When you create a policy, you can specify predefined UNIX applications for the policy.
|
Before You Begin |
|---|
|
For background information, read Security Policy Applications. |
Table 88 lists the predefined UNIX applications. Each entry includes the name of the application, the default or assigned port, and a description of the application.
Table 88: Predefined UNIX Applications