When you create a policy, you can specify predefined security and tunnel applications for the policy.
|
Before You Begin |
|---|
|
For background information, read Security Policy Applications. |
Table 83 lists each supported application and gives the default port(s) and a description of each entry.
Table 83: Supported Applications