Port Syntax in Intrusion Rules
The system uses a specific type of syntax to define the port numbers used in rule headers.
Note  | The system ignores port definitions in an intrusion rule header
			 when the protocol is set to 
			   | 
You can list ports by separating the ports with commas, as shown in the following example:
80, 8080, 8138, 8600-9000, !8650-8675
 
		Optionally, the following example shows how you can surround a port list with brackets, which was required in previous software versions but is no longer required:
[80, 8080, 8138, 8600-9000, !8650-8675]
 
		Note that you must surround negated port lists in brackets, as shown in the following example:
![20, 22, 23]
 
		The following table summarizes the syntax you can use:
|  
				   To Specify...  |  
				   Use  |  
				   Example  | 
|---|---|---|
|  
				   any port  |  
				   
  |  
				   
  | 
|  
				   a specific port  |  
				   the port number  |  
				   
  | 
|  
				   a range of ports  |  
				   a dash between the first and last port number in the range  |  
				   
  | 
|  
				   all ports less than or equal to a specific port  |  
				   a dash before the port number  |  
				   
				 | 
|  
				   all ports greater than or equal to a specific port  |  
				   a dash after the port number  |  
				   
				 | 
|  
				   all ports except a specific port or range of ports  |  
				   the 
					  Note that you can logically use negation with all port designations except any, which if negated would indicate no port.  |  
				   
				 | 
|  
				   all ports defined by a port variable  |  
				   the variable name, in uppercase letter, preceded by 
					   |  
				   
  | 
|  
				   all ports except ports defined by a port variable  |  
				   the variable name, in uppercase letter, preceded by 
					   |  
				   
  |