7-25
User
OL-26572-01
Chapter
Configuring
Port
Misuse
Choose
IM—Instant
to
P2P—Peer-to-peer
Tunneling—Tunneling
be
Request
A
and
compliance
a.
Choose
Note
The
available
to
depending
b.
In
the
Request
is
to
Strict
Compliance
Transfer
An
transfer-encoding
applied
In
Chunked—The
message
chunks.
Compress—The
produced
UNIX
compress.
Deflate—The
format
combination
compression
Gzip—The
as
Identity—The
encoding
which
of
Table
HTTP
Condition
Description