Allied Telesis AT-iMG634 - R2 Guía de usuario Pagina 389

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 998
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 388
Security command reference Security
4-87
iMG/RG Software Reference Manual (IPNetwork Functions)
Options The following table gives the range of values for each option that can be specified with
this command and a Default Value (if applicable).
Example --> security set trigger t5 binaryaddressreplacement enable
See also SECURITY SET TRIGGER ADDRESSREPLACEMENT
SECURITY LIST TRIGGERS
4.2.7.1.28 SECURITY SET TRIGGER MAXACTINTERVAL
Syntax SECURITY SET TRIGGER <name> MAXACTINTERVAL <interval>
Description This command sets the maximum activity interval limit on existing session entries for an
existing trigger.
Options The following table gives the range of values for each option that can be specified with
this command and a Default Value (if applicable).
Example --> security set trigger t2 maxactinterval 5000
See also SECURITY LIST TRIGGERS
4.2.7.1.29 SECURITY SET TRIGGER ENDPORT
Syntax SECURITY SET TRIGGER <name> ENDPORT <portnumber>
Description This command sets the end of the port number range for an existing trigger.
Option Description Default Value
name An existing trigger. To display trigger names, use the secu-
rity list triggers command.
N/A
enable Enables the use of binary address replacement on an exist-
ing trigger.
Disable
disable Disables the use of binary address replacement on an
existing trigger.
Option Description Default Value
name An existing trigger. To display trigger names, use the secu-
rity list triggers command.
N/A
interval Sets the maximum interval time (in milliseconds) between
the use of secondary port sessions. If a secondary port
opened by a trigger has not been used for the specified
time, it is closed.
N/A
Vista de pagina 388
1 2 ... 384 385 386 387 388 389 390 391 392 393 394 ... 997 998

Comentarios a estos manuales

Sin comentarios