Encapsulation (GRE) is a tunneling protocol by Cisco that encapsulate...

Jan 13, 2009 RISK: POPULARITY:
This indicates an attempt to use I-NLSP protocol.I-NLSP is the acronym for Integrated Net Layer Security Protocol. It has the...

Jan 13, 2009 RISK: POPULARITY:
This indicates an attempt to use the PVP protocol.PVP is the Packet Video Protocol. It has the ID number 75 in the IP protocol...

Jan 13, 2009 RISK: POPULARITY:
This indicates an attempt to use the WB-MON protocol.WB-MON is the acronym for WIDEBAND Monitoring. It has the ID number 78 in...

Jan 13, 2009 RISK: POPULARITY:
This indicates an attempt to use the WB-EXPAK protocol.WB-EXPAK is the acronym for WIDEBAND EXPAK. It has the ID number 79 in...

Jan 13, 2009 RISK: POPULARITY:
This indicates an attempt to use the VINES protocol.VINES is the acronym for Virtual Integrated Network Service. It has the ID...

Jan 13, 2009 RISK: POPULARITY: