User guide
Security command reference Security
4-89
iMG/RG Software Reference Manual (IPNetwork Functions)
Example --> security set trigger t3 secondaryendport 1933
See also SECURITY SET TRIGGER SECONDARYSTARTPORT
4.2.7.1.32 SECURITY SET TRIGGER SECONDARYSTARTPORT
Syntax
SECURITY POLICY <name> SET TRIGGER SECONDARYSTARTPORT <portnumber>
Description This command sets the start of the secondary port number range for an existing trigger.
It allows you to restrict the ports that a trigger will open, however, this is not usually nec-
essary.
Options The following table gives the range of values for each option that can be specified with
this command and a Default Value (if applicable).
Example --> security set trigger t3 secondarystartport 1923
See also SECURITY SET TRIGGER SECONDARYENDPORT
4.2.7.1.33 SECURITY SET TRIGGER SESSIONCHAINING
Syntax
SECURITY SET TRIGGER <name> SESSIONCHAINING {ENABLE | DISABLE}
Description This command determines whether a triggering protocol can be chained. If session chain-
ing is enabled, TCP dynamic sessions also become triggering sessions, which allows multi-
level session triggering.
Options The following table gives the range of values for each option that can be specified with
this command and a Default Value (if applicable).
portnumber Sets the end of the trigger’s secondary port range. 65535
Option Description Default Value
name An existing trigger. To display trigger names, use the
security list triggers command.
N/A
port Sets the start of the trigger’s secondary port range. 1024
Option Description Default Value
name An existing trigger. To display trigger names, use the secu-
rity list triggers command.
N/A
enable Enables TCP session chaining on an existing trigger. Disable
Option Description Default Value