Page 386 / 998 Scroll up to view Page 381 - 385
Security
Security command reference
iMG/RG Software Reference Manual (IPNetwork Functions)
4-84
Options
The following table gives the range of values for each option that can be specified with
this command and a Default Value (if applicable).
Example
--> security add trigger t2 netmeeting
See also
SECURITY LIST TRIGGERS
SECURITY ADD TRIGGER TCP|UDP
4.2.7.1.22 SECURITY CLEAR TRIGGERS
Syntax
security clear triggers
Description
This command deletes all triggers that were added to the
Security
module using the
security add trigger commands.
Example
--> security clear triggers
See also
security delete trigger
4.2.7.1.23 SECURITY DELETE TRIGGER
Syntax
SECURITY DELETE TRIGGER <name>
Description
This command deletes a single trigger that was added to the
Security
module using the
security add trigger commands.
Options
The following table gives the range of values for each option that can be specified with
this command and a Default Value (if applicable).
Example
--> security delete trigger t2
See also
SECURITY LIST TRIGGERS
SECURITY CLEAR TRIGGERS
4.2.7.1.24 SECURITY LIST TRIGGERS
Syntax
security list triggers
Option
Description
Default Value
name
An arbitrary name that identifies the trigger. It can be
made up of one or more letters or a combination of let-
ters and digits, but it cannot start with a digit.
N/A
Option
Description
Default Value
name
An existing trigger. To display trigger names, use the
security list trigger command.
N/A
Page 387 / 998
Security command reference
Security
4-85
iMG/RG Software Reference Manual (IPNetwork Functions)
Description
This command lists triggers that were added to the
Security
module using the security
add trigger command. It displays the following information about triggers:
Trigger ID number
Trigger name
Trigger transport type (TCP or UDP)
Port range
Secondary port range
Interval
Example
--> security list triggers
Security Triggers:
ID| Name | Type| Port Range | Sec Port Range |Interval
--|------|-----|------------|----------------|--------
1|
tr1 | tcp | 21
- 21
| 1720 - 1720
|3000
------------------------------------------------------
See also
SECURITY SHOW TRIGGER
4.2.7.1.25 SECURITY SET TRIGGER ADDRESSREPLACEMENT
Syntax
SECURITY SET TRIGGER <name> ADDRESSREPLACEMENT
{NONE|TCP|UDP|BOTH}
Description
The settings in this command are only effective if you enable address translation using the
command SECURITY SET TRIGGER BINARYADDRESSREPLACEMENT.
This command allows you to specify what type of address replacement is set on a trigger.
Incoming packets are searched in order to find their embedded IP address. The address is
then replaced by the correct inside host IP address, and
NAT
translates the packets to
the correct destination.
You can specify whether you want to carry out address replacement on TCP packets, on
UDP packets or on both TCP and UDP packets.
Options
The following table gives the range of values for each option that can be specified with
this command and a Default Value (if applicable).
Option
Description
Default Value
name
A name that identifies a trigger. To display trigger names,
use the security list triggers command.
N/A
none
Disables address replacement.
None
Page 388 / 998
Security
Security command reference
iMG/RG Software Reference Manual (IPNetwork Functions)
4-86
Example
--> security set trigger t2 addressreplacement tcp
See also
SECURITY SET TRIGGER BINARYADDRESSREPLACEMENT
4.2.7.1.26 SECURITY SET TRIGGER MULTIHOST
Syntax
SECURITY SET TRIGGER <name> MULTIHOST {ENABLE | DISABLE}
Description
This command sets whether a secondary session can be initiated to/from different
remote hosts or the same remote host on an existing trigger.
Options
The following table gives the range of values for each option that can be specified with
this command and a Default Value (if applicable).
Example
--> security set trigger t1 multihost enable
See also
SECURITY LIST TRIGGERS
4.2.7.1.27 SECURITY SET TRIGGER BINARYADDRESSREPLACEMENT
Syntax
SECURITY SET TRIGGER <name> BINARYADDRESSREPLACEMENT {ENABLE | DISA-
BLE}
Description
This command enables/disables binary address replacement on an existing trigger. You
can then set the type of address replacement (TCP, UDP, both or none) using the com-
mand SECURITY SET TRIGGER ADDRESSREPLACEMENT.
tcp
Sets address replacement on TCP packets for an existing
trigger.
udp
Sets address replacement on UDP packets for an existing
trigger.
both
Sets address replacement on TCP and UDP packets for an
existing trigger.
Option
Description
Default Value
name
An existing trigger. To display trigger names, use the secu-
rity list triggers command.
N/A
enable
A secondary session can be initiated to/from different
remote hosts.
Disable
disable
A secondary session can only be initiated to/from the
same remote host.
Option
Description
Default Value
Page 389 / 998
Security command reference
Security
4-87
iMG/RG Software Reference Manual (IPNetwork Functions)
Options
The following table gives the range of values for each option that can be specified with
this command and a Default Value (if applicable).
Example
--> security set trigger t5 binaryaddressreplacement enable
See also
SECURITY SET TRIGGER ADDRESSREPLACEMENT
SECURITY LIST TRIGGERS
4.2.7.1.28 SECURITY SET TRIGGER MAXACTINTERVAL
Syntax
SECURITY SET TRIGGER <name> MAXACTINTERVAL <interval>
Description
This command sets the maximum activity interval limit on existing session entries for an
existing trigger.
Options
The following table gives the range of values for each option that can be specified with
this command and a Default Value (if applicable).
Example
--> security set trigger t2 maxactinterval 5000
See also
SECURITY LIST TRIGGERS
4.2.7.1.29 SECURITY SET TRIGGER ENDPORT
Syntax
SECURITY SET TRIGGER <name> ENDPORT <portnumber>
Description
This command sets the end of the port number range for an existing trigger.
Option
Description
Default Value
name
An existing trigger. To display trigger names, use the secu-
rity list triggers command.
N/A
enable
Enables the use of binary address replacement on an exist-
ing trigger.
Disable
disable
Disables the use of binary address replacement on an
existing trigger.
Option
Description
Default Value
name
An existing trigger. To display trigger names, use the secu-
rity list triggers command.
N/A
interval
Sets the maximum interval time (in milliseconds) between
the use of secondary port sessions. If a secondary port
opened by a trigger has not been used for the specified
time, it is closed.
N/A
Page 390 / 998
Security
Security command reference
iMG/RG Software Reference Manual (IPNetwork Functions)
4-88
Options
The following table gives the range of values for each option that can be specified with
this command and a Default Value (if applicable).
Example
--> security set trigger t3 endport 21
See also
security set trigger startport
4.2.7.1.30 SECURITY SET TRIGGER STARTPORT
Syntax
SECURITY POLICY <name> SET TRIGGER STARTPORT <portnumber>
Description
This command sets the start of the port number range for an existing trigger.
Options
The following table gives the range of values for each option that can be specified with
this command and a Default Value (if applicable).
Example
--> security set trigger t3 startport 21
See also
security set trigger endport
4.2.7.1.31 SECURITY SET TRIGGER SECONDARYENDPORT
Syntax
SECURITY SET TRIGGER <name> SECONDARYENDPORT <portnumber>
Description
This command sets the end of the secondary port number range for an existing trigger. It
allows you to restrict the ports that a trigger will open, however, this is not usually nec-
essary.
Options
The following table gives the range of values for each option that can be specified with
this command and a Default Value (if applicable).
Option
Description
Default Value
name
An existing trigger. To display trigger names, use the
security list triggers command.
N/A
portnumber
Sets the end of the trigger port range.
N/A
Option
Description
Default Value
name
An existing trigger. To display trigger names, use
the security list triggers command.
N/A
port
Sets the start of the trigger port range.
N/A
Option
Description
Default Value
name
An existing trigger. To display trigger names, use
the security list triggers command.
N/A

Rate

4 / 5 based on 3 votes.

Popular Allied-Telesis Models

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top