TMS zl Management and Configuration Guide ST.1.0.090213
A-64
Threat Management Services zl Module Command-Line Reference
Global Configuration Context
Replace <target address> with one of the following options:
• any
• <IP address>
• address <address object>
Replace <protocol> with one of the following options:
• < tcp | udp > < port | range <start port> <end port> >
• service <service object>
See Table A-21 for available services.
Replace <port> with the ports allowed for dynamic negotiation.
Replace <start port> and <end port> with the port range allowed for
dynamic negotiation.
To delete a port trigger policy, type the following command:
Syntax: [no] port-trigger <policy name>
Replace <policy name> with the name you want to assign to the policy. It is
good practice to specify a policy name that reflects the services involved in
the trigger.
To add or remove ports to an existing policy, type the following command:
Syntax: port-trigger <policy name> < add | remove > < inbound | outbound >
< tcp | udp > < port |[range <start port> <end port> >
Replace <policy name> with the name of the policy that you are editing.
Table A-21. Services Available
aol bgp biff bootpc
bootps chargen citrix-ica cmd
ctiqbe daytime discard-tcp discard-udp
dns-tcp dns-udp dnsix echo-tcp
echo-udp exec finger ftp
ftp-data gopher h323 hostname
http https ident imap4
ipsec-nat-t-tcp ipsec-nat-t-udp irc isakmp
kerberos-tcp kerberos-udp klogin kshell
l2tp-tcp l2tp-udp ldap ldaps
login lotusnotes lpd mobile-ip
nameserver netbios-dgm netbios-ns netbios-ssn