Protocol or port bindings allow you to specify the protocol that an attack uses to enter your network. You can specify the name of the network protocol, or the protocol number.
![]() |
Note: Specify either the service or the protocol binding in a custom attack. In case you specify both, the service binding takes precedence. |
Table 103: Supported Protocols and Protocol Numbers
|
Protocol Name |
Protocol Number |
|---|---|
|
IGMP |
2 |
|
IPIP |
4 |
|
EGP |
8 |
|
PUP |
12 |
|
TP |
29 |
|
IPV6 |
41 |
|
ROUTING |
43 |
|
FRAGMENT |
44 |
|
RSVP |
46 |
|
GRE |
47 |
|
ESP |
50 |
|
AH |
51 |
|
ICMPV6 |
58 |
|
NONE |
59 |
|
DSTOPTS |
60 |
|
MTP |
92 |
|
ENCAP |
98 |
|
PIM |
103 |
|
COMP |
108 |
|
RAW |
255 |
Table 104 displays sample formats for key protocols.
Table 104: Sample Formats for Protocols