Which protocols are supported by NQA

11

In V200R003C00 earlier versions and V200R003C00 versions, network quality analysis (NQA) supports:
-DHCP
-DNS
-FTP
-HTTP
-ICMP
-JITTER
-SNMP
-TCP
-TRACE
-UDP

In V200R003C00 later versions, network quality analysis (NQA) supports:
-DHCP
-DNS
-FTP
-HTTP
-ICMP
-JITTER
-LSPPING
-LSPTRACE
-SNMP
-TCP
-TRACE
-UDP

Other related questions:
What is NQA association mechanism of the AR router
NQA association mechanism: Association indicates that NQA provides detection and notifies the associated module of the detection result. Then the associated module processes services based on the detection result. NQA can be associated with VRRP, static route, backup interface, IGMP proxy, IP address pool, DNS server, and PBR. Static route is used as an example: A static route with the next hop address of 192.168.0.88 is configured. If the next hop address of 192.168.0.88 is reachable, the static route is valid. If the next hop address of 192.168.0.88 is unreachable, the static route is invalid. After association is configured, the static route can be determined in real time. If NQA detects that the next hop address of 192.168.0.88 is unreachable, NQA notifies the static route module. The static route module determines that the static route is invalid.

Which Protocols Does a Security Group Support?

The protocol used by a security group can be set to TCP, UDP, ICMP, or ANY. ANY indicates that the security group takes effect for all protocols. If the TCP or UDP protocol is selected, configure ports 1 to 65535 for the protocols to access the security group. If the ICMP protocol is selected, you can set the ICMP protocol type. The default value is ANY.


Which encryption protocols does the AR support
The AR supports Authentication Header (AH) and Encapsulating Security Payload (ESP) protocols. Their differences are as follows: -AH: provides data origin authentication, data integrity check, and anti-replay. The sender performs the hash algorithm on the IP payload and all header fields of an IP packet except for variable fields to generate a message digest. The receiver recalculates the message digest according to the received IP packet and compares the two message digests to determine whether the IP packet has been modified during transmission. AH does not encrypt the IP payload. AH applies to non-confidential data transmission. -ESP: provides data encryption in addition to the functions provided by the AH protocol. ESP can encrypt and authenticate the IP payload but does not protect the IP packet header. ESP applies to confidential data transmission. AH and ESP can be used independently or together. When AH and ESP are used together, ESP and AH headers are encapsulated in sequence, enhancing security.

If you have more questions, you can seek help from following ways:
To iKnow To Live Chat
Scroll to top