Zyxel USG 40 [10/438] Chapter 25 layer 2 isolation 70

Zyxel ZyWALL 1100 [10/438] Chapter 25 layer 2 isolation 70
Table of Contents
ZyWALL / USG (ZLD) CLI Reference Guide
10
22.2 ALG Commands ............................................................................................................................160
22.3 ALG Commands Example .............................................................................................................161
Chapter 23
UPnP ..................................................................................................................................................163
23.1 UPnP and NAT-PMP Overview .....................................................................................................163
23.2 UPnP and NAT-PMP Commands ..................................................................................................163
23.3 UPnP & NAT-PMP Commands Example ......................................................................................164
Chapter 24
IP/MAC Binding.................................................................................................................................167
24.1 IP/MAC Binding Overview .............................................................................................................167
24.2 IP/MAC Binding Commands .........................................................................................................167
24.3 IP/MAC Binding Commands Example ..........................................................................................168
Chapter 25
Layer 2 Isolation ...............................................................................................................................170
25.1 Layer 2 Isolation Overview ............................................................................................................170
25.2 Layer 2 Isolation Commands ........................................................................................................171
25.2.1 Layer 2 Isolation White List Sub-Commands ......................................................................171
25.3 Layer 2 Isolation Commands Example .........................................................................................172
Chapter 26
Secure Policy ....................................................................................................................................173
26.1 Secure Policy Overview ................................................................................................................173
26.2 Secure Policy Commands .............................................................................................................174
26.2.1 Secure Policy Sub-Commands ............................................................................................177
26.2.2 Secure Policy Command Examples ....................................................................................179
26.3 Session Limit Commands .............................................................................................................181
26.4 ADP Commands Overview ...........................................................................................................183
26.4.1 ADP Command Input Values ...............................................................................................184
26.4.2 ADP Activation Commands .................................................................................................184
26.4.3 ADP Global Profile Commands ...........................................................................................184
26.4.4 ADP Zone-to-Zone Rule Commands ...................................................................................184
26.4.5 ADP Add/Edit Profile Commands ........................................................................................185
Chapter 27
Web Authentication ..........................................................................................................................189
27.1 Web Authentication Overview .......................................................................................................189
27.2 Web Authentication Commands ....................................................................................................189
27.2.1 web-auth policy Sub-commands .........................................................................................190
27.3 SSO Overview ...............................................................................................................................191
27.3.1 SSO Configuration Commands ...........................................................................................191

Содержание

Похожие устройства