User guide

Security command reference Security
4-87
iMG/RG Software Reference Manual (IPNetwork Functions)
Options The following table gives the range of values for each option that can be specified with
this command and a Default Value (if applicable).
Example --> security set trigger t5 binaryaddressreplacement enable
See also SECURITY SET TRIGGER ADDRESSREPLACEMENT
SECURITY LIST TRIGGERS
4.2.7.1.28 SECURITY SET TRIGGER MAXACTINTERVAL
Syntax SECURITY SET TRIGGER <name> MAXACTINTERVAL <interval>
Description This command sets the maximum activity interval limit on existing session entries for an
existing trigger.
Options The following table gives the range of values for each option that can be specified with
this command and a Default Value (if applicable).
Example --> security set trigger t2 maxactinterval 5000
See also SECURITY LIST TRIGGERS
4.2.7.1.29 SECURITY SET TRIGGER ENDPORT
Syntax SECURITY SET TRIGGER <name> ENDPORT <portnumber>
Description This command sets the end of the port number range for an existing trigger.
Option Description Default Value
name An existing trigger. To display trigger names, use the secu-
rity list triggers command.
N/A
enable Enables the use of binary address replacement on an exist-
ing trigger.
Disable
disable Disables the use of binary address replacement on an
existing trigger.
Option Description Default Value
name An existing trigger. To display trigger names, use the secu-
rity list triggers command.
N/A
interval Sets the maximum interval time (in milliseconds) between
the use of secondary port sessions. If a secondary port
opened by a trigger has not been used for the specified
time, it is closed.
N/A