Zyxel USG 1900 [178/438] Command description

Zyxel ZyWALL 1100 [178/438] Command description
Chapter 26 Secure Policy
ZyWALL / USG (ZLD) CLI Reference Guide
178
[no] service service_name Sets the service to which the rule applies. The no command
resets the service settings to the default (any). any means
all services.
[no] sourceip address_object Sets the source IP address(es). The no command resets
the source IP address(es) to the default (any). any
means
all IP addresses.
[no] sourceip6 address_object Sets the source IP address(es). The no command resets
the source IP address(es) to the default (any). any
means
all IP addresses.
[no] sourceport {tcp|udp} {eq <1..65535>|range
<1..65535> <1..65535>}
Sets the source port for a secure policy rule. The no
command removes the source port from the rule.
[no] to {zone_object|ZyWALL} Sets the zone to which the packets are sent. The
no
command removes the zone to which the packets are sent
and resets it to the default (any). any means all interfaces
or VPN tunnels.
[no] user user_name Sets a user-aware secure policy rule. The rule is activated
only when the specified user logs into the system. The
no
command resets the user name to the default (any). any
means all users.
Subcommands cannot be used with secure-policy6.
secure-policy <profile name> Creates a secure policy rule. You may use 1-31
alphanumeric characters, underscores(
_), or dashes (-),
but the first character cannot be a number. This value is
case-sensitive.
[no] cf-profile <profile name> {[no log]|[log by-
profile]} {activate | deactivate}
Applies the (already-created) named anti- x profile to
traffic that matches the secure-policy rule. Log by-
profile generates a log for all traffic that matches criteria
in the anti- x profile. no log does turns off logging and
overrides the anti- x profile log setting. The no command
does not apply the named anti- x profile to traffic that
matches the secure-policy rule.
[no] as-profile <profile name> {[no log]|[log by-
profile]} {activate | deactivate}
Applies the (already-created) named anti- x profile to
traffic that matches the secure-policy rule. Log by-
profile generates a log for all traffic that matches criteria
in the anti- x profile. no log does turns off logging and
overrides the anti- x profile log setting. The no command
does not apply the named anti- x profile to traffic that
matches the secure-policy rule.
[no] av-profile <profile name>{[no log]|[log by-
profile]} {activate | deactivate}
Applies the (already-created) named anti- x profile to
traffic that matches the secure-policy rule. Log by-
profile generates a log for all traffic that matches criteria
in the anti- x profile. no log does turns off logging and
overrides the anti- x profile log setting. The no command
does not apply the named anti- x profile to traffic that
matches the secure-policy rule.
[no] idp-profile <profile name> {[no log]|[log by-
profile]} {activate | deactivate}
Applies the (already-created) named anti- x profile to
traffic that matches the secure-policy rule. Log by-
profile generates a log for all traffic that matches criteria
in the anti- x profile. no log does turns off logging and
overrides the anti- x profile log setting. The no command
does not apply the named anti- x profile to traffic that
matches the secure-policy rule.
Table 88 firewall Sub-commands (continued)
COMMAND DESCRIPTION

Содержание

Похожие устройства

Скачать