When you create a policy, you can specify predefined UNIX applications for the policy.
|
Before You Begin |
|---|
|
For background information, read Security Policy Applications. |
Table 45 lists the predefined UNIX applications. Each entry includes the name of the application, the default or assigned port, and a description of the application.
Table 45: Predefined UNIX Applications