Port Syntax in Intrusion Rules
The system uses a specific type of syntax to define the port numbers used in rule headers.
Note | The system ignores port definitions in an intrusion rule header
when the protocol is set to
|
You can list ports by separating the ports with commas, as shown in the following example:
80, 8080, 8138, 8600-9000, !8650-8675
Optionally, the following example shows how you can surround a port list with brackets, which was required in previous software versions but is no longer required:
[80, 8080, 8138, 8600-9000, !8650-8675]
Note that you must surround negated port lists in brackets, as shown in the following example:
![20, 22, 23]
The following table summarizes the syntax you can use:
To Specify... |
Use |
Example |
---|---|---|
any port |
|
|
a specific port |
the port number |
|
a range of ports |
a dash between the first and last port number in the range |
|
all ports less than or equal to a specific port |
a dash before the port number |
|
all ports greater than or equal to a specific port |
a dash after the port number |
|
all ports except a specific port or range of ports |
the
Note that you can logically use negation with all port designations except any, which if negated would indicate no port. |
|
all ports defined by a port variable |
the variable name, in uppercase letter, preceded by
|
|
all ports except ports defined by a port variable |
the variable name, in uppercase letter, preceded by
|
|