When you create a policy, you can specify predefined UNIX applications for the policy.
Before You Begin |
---|
For background information, read Security Policy Applications. |
Table 35 lists the predefined UNIX applications. Each entry includes the name of the application, the default or assigned port, and a description of the application.
Table 35: Predefined UNIX Applications