User guide
Security command reference Security
4-91
iMG/RG Software Reference Manual (IPNetwork Functions)
Description This command displays information about a single trigger that was added to the Security
module using the security add trigger command. The following trigger information is dis-
played:
• Trigger name
• Transport type (TCP or UDP)
• Start of the port range
• End of the port range
• Multiple host permission (true/false)
• Maximum activity interval (in milliseconds)
• Session chaining permission (true/false)
• Session chaining on UDP permission (true/false)
• Binary address replacement permission (true/false)
• Address translation type (UDP, TCP, none or both)
Options The following table gives the range of values for each option that can be specified with
this command and a Default Value (if applicable).
Example --> security show trigger t2
Security Trigger: t2
Transport Type: tcp
Starting port number: 1000
Ending port number: 1000
Allow multiple hosts: false
Max activity interval: 30000
Session chaining: false
Session chaining on UDP: false
Binary address replacement: false
Address translation type: none
See also SECURITY LIST TRIGGERS
Option Description Default Value
name An existing trigger. To display trigger names, use the
security list triggers command.
N/A