Security command reference
Security
4-89
iMG/RG Software Reference Manual (IPNetwork Functions)
Example
--> security set trigger t3 secondaryendport 1933
See also
SECURITY SET TRIGGER SECONDARYSTARTPORT
4.2.7.1.32 SECURITY SET TRIGGER SECONDARYSTARTPORT
Syntax
SECURITY POLICY <name> SET TRIGGER SECONDARYSTARTPORT <portnumber>
Description
This command sets the start of the secondary port number range for an existing trigger.
It allows you to restrict the ports that a trigger will open, however, this is not usually nec-
essary.
Options
The following table gives the range of values for each option that can be specified with
this command and a Default Value (if applicable).
Example
--> security set trigger t3 secondarystartport 1923
See also
SECURITY SET TRIGGER SECONDARYENDPORT
4.2.7.1.33 SECURITY SET TRIGGER SESSIONCHAINING
Syntax
SECURITY SET TRIGGER <name> SESSIONCHAINING {ENABLE | DISABLE}
Description
This command determines whether a triggering protocol can be chained. If session chain-
ing is enabled, TCP dynamic sessions also become triggering sessions, which allows multi-
level session triggering.
Options
The following table gives the range of values for each option that can be specified with
this command and a Default Value (if applicable).
portnumber
Sets the end of the trigger’s secondary port range.
65535
Option
Description
Default Value
name
An existing trigger. To display trigger names, use the
security list triggers command.
N/A
port
Sets the start of the trigger’s secondary port range.
1024
Option
Description
Default Value
name
An existing trigger. To display trigger names, use the secu-
rity list triggers command.
N/A
enable
Enables TCP session chaining on an existing trigger.
Disable
Option
Description
Default Value