Configuring the Application Filter Module
Port Settings Tab
Use the settings on the Port Settings tab to tell the sensor to ignore traffic with specific TCP or UDP
port numbers or ranges of port numbers as the source port, the destination port, or both source
and destination ports.
The following table provides common port numbers. The original source for this information was
http://www.iana.org.
Table 2-1 Common Port Numbers
Protocol
ftp-data
ftp
ssh
ssh
telnet
smtp
domain
domain
finger
finger
http
pop2
pop2
pop3
pop3
sunrpc
sunrpc
ident
nntp
nntp
netbios-ns
netbios-ns
netbios-dgm
netbios-dgm
netbios-ssn
netbios-ssn
imap
imap
2-8 Creating Network Sensor Policies
Port Number/Type
20/tcp
21/tcp
22/tcp
22/udp
23/tcp
25/tcp
53/tcp
53/udp
79/tcp
79/udp
80/tcp
109/tcp
109/udp
110/tcp
110/udp
111/tcp
111/udp
13/tcp
119/tcp
119/udp
137/tcp
137/udp
138/tcp
138/udp
139/tcp
139/udp
143/tcp
143/udp
Description
File Transfer [Default Data]
File Transfer [Control]
SSH Remote Login Protocol
SSH Remote Login Protocol
Telnet
Simple Mail Transfer
Domain Name Server
Domain Name Server
Finger
Finger
World Wide Web HTTP
Post Office Protocol - Version 2
Post Office Protocol - Version 2
Post Office Protocol - Version 3
Post Office Protocol - Version 3
SUN Remote Procedure Call
SUN Remote Procedure Call
Network News Transfer Protocol
Network News Transfer Protocol
NETBIOS Name Service
NETBIOS Name Service
NETBIOS Datagram Service
NETBIOS Datagram Service
NETBIOS Session Service
NETBIOS Session Service
Internet Message Access Protocol
Internet Message Access Protocol
Need help?
Do you have a question about the Intrusion Prevention System and is the answer not in the manual?