User guide

Security Security command reference
iMG/RG Software Reference Manual (IPNetwork Functions)
4-88
Options The following table gives the range of values for each option that can be specified with
this command and a Default Value (if applicable).
Example --> security set trigger t3 endport 21
See also security set trigger startport
4.2.7.1.30 SECURITY SET TRIGGER STARTPORT
Syntax SECURITY POLICY <name> SET TRIGGER STARTPORT <portnumber>
Description This command sets the start of the port number range for an existing trigger.
Options The following table gives the range of values for each option that can be specified with
this command and a Default Value (if applicable).
Example --> security set trigger t3 startport 21
See also security set trigger endport
4.2.7.1.31 SECURITY SET TRIGGER SECONDARYENDPORT
Syntax SECURITY SET TRIGGER <name> SECONDARYENDPORT <portnumber>
Description This command sets the end of the secondary port number range for an existing trigger. It
allows you to restrict the ports that a trigger will open, however, this is not usually nec-
essary.
Options The following table gives the range of values for each option that can be specified with
this command and a Default Value (if applicable).
Option Description Default Value
name An existing trigger. To display trigger names, use the
security list triggers command.
N/A
portnumber Sets the end of the trigger port range. N/A
Option Description Default Value
name An existing trigger. To display trigger names, use
the security list triggers command.
N/A
port Sets the start of the trigger port range. N/A
Option Description Default Value
name An existing trigger. To display trigger names, use
the security list triggers command.
N/A