SlideShare a Scribd company logo
1 of 1
Streaming
=========
Apple 3         Apple Quick Time
Apple 4         Appstore
Apple 6         FaceTime = Apple
Apple 15        iTunes
Apple 16        iTunes Mobile
Mobile 36       Tmobile

SIP   10        H.225
SIP   11        H.245
SIP   12        H.323
SIP   29        RTCP
SIP   30        RTP
SIP   31        RTSP
SIP   32        RTSPS
SIP   35        SIP

Restricted     26       Pandora = US
Restricted     27       Pandora Desktop App   US
Restricted     13       Hulu = (US)
Restricted     14       Hulu Player(US)


Browser PlugIn 1   Adobe Flash Player
Browser 5    Dailymotion=2003-browsing,2003onwards-streaming
Browser 7    freeetv = 400-br,400onwards-streaming
Browser 8    Google Video = going to youtube.(other than this, video
chat)https . search for video captured.
Browser 9    Grooveshark = 300-br,
Browser 18   Last.fm Web == 777-login,
Browser 19   Live365 = Two Radio Streams
Browser 20   MagicJack (HTTPS)
Browser 23   Metacafe = Captured a stream
Browser 24   movie2k = 5330
Browser 25   Netflix = One Movie
Browser 28   Pandora.tv = browsing
Browser 37   Ustream = Downloaded
Browser 38   videobb = 1700 - br,
Browser 42   YouTube 4067-br,Video-Streaming
Browser 2   afreecaTV = 1531-browsing,
Browser 40   Vonage = Home page,Paid

Applications     17    Last.fm Scrobbler = Application Sw
Applications     39    VLC
Applications     41    Windows Media Player = 748-br,4832-music-selection,9000-
vedio,Separe     files


21         mck-ivpip
22         Megaco H-248
33         Shockwave Multimedia Player
34         SHOUTcast (Available)


Proxy
=========

More Related Content

What's hot

Eincop Netwax Lab: Access List ii
Eincop Netwax Lab: Access List iiEincop Netwax Lab: Access List ii
Eincop Netwax Lab: Access List iiNetwax Lab
 
Nxll19 vrrp (virtual router redundancy protocol)
Nxll19 vrrp (virtual router redundancy protocol)Nxll19 vrrp (virtual router redundancy protocol)
Nxll19 vrrp (virtual router redundancy protocol)Netwax Lab
 
Nxll28 ospf iii
Nxll28 ospf iiiNxll28 ospf iii
Nxll28 ospf iiiNetwax Lab
 
Eincop Netwax Lab: EIGRP ii
Eincop Netwax Lab: EIGRP iiEincop Netwax Lab: EIGRP ii
Eincop Netwax Lab: EIGRP iiNetwax Lab
 
Nxll17 dynamic routing with asa
Nxll17 dynamic routing with asaNxll17 dynamic routing with asa
Nxll17 dynamic routing with asaNetwax Lab
 
Nxll20 na ting
Nxll20 na ting Nxll20 na ting
Nxll20 na ting Netwax Lab
 
How to configure Extended acl for an ip address
How to configure Extended acl for an ip addressHow to configure Extended acl for an ip address
How to configure Extended acl for an ip addresstcpipguru
 
Nxll09 access list
Nxll09 access listNxll09 access list
Nxll09 access listNetwax Lab
 
How to configure Standard ACL for a network
How to configure Standard ACL  for a networkHow to configure Standard ACL  for a network
How to configure Standard ACL for a networktcpipguru
 
Nxll18 vpn (s2 s gre & dmvpn)
Nxll18 vpn (s2 s gre & dmvpn)Nxll18 vpn (s2 s gre & dmvpn)
Nxll18 vpn (s2 s gre & dmvpn)Netwax Lab
 
Nxll14 cut through-proxy on asa
Nxll14 cut through-proxy on asaNxll14 cut through-proxy on asa
Nxll14 cut through-proxy on asaNetwax Lab
 
Nxll25 hsrp with failover
Nxll25 hsrp with failoverNxll25 hsrp with failover
Nxll25 hsrp with failoverNetwax Lab
 
Eincop Netwax Lab: Redistribution
Eincop Netwax Lab: RedistributionEincop Netwax Lab: Redistribution
Eincop Netwax Lab: RedistributionNetwax Lab
 
Nxll10 v lan and trunking
Nxll10 v lan and trunkingNxll10 v lan and trunking
Nxll10 v lan and trunkingNetwax Lab
 
Eincop Netwax Lab: Vlan and Trunking ii
Eincop Netwax Lab: Vlan and Trunking iiEincop Netwax Lab: Vlan and Trunking ii
Eincop Netwax Lab: Vlan and Trunking iiNetwax Lab
 
Eincop Netwax Lab: EIGRP iii
Eincop Netwax Lab: EIGRP iiiEincop Netwax Lab: EIGRP iii
Eincop Netwax Lab: EIGRP iiiNetwax Lab
 
Getting Started with Raspberry Pi - DCC 2013.1
Getting Started with Raspberry Pi - DCC 2013.1Getting Started with Raspberry Pi - DCC 2013.1
Getting Started with Raspberry Pi - DCC 2013.1Tom Paulus
 

What's hot (20)

Eincop Netwax Lab: Access List ii
Eincop Netwax Lab: Access List iiEincop Netwax Lab: Access List ii
Eincop Netwax Lab: Access List ii
 
Nxll19 vrrp (virtual router redundancy protocol)
Nxll19 vrrp (virtual router redundancy protocol)Nxll19 vrrp (virtual router redundancy protocol)
Nxll19 vrrp (virtual router redundancy protocol)
 
Nxll28 ospf iii
Nxll28 ospf iiiNxll28 ospf iii
Nxll28 ospf iii
 
Eincop Netwax Lab: EIGRP ii
Eincop Netwax Lab: EIGRP iiEincop Netwax Lab: EIGRP ii
Eincop Netwax Lab: EIGRP ii
 
Nxll17 dynamic routing with asa
Nxll17 dynamic routing with asaNxll17 dynamic routing with asa
Nxll17 dynamic routing with asa
 
Nxll23 i pv6
Nxll23 i pv6Nxll23 i pv6
Nxll23 i pv6
 
Nxll20 na ting
Nxll20 na ting Nxll20 na ting
Nxll20 na ting
 
How to configure Extended acl for an ip address
How to configure Extended acl for an ip addressHow to configure Extended acl for an ip address
How to configure Extended acl for an ip address
 
Nxll09 access list
Nxll09 access listNxll09 access list
Nxll09 access list
 
How to configure Standard ACL for a network
How to configure Standard ACL  for a networkHow to configure Standard ACL  for a network
How to configure Standard ACL for a network
 
Nxll18 vpn (s2 s gre & dmvpn)
Nxll18 vpn (s2 s gre & dmvpn)Nxll18 vpn (s2 s gre & dmvpn)
Nxll18 vpn (s2 s gre & dmvpn)
 
Auto call setup for xcal series 3.x.xx ping tracert
Auto call setup for xcal series 3.x.xx ping tracertAuto call setup for xcal series 3.x.xx ping tracert
Auto call setup for xcal series 3.x.xx ping tracert
 
Nxll14 cut through-proxy on asa
Nxll14 cut through-proxy on asaNxll14 cut through-proxy on asa
Nxll14 cut through-proxy on asa
 
Nxll25 hsrp with failover
Nxll25 hsrp with failoverNxll25 hsrp with failover
Nxll25 hsrp with failover
 
Eincop Netwax Lab: Redistribution
Eincop Netwax Lab: RedistributionEincop Netwax Lab: Redistribution
Eincop Netwax Lab: Redistribution
 
Nxll10 v lan and trunking
Nxll10 v lan and trunkingNxll10 v lan and trunking
Nxll10 v lan and trunking
 
Eincop Netwax Lab: Vlan and Trunking ii
Eincop Netwax Lab: Vlan and Trunking iiEincop Netwax Lab: Vlan and Trunking ii
Eincop Netwax Lab: Vlan and Trunking ii
 
Eincop Netwax Lab: EIGRP iii
Eincop Netwax Lab: EIGRP iiiEincop Netwax Lab: EIGRP iii
Eincop Netwax Lab: EIGRP iii
 
Auto call setup for xcal series 3.x.xx voip
Auto call setup for xcal series 3.x.xx voipAuto call setup for xcal series 3.x.xx voip
Auto call setup for xcal series 3.x.xx voip
 
Getting Started with Raspberry Pi - DCC 2013.1
Getting Started with Raspberry Pi - DCC 2013.1Getting Started with Raspberry Pi - DCC 2013.1
Getting Started with Raspberry Pi - DCC 2013.1
 

Viewers also liked

In Multi-Hop Routing identifying trusted paths through TARF in Wireless sens...
In Multi-Hop Routing identifying trusted paths through TARF in  Wireless sens...In Multi-Hop Routing identifying trusted paths through TARF in  Wireless sens...
In Multi-Hop Routing identifying trusted paths through TARF in Wireless sens...IJMER
 
Arduino and Internet of Thinks: ShareIT TM: march 2010, TM
Arduino and Internet of Thinks: ShareIT TM: march 2010, TMArduino and Internet of Thinks: ShareIT TM: march 2010, TM
Arduino and Internet of Thinks: ShareIT TM: march 2010, TMAlexandru IOVANOVICI
 
Design & Implementation of Routing Protocol for WSN
Design & Implementation of Routing Protocol for WSNDesign & Implementation of Routing Protocol for WSN
Design & Implementation of Routing Protocol for WSNManish Kumar
 
HTTP/2 and QUICK protocols. Optimizing the Web stack for HTTP/2 era
HTTP/2 and QUICK protocols. Optimizing the Web stack for HTTP/2 eraHTTP/2 and QUICK protocols. Optimizing the Web stack for HTTP/2 era
HTTP/2 and QUICK protocols. Optimizing the Web stack for HTTP/2 erapeychevi
 
RIP RTCP RTSP
RIP RTCP RTSPRIP RTCP RTSP
RIP RTCP RTSPDev Heba
 
Web Application Firewalls Detection, Bypassing And Exploitation
Web Application Firewalls  Detection, Bypassing And ExploitationWeb Application Firewalls  Detection, Bypassing And Exploitation
Web Application Firewalls Detection, Bypassing And ExploitationSandro Gauci
 
On secure application of PHP wrappers
On secure application  of PHP wrappersOn secure application  of PHP wrappers
On secure application of PHP wrappersPositive Hack Days
 
Energy efficient routing in wireless sensor networks
Energy efficient routing in wireless sensor networksEnergy efficient routing in wireless sensor networks
Energy efficient routing in wireless sensor networksSpandan Spandy
 
New techniques in sql obfuscation, from DEFCON 20
New techniques in sql obfuscation, from DEFCON 20New techniques in sql obfuscation, from DEFCON 20
New techniques in sql obfuscation, from DEFCON 20Nick Galbreath
 
11011 a0449 secure routing wsn
11011 a0449 secure routing wsn11011 a0449 secure routing wsn
11011 a0449 secure routing wsnMuqeed Abdul
 
Black Hat: XML Out-Of-Band Data Retrieval
Black Hat: XML Out-Of-Band Data RetrievalBlack Hat: XML Out-Of-Band Data Retrieval
Black Hat: XML Out-Of-Band Data Retrievalqqlan
 
Methods to Bypass a Web Application Firewall Eng
Methods to Bypass a Web Application Firewall EngMethods to Bypass a Web Application Firewall Eng
Methods to Bypass a Web Application Firewall EngDmitry Evteev
 
libinjection: from SQLi to XSS  by Nick Galbreath
libinjection: from SQLi to XSS  by Nick Galbreathlibinjection: from SQLi to XSS  by Nick Galbreath
libinjection: from SQLi to XSS  by Nick GalbreathCODE BLUE
 
XXE Exposed: SQLi, XSS, XXE and XEE against Web Services
XXE Exposed: SQLi, XSS, XXE and XEE against Web ServicesXXE Exposed: SQLi, XSS, XXE and XEE against Web Services
XXE Exposed: SQLi, XSS, XXE and XEE against Web ServicesAbraham Aranguren
 
ORTC Library - Introduction
ORTC Library - IntroductionORTC Library - Introduction
ORTC Library - IntroductionErik Lagerway
 
Securing the Internet of Things
Securing the Internet of ThingsSecuring the Internet of Things
Securing the Internet of ThingsPaul Fremantle
 
Lie to Me: Bypassing Modern Web Application Firewalls
Lie to Me: Bypassing Modern Web Application FirewallsLie to Me: Bypassing Modern Web Application Firewalls
Lie to Me: Bypassing Modern Web Application FirewallsIvan Novikov
 
CloudFlare vs Incapsula vs ModSecurity
CloudFlare vs Incapsula vs ModSecurityCloudFlare vs Incapsula vs ModSecurity
CloudFlare vs Incapsula vs ModSecurityZero Science Lab
 

Viewers also liked (20)

In Multi-Hop Routing identifying trusted paths through TARF in Wireless sens...
In Multi-Hop Routing identifying trusted paths through TARF in  Wireless sens...In Multi-Hop Routing identifying trusted paths through TARF in  Wireless sens...
In Multi-Hop Routing identifying trusted paths through TARF in Wireless sens...
 
Arduino and Internet of Thinks: ShareIT TM: march 2010, TM
Arduino and Internet of Thinks: ShareIT TM: march 2010, TMArduino and Internet of Thinks: ShareIT TM: march 2010, TM
Arduino and Internet of Thinks: ShareIT TM: march 2010, TM
 
Design & Implementation of Routing Protocol for WSN
Design & Implementation of Routing Protocol for WSNDesign & Implementation of Routing Protocol for WSN
Design & Implementation of Routing Protocol for WSN
 
HTTP/2 and QUICK protocols. Optimizing the Web stack for HTTP/2 era
HTTP/2 and QUICK protocols. Optimizing the Web stack for HTTP/2 eraHTTP/2 and QUICK protocols. Optimizing the Web stack for HTTP/2 era
HTTP/2 and QUICK protocols. Optimizing the Web stack for HTTP/2 era
 
RIP RTCP RTSP
RIP RTCP RTSPRIP RTCP RTSP
RIP RTCP RTSP
 
Web Application Firewalls Detection, Bypassing And Exploitation
Web Application Firewalls  Detection, Bypassing And ExploitationWeb Application Firewalls  Detection, Bypassing And Exploitation
Web Application Firewalls Detection, Bypassing And Exploitation
 
On secure application of PHP wrappers
On secure application  of PHP wrappersOn secure application  of PHP wrappers
On secure application of PHP wrappers
 
Energy efficient routing in wireless sensor networks
Energy efficient routing in wireless sensor networksEnergy efficient routing in wireless sensor networks
Energy efficient routing in wireless sensor networks
 
New techniques in sql obfuscation, from DEFCON 20
New techniques in sql obfuscation, from DEFCON 20New techniques in sql obfuscation, from DEFCON 20
New techniques in sql obfuscation, from DEFCON 20
 
11011 a0449 secure routing wsn
11011 a0449 secure routing wsn11011 a0449 secure routing wsn
11011 a0449 secure routing wsn
 
Black Hat: XML Out-Of-Band Data Retrieval
Black Hat: XML Out-Of-Band Data RetrievalBlack Hat: XML Out-Of-Band Data Retrieval
Black Hat: XML Out-Of-Band Data Retrieval
 
Methods to Bypass a Web Application Firewall Eng
Methods to Bypass a Web Application Firewall EngMethods to Bypass a Web Application Firewall Eng
Methods to Bypass a Web Application Firewall Eng
 
libinjection: from SQLi to XSS  by Nick Galbreath
libinjection: from SQLi to XSS  by Nick Galbreathlibinjection: from SQLi to XSS  by Nick Galbreath
libinjection: from SQLi to XSS  by Nick Galbreath
 
WebRTC DataChannels demystified
WebRTC DataChannels demystifiedWebRTC DataChannels demystified
WebRTC DataChannels demystified
 
XXE Exposed: SQLi, XSS, XXE and XEE against Web Services
XXE Exposed: SQLi, XSS, XXE and XEE against Web ServicesXXE Exposed: SQLi, XSS, XXE and XEE against Web Services
XXE Exposed: SQLi, XSS, XXE and XEE against Web Services
 
ORTC Library - Introduction
ORTC Library - IntroductionORTC Library - Introduction
ORTC Library - Introduction
 
Securing the Internet of Things
Securing the Internet of ThingsSecuring the Internet of Things
Securing the Internet of Things
 
Lie to Me: Bypassing Modern Web Application Firewalls
Lie to Me: Bypassing Modern Web Application FirewallsLie to Me: Bypassing Modern Web Application Firewalls
Lie to Me: Bypassing Modern Web Application Firewalls
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
 
CloudFlare vs Incapsula vs ModSecurity
CloudFlare vs Incapsula vs ModSecurityCloudFlare vs Incapsula vs ModSecurity
CloudFlare vs Incapsula vs ModSecurity
 

Streaming status

  • 1. Streaming ========= Apple 3 Apple Quick Time Apple 4 Appstore Apple 6 FaceTime = Apple Apple 15 iTunes Apple 16 iTunes Mobile Mobile 36 Tmobile SIP 10 H.225 SIP 11 H.245 SIP 12 H.323 SIP 29 RTCP SIP 30 RTP SIP 31 RTSP SIP 32 RTSPS SIP 35 SIP Restricted 26 Pandora = US Restricted 27 Pandora Desktop App US Restricted 13 Hulu = (US) Restricted 14 Hulu Player(US) Browser PlugIn 1 Adobe Flash Player Browser 5 Dailymotion=2003-browsing,2003onwards-streaming Browser 7 freeetv = 400-br,400onwards-streaming Browser 8 Google Video = going to youtube.(other than this, video chat)https . search for video captured. Browser 9 Grooveshark = 300-br, Browser 18 Last.fm Web == 777-login, Browser 19 Live365 = Two Radio Streams Browser 20 MagicJack (HTTPS) Browser 23 Metacafe = Captured a stream Browser 24 movie2k = 5330 Browser 25 Netflix = One Movie Browser 28 Pandora.tv = browsing Browser 37 Ustream = Downloaded Browser 38 videobb = 1700 - br, Browser 42 YouTube 4067-br,Video-Streaming Browser 2 afreecaTV = 1531-browsing, Browser 40 Vonage = Home page,Paid Applications 17 Last.fm Scrobbler = Application Sw Applications 39 VLC Applications 41 Windows Media Player = 748-br,4832-music-selection,9000- vedio,Separe files 21 mck-ivpip 22 Megaco H-248 33 Shockwave Multimedia Player 34 SHOUTcast (Available) Proxy =========