
173
Defining your security environment
Understanding how protocols affect traffic
Viewing reserved ports
When you create new protocols, make sure that the ports that you use are not already used by other
protocols that you plan to use in the same service groups. Problems may arise if you create a protocol
that uses a port that is already in use by the security gateway.
You can determine whether a port is in use by:
■
Viewing port assignments for predefined protocols
■
Viewing port usage for all protocols
This includes custom protocols.
sunrpc_tcp
TCP-based
111
sunrpc_udp
UDP-based
111
syslog
UDP-based
514
systat
TCP-based
11
t120
TCP-based
1503
tacacs
TCP-based
49
TCP
IP-based
n/a
tftp
UDP-based
69
tftp_1758
UDP-based
1758
tftp_1758_tcp
TCP-based
1758
tftp_1818
UDP-based
1818
tftp_1818_tcp
TCP-based
1818
tftp_tcp
TCP-based
69
UDP
IP-based
n/a
udp_encap
UDP-based
786
uucp
TCP-based
540
visualizer
TCP-based
417
wapdgram
UDP-based
9200
who
UDP-based
513
whois
TCP-based
43
x-server0
TCP-based
6000
x-server1
TCP-based
6001
Table 6-2
Supplied protocols with no associated application proxy (Continued)
Protocol name
Type
Port
Содержание Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Страница 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Страница 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Страница 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Страница 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Страница 319: ...318 Controlling traffic at the security gateway Blocking inappropriate content with content filtering...
Страница 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Страница 409: ...408 Providing remote access using VPN tunnels Multicast traffic through gateway to gateway IPsec tunnels...
Страница 509: ...508 Generating reports Upgrade reports...
Страница 553: ...552 Advanced system settings Configuring advanced options...
Страница 557: ...556 SSL server certificate management Installing a signed certificate...
Страница 861: ...860 Index...