SMG-700 User`s Guide V1.00 (Nov 2004)

SMG-700 User`s Guide V1.00 (Nov 2004)
ZyWALL (ZLD)
CLI Reference Guide
Version 2.20, 2.21
2/2011
Edition 3
DEFAULT LOGIN
User Name admin
Password
1234
www.zyxel.com
About This CLI Reference Guide
About This CLI Reference Guide
Intended Audience
This manual is intended for people who want to configure ZLD-based ZyWALLs via
Command Line Interface (CLI). You should have at least a basic knowledge of TCP/IP
networking concepts and topology. Generally, it is organized by feature as outlined in the web
configurator.
"
This guide is intended as a command reference for a series of products.
Therefore many commands or command options in this guide may not be
available in your product. See your User’s Guide for a list of supported
features and details about feature implementation.
Please refer to www.zyxel.com or your product’s CD for product specific User Guides and
product certifications.
How To Use This Guide
1 Read Chapter 1 on page 11 for how to access and use the CLI (Command Line
Interface).
2 Read Chapter 2 on page 27 to learn about the CLI user and privilege modes.
3 Subsequent chapters are arranged by menu item as defined in the web configurator. Read
each chapter carefully for detailed information on that menu item.
"
Some features cannot be configured in both the web configurator and CLI.
CLI Reference Guide Feedback
Help us help you. Send all Reference Guide-related comments, questions or suggestions for
improvement to the following address, or use e-mail instead. . Thank you!
The Technical Writing Team,
ZyXEL Communications Corp.,
6 Innovation Road II,
Science-Based Industrial Park,
Hsinchu, 300, Taiwan.
E-mail: techwriters@zyxel.com.tw
ZyWALL (ZLD) CLI Reference Guide
3
Document Conventions
Document Conventions
Warnings and Notes
These are how warnings and notes are shown in this User’s Guide.
1
"
Warnings tell you about things that could harm you or your device.
Notes tell you other important information (for example, other things you may
need to configure or helpful tips) or recommendations.
Syntax Conventions
• The ZLD-based ZyWALL may be referred to as the “ZyWALL”, the “device”, the
“system” or the “product” in this User’s Guide.
• Product labels, screen names, field labels and field choices are all in bold font.
• A key stroke is denoted by square brackets and uppercase text, for example, [ENTER]
means the “enter” or “return” key on your keyboard.
• “Enter” means for you to type one or more characters and then press the [ENTER] key.
“Select” or “choose” means for you to use one of the predefined choices.
• A right angle bracket ( > ) within a screen name denotes a mouse click. For example,
Maintenance > Log > Log Setting means you first click Maintenance in the navigation
panel, then the Log sub menu and finally the Log Setting tab to get to that screen.
• Units of measurement may denote the “metric” value or the “scientific” value. For
example, “k” for kilo may denote “1000” or “1024”, “M” for mega may denote “1000000”
or “1048576” and so on.
• “e.g.,” is a shorthand for “for instance”, and “i.e.,” means “that is” or “in other words”.
4
ZyWALL (ZLD) CLI Reference Guide
Document Conventions
Icons Used in Figures
Figures in this User’s Guide may use the following generic icons. The ZyWALL icon is not an
exact representation of your device.
ZyWALL
Computer
Notebook computer
Server
Firewall
Telephone
Switch
Router
ZyWALL (ZLD) CLI Reference Guide
5
Document Conventions
6
ZyWALL (ZLD) CLI Reference Guide
Contents Overview
Contents Overview
Introduction .............................................................................................................................. 9
Command Line Interface ............................................................................................................11
User and Privilege Modes ......................................................................................................... 27
Object Reference ....................................................................................................................... 31
Status ......................................................................................................................................... 33
Registration ............................................................................................................................... 37
Network ................................................................................................................................... 45
Interfaces ................................................................................................................................... 47
Trunks ........................................................................................................................................ 85
Route ......................................................................................................................................... 91
Routing Protocol ........................................................................................................................ 99
Zones ....................................................................................................................................... 103
DDNS ...................................................................................................................................... 107
Virtual Servers ..........................................................................................................................111
HTTP Redirect ..........................................................................................................................117
ALG ......................................................................................................................................... 121
Firewall .................................................................................................................................. 125
Firewall .................................................................................................................................... 127
VPN ........................................................................................................................................ 135
IPSec VPN ............................................................................................................................... 137
SSL VPN ................................................................................................................................. 147
L2TP VPN ................................................................................................................................ 153
Application Patrol ................................................................................................................ 161
Application Patrol ..................................................................................................................... 163
Anti-X .................................................................................................................................... 175
Anti-Virus ................................................................................................................................. 177
IDP Commands ....................................................................................................................... 185
Content Filtering ...................................................................................................................... 203
Anti-Spam ................................................................................................................................ 215
Device HA ............................................................................................................................. 225
Device HA ................................................................................................................................ 227
ZyWALL (ZLD) CLI Reference Guide
7
Contents Overview
Objects .................................................................................................................................. 235
User/Group .............................................................................................................................. 237
Addresses ................................................................................................................................ 245
Services ................................................................................................................................... 249
Schedules ................................................................................................................................ 253
AAA Server .............................................................................................................................. 255
Authentication Objects ............................................................................................................. 263
Certificates ............................................................................................................................... 267
ISP Accounts ........................................................................................................................... 273
SSL Application ....................................................................................................................... 277
Endpoint Security .................................................................................................................... 281
System .................................................................................................................................. 289
System ..................................................................................................................................... 291
System Remote Management ................................................................................................. 299
Maintenance ......................................................................................................................... 313
File Manager ............................................................................................................................ 315
Logs ......................................................................................................................................... 333
Reports and Reboot ................................................................................................................ 339
Session Timeout ...................................................................................................................... 345
Diagnostics ............................................................................................................................. 347
Packet Flow Explore ................................................................................................................ 349
Maintenance Tools ................................................................................................................... 353
Watchdog Timer ....................................................................................................................... 359
Command List ...................................................................................................................... 363
List of Commands (Alphabetical) ............................................................................................. 365
8
ZyWALL (ZLD) CLI Reference Guide
P ART I
Introduction
Command Line Interface (11)
User and Privilege Modes (27)
Object Reference (31)
Status (33)
Registration (37)
9
10
CHAPTER
1
Command Line Interface
This chapter describes how to access and use the CLI (Command Line Interface).
1.1 Overview
If you have problems with your ZyWALL, customer support may request that you issue some
of these commands to assist them in troubleshooting.
1
Use of undocumented commands or misconfiguration can damage the
ZyWALL and possibly render it unusable.
1.1.1 The Configuration File
When you configure the ZyWALL using either the CLI (Command Line Interface) or the web
configurator, the settings are saved as a series of commands in a configuration file on the
ZyWALL. You can store more than one configuration file on the ZyWALL. However, only one
configuration file is used at a time.
You can perform the following with a configuration file:
• Back up ZyWALL configuration once the ZyWALL is set up to work in your network.
• Restore ZyWALL configuration.
• Save and edit a configuration file and upload it to multiple ZyWALLs (of the same model)
in your network to have the same settings.
"
You may also edit a configuration file using a text editor.
1.2 Accessing the CLI
You can access the CLI using a terminal emulation program on a computer connected to the
console port, from the web configurator or access the ZyWALL using Telnet or SSH (Secure
SHell).
ZyWALL (ZLD) CLI Reference Guide
11
Chapter 1 Command Line Interface
"
The ZyWALL might force you to log out of your session if reauthentication
time, lease time, or idle timeout is reached. See Chapter 25 on page 237 for
more information about these settings.
1.2.1 Console Port
The default settings for the console port are as follows.
Table 1 Managing the ZyWALL: Console Port
SETTING
VALUE
Speed
115200 bps
Data Bits
8
Parity
None
Stop Bit
1
Flow Control
Off
When you turn on your ZyWALL, it performs several internal tests as well as line
initialization. You can view the initialization information using the console port.
• Garbled text displays if your terminal emulation program’s speed is set lower than the
ZyWALL’s.
• No text displays if the speed is set higher than the ZyWALL’s.
• If changing your terminal emulation program’s speed does not get anything to display,
restart the ZyWALL.
• If restarting the ZyWALL does not get anything to display, contact your local customer
support.
Figure 1 Console Port Power-on Display
FLASH: AMD 16M
BootModule Version: V1.08 | 12/04/2007 15:36:17
DRAM: Size = 256 Mbytes
DRAM POST: Testing: 262144K
After the initialization, the login screen displays.
Figure 2 Login Screen
Welcome to ZyWALL 1050
Username:
12
ZyWALL (ZLD) CLI Reference Guide
Chapter 1 Command Line Interface
Enter the user name and password at the prompts.
"
The default login username is admin and password is 1234. The username
and password are case-sensitive.
1.2.2 Web Configurator Console
"
Before you can access the CLI through the web configurator, make sure your
computer supports the Java Runtime Environment. You will be prompted to
download and install the Java plug-in if it is not already installed.
When you access the CLI using the web console, your computer establishes a SSH (Secure
SHell) connection to the ZyWALL. Follow the steps below to access the web console.
1 Log into the web configurator.
2 Click the Console icon
in the top-right corner of the web configurator screen.
3 If the Java plug-in is already installed, skip to step 4.
Otherwise, you will be prompted to install the Java plug-in. If the prompt does not
display and the screen remains gray, you have to download the setup program.
4 The web console starts. This might take a few seconds. One or more security screens
may display. Click Yes or Always.
Figure 3 Web Console: Security Warnings
Finally, the User Name screen appears.
ZyWALL (ZLD) CLI Reference Guide
13
Chapter 1 Command Line Interface
Figure 4 Web Console: User Name
5 Enter the user name you want to use to log in to the console. The console begins to
connect to the ZyWALL.
"
The default login username is admin. It is case-sensitive.
Figure 5 Web Console: Connecting
Then, the Password screen appears.
Figure 6 Web Console: Password
6 Enter the password for the user name you specified earlier, and click OK. If you enter
the password incorrectly, you get an error message, and you may have to close the
console window and open it again. If you enter the password correctly, the console
screen appears.
14
ZyWALL (ZLD) CLI Reference Guide
Chapter 1 Command Line Interface
Figure 7 Web Console
7 To use most commands in this User’s Guide, enter configure terminal. The prompt
should change to Router(config)#.
1.2.3 Telnet
Use the following steps to Telnet into your ZyWALL.
1 If your computer is connected to the ZyWALL over the Internet, skip to the next step.
Make sure your computer IP address and the ZyWALL IP address are on the same
subnet.
2 In Windows, click Start (usually in the bottom left corner) and Run. Then type telnet
and the ZyWALL’s IP address. For example, enter telnet 192.168.1.1 (the default
management IP address).
3 Click OK. A login screen displays. Enter the user name and password at the prompts.
"
The default login username is admin and password is 1234. The username
and password are case-sensitive.
1.2.4 SSH (Secure SHell)
You can use an SSH client program to access the CLI. The following figure shows an example
using a text-based SSH client program. Refer to the documentation that comes with your SSH
program for information on using it.
"
The default login username is admin and password is 1234. The username
and password are case-sensitive.
ZyWALL (ZLD) CLI Reference Guide
15
Chapter 1 Command Line Interface
Figure 8 SSH Login Example
C:\>ssh2 admin@192.168.1.1
Host key not found from database.
Key fingerprint:
xolor-takel-fipef-zevit-visom-gydog-vetan-bisol-lysob-cuvun-muxex
You can get a public key's fingerprint by running
% ssh-keygen -F publickey.pub
on the keyfile.
Are you sure you want to continue connecting (yes/no)? yes
Host key saved to C:/Documents and Settings/user/Application Data/SSH/
hostkeys/
ey_22_192.168.1.1.pub
host key for 192.168.1.1, accepted by user Tue Aug 09 2005 07:38:28
admin's password:
Authentication successful.
1.3 How to Find Commands in this Guide
You can simply look for the feature chapter to find commands. In addition, you can use the
List of Commands (Alphabetical) at the end of the guide. This section lists the commands in
alphabetical order that they appear in this guide.
If you are looking at the CLI Reference Guide electronically, you might have additional
options (for example, bookmarks or Find...) as well.
1.4 How Commands Are Explained
Each chapter explains the commands for one keyword. The chapters are divided into the
following sections.
1.4.1 Background Information (Optional)
"
See the User’s Guide for background information about most features.
This section provides background information about features that you cannot configure in the
web configurator. In addition, this section identifies related commands in other chapters.
1.4.2 Command Input Values (Optional)
This section lists common input values for the commands for the feature in one or more tables
16
ZyWALL (ZLD) CLI Reference Guide
Chapter 1 Command Line Interface
1.4.3 Command Summary
This section lists the commands for the feature in one or more tables.
1.4.4 Command Examples (Optional)
This section contains any examples for the commands in this feature.
1.4.5 Command Syntax
The following conventions are used in this User’s Guide.
• A command or keyword in courier new must be entered literally as shown. Do not
abbreviate.
• Values that you need to provide are in italics.
• Required fields that have multiple choices are enclosed in curly brackets {}.
• A range of numbers is enclosed in angle brackets <>.
• Optional fields are enclosed in square brackets [].
• The | symbol means OR.
For example, look at the following command to create a TCP/UDP service object.
service-object object-name {tcp | udp} {eq <1..65535> | range <1..65535>
<1..65535>}
1
2
3
4
Enter service-object exactly as it appears.
Enter the name of the object where you see object-name.
Enter tcp or udp, depending on the service object you want to create.
Finally, do one of the following.
• Enter eq exactly as it appears, followed by a number between 1 and 65535.
• Enter range exactly as it appears, followed by two numbers between 1 and 65535.
1.4.6 Changing the Password
It is highly recommended that you change the password for accessing the ZyWALL. See
Section 25.2 on page 238 for the appropriate commands.
1.5 CLI Modes
You run CLI commands in one of several modes.
Table 2 CLI Modes
USER
PRIVILEGE
CONFIGURATION
SUB-COMMAND
What Guest users
can do
Unable to access
Unable to access
Unable to access
Unable to access
What User users
can do
•
Unable to access
Unable to access
Unable to access
Look at (but not
run) available
commands
ZyWALL (ZLD) CLI Reference Guide
17
Chapter 1 Command Line Interface
Table 2 CLI Modes (continued)
USER
PRIVILEGE
CONFIGURATION
SUB-COMMAND
What LimitedAdmin users can
do
•
Look at system
information (like
Status screen)
Run basic
diagnostics
•
Look at system
information (like
Status screen)
Run basic
diagnostics
Unable to access
Unable to access
What Admin
users can do
•
Look at system
information (like
Status screen)
Run basic
diagnostics
•
Look at system
information (like
Status screen)
Run basic
diagnostics
•
•
•
•
•
•
•
Configure simple
features (such as
an address
object)
Create or remove
complex parts
(such as an
interface)
Configure
complex parts
(such as an
interface) in the
ZyWALL
How you enter it
Log in to the ZyWALL Type enable in User
mode
Type configure
terminal in User or
Privilege mode
Type the command
used to create the
specific part in
Configuration mode
What the prompt
looks like
Router>
Router#
Router(config)#
(varies by part)
Router(zone)#
Router(configif-ge)#
...
How you exit it
Type exit
Type disable
Type exit
Type exit
See Chapter 25 on page 237 for more information about the user types. User users can only
log in, look at (but not run) the available commands in User mode, and log out. LimitedAdmin users can look at the configuration in the web configurator and CLI, and they can run
basic diagnostics in the CLI. Admin users can configure the ZyWALL in the web configurator
or CLI.
At the time of writing, there is not much difference between User and Privilege mode for
admin users. This is reserved for future use.
1.6 Shortcuts and Help
1.6.1 List of Available Commands
A list of valid commands can be found by typing ? or [TAB] at the command prompt. To view a
list of available commands within a command group, enter <command> ? or <command>
[TAB].
18
ZyWALL (ZLD) CLI Reference Guide
Chapter 1 Command Line Interface
Figure 9 Help: Available Commands Example 1
Router> ?
<cr>
apply
atse
clear
configure
------------------[Snip]-------------------shutdown
telnet
test
traceroute
write
Router>
Figure 10 Help: Available Command Example 2
Router> show ?
<wlan ap interface>
aaa
access-page
account
ad-server
address-object
------------------[Snip]-------------------wlan
workspace
zone
Router> show
1.6.2 List of Sub-commands or Required User Input
To view detailed help information for a command, enter <command> <sub command> ?.
Figure 11 Help: Sub-command Information Example
Router(config)# ip telnet server ?
;
<cr>
port
rule
|
Router(config)# ip telnet server
Figure 12 Help: Required User Input Example
Router(config)# ip telnet server port ?
<1..65535>
Router(config)# ip telnet server port
ZyWALL (ZLD) CLI Reference Guide
19
Chapter 1 Command Line Interface
1.6.3 Entering Partial Commands
The CLI does not accept partial or incomplete commands. You may enter a unique part of a
command and press [TAB] to have the ZyWALL automatically display the full command.
For example, if you enter config and press [TAB] , the full command of configure
automatically displays.
If you enter a partial command that is not unique and press [TAB], the ZyWALL displays a list
of commands that start with the partial command.
Figure 13 Non-Unique Partial Command Example
Router# c [TAB]
clear
configure
Router# co [TAB]
configure copy
copy
1.6.4 Entering a ? in a Command
Typing a ? (question mark) usually displays help information. However, some commands
allow you to input a ?, for example as part of a string. Press [CTRL+V] on your keyboard to
enter a ? without the ZyWALL treating it as a help query.
1.6.5 Command History
The ZyWALL keeps a list of commands you have entered for the current CLI session. You can
use any commands in the history again by pressing the up (y) or down (z) arrow key to scroll
through the previously used commands and press [ENTER].
1.6.6 Navigation
Press [CTRL]+A to move the cursor to the beginning of the line. Press [CTRL]+E to move the
cursor to the end of the line.
1.6.7 Erase Current Command
Press [CTRL]+U to erase whatever you have currently typed at the prompt (before pressing
[ENTER]).
1.6.8 The no Commands
When entering the no commands discribed in this document, you may not need to type the
whole command. For example, with the “[no] mss <536..1452>” command, you use
“mss 536” to specify the MSS value. But to disable the MSS setting, you only need to type
“no mss” instead of “no mss 536”.
20
ZyWALL (ZLD) CLI Reference Guide
Chapter 1 Command Line Interface
1.7 Input Values
You can use the ? or [TAB] to get more information about the next input value that is required
for a command. In some cases, the next input value is a string whose length and allowable
characters may not be displayed in the screen. For example, in the following example, the next
input value is a string called <description>.
Router# configure terminal
Router(config)# interface ge1
Router(config-if-ge)# description
<description>
When you use the example above, note that ZyWALL USG 100 and 200 models use a name
such as wan1, wan2, opt, lan1, ext-wlan, or dmz.
The following table provides more information about input values like <description>.
Table 3 Input-Value Formats for Strings in CLI Commands
TAG
# VALUES
LEGAL VALUES
*
1
*
all
--
ALL
authentication key
Used in IPSec SA
32-40
16-20
“0x” or “0X” + 32-40 hexadecimal values
alphanumeric or ;|`~!@#$%^&*()_+\\{}':,./<>=-
Used in MD5 authentication keys for RIP/OSPF and text
authentication key for RIP
0-16
alphanumeric or _-
Used in text authentication keys for OSPF
0-8
alphanumeric or _-
certificate name
1-31
alphanumeric or ;`~!@#$%^&()_+[\]{}',.=-
community string
0-63
alphanumeric or .first character: alphanumeric or -
connection_id
1+
alphanumeric or -_:
contact
1-61
alphanumeric, spaces, or '()+,/:=?;!*#@$_%-.
country code
0 or 2
alphanumeric
custom signature file
name
0-30
alphanumeric or _-.
first character: letter
description
Used in keyword criteria for log entries
1-64
alphanumeric, spaces, or '()+,/:=?;!*#@$_%-.
Used in other commands
distinguished name
1-61
alphanumeric, spaces, or '()+,/:=?;!*#@$_%-
1-511
alphanumeric, spaces, or .@=,_-
ZyWALL (ZLD) CLI Reference Guide
21
Chapter 1 Command Line Interface
Table 3 Input-Value Formats for Strings in CLI Commands (continued)
TAG
# VALUES
domain name
Used in content filtering
0+
LEGAL VALUES
lower-case letters, numbers, or .-
Used in ip dns server
0-247
alphanumeric or .first character: alphanumeric or -
Used in domainname, ip dhcp pool, and ip domain
0-254
alphanumeric or ._first character: alphanumeric or -
email
1-63
alphanumeric or .@_-
e-mail
1-64
alphanumeric or .@_-
encryption key
16-64
8-32
“0x” or “0X” + 16-64 hexadecimal values
alphanumeric or ;\|`~!@#$%^&*()_+\\{}':,./<>=-
file name
0-31
alphanumeric or _-
filter extension
1-256
alphanumeric, spaces, or '()+,/:=?;!*#@$_%.-
fqdn
Used in ip dns server
0-252
alphanumeric or .first character: alphanumeric or -
Used in ip ddns, time server, device HA, VPN, certificates,
and interface ping check
0-254
alphanumeric or .first character: alphanumeric or -
full file name
0-256
alphanumeric or _/.-
hostname
Used in hostname command
0-63
alphanumeric or .-_
first character: alphanumeric or -
Used in other commands
0-252
alphanumeric or .first character: alphanumeric or -
import configuration
file
126+”.conf”
alphanumeric or ;`~!@#$%^&()_+[]{}',.=add “.conf” at the end
import shell script
126+”.zysh”
alphanumeric or ;`~!@#$%^&()_+[]{}',.=add “.zysh” at the end
initial string
1-64
alphanumeric, spaces, or '()+,/:=!*#@$_%-.&
isp account password
0-63
alphanumeric or `~!@#$%^&*()_\-+={}|\;:'<,>./
isp account username
0-30
alphanumeric or -_@$./
key length
--
512, 768, 1024, 1536, 2048
license key
25
“S-” + 6 upper-case letters or numbers + “-” + 16
upper-case letters or numbers
mac address
--
aa:bb:cc:dd:ee:ff (hexadecimal)
mail server fqdn
lower-case letters, numbers, or -.
name
1-31
alphanumeric or _-
notification message
1-81
alphanumeric, spaces, or '()+,/:=?;!*#@$_%-
22
ZyWALL (ZLD) CLI Reference Guide
Chapter 1 Command Line Interface
Table 3 Input-Value Formats for Strings in CLI Commands (continued)
TAG
# VALUES
LEGAL VALUES
password: less than 15
chars
1-15
alphanumeric or `~!@#$%^&*()_\-+={}|\;:'<,>./
password: less than 8
chars
1-8
alphanumeric or ;/?:@&=+$\.-_!~*'()%,#$
password
Used in user and ip ddns
1-63
alphanumeric or `~!@#$%^&*()_-+={}|\;:'<,>./
Used in e-mail log profile SMTP authentication
1-63
alphanumeric or `~!@#$%^&*()_-+={}|\;:'<>./
Used in device HA synchronization
1-63
alphanumeric or ~#%^*_-={}:,.
Used in registration
6-20
alphanumeric or .@_-
phone number
1-20
numbers or ,+
preshared key
16-64
“0x” or “0X” + 16-64 hexadecimal values
alphanumeric or ;|`~!@#$%^&*()_+\{}':,./<>=-
profile name
0-30
alphanumeric or _first character: letters or _-
proto name
1-16
lower-case letters, numbers, or -
protocol name
0-30
alphanumeric or _first character: letters or _-
quoted string less
than 127 chars
1-255
alphanumeric, spaces, or ;/?:@&=+$\.-_!~*'()%,
quoted string less
than 63 chars
1-63
alphanumeric, spaces, or ;/?:@&=+$\.-_!~*'()%
quoted string
0+
alphanumeric, spaces, or punctuation marks
enclosed in double quotation marks (“)
must put a backslash (\) before double quotation
marks that are part of input value itself
service name
0-63
alphanumeric or -_@$./
spi
2-8
hexadecimal
string less than 15
chars
1-15
alphanumeric or -_
string: less than 63
chars
1-63
alphanumeric or `~!@#$%^&*()_-+={}|\;:'<,>./
string
1+
alphanumeric or -_@
subject
1-61
alphanumeric, spaces, or '()+,./:=?;!*#@$_%-
system type
0-2
hexadecimal
timezone [-+]hh
--
-12 through +12 (with or without “+”)
url
1-511
alphanumeric or '()+,/:.=?;!*#@$_%-
ZyWALL (ZLD) CLI Reference Guide
23
Chapter 1 Command Line Interface
Table 3 Input-Value Formats for Strings in CLI Commands (continued)
TAG
# VALUES
url
Used in content filtering redirect
“http://”+
“https://”+
LEGAL VALUES
alphanumeric or ;/?:@&=+$\.-_!~*'()%,
starts with “http://” or “https://”
may contain one pound sign (#)
Used in other content filtering commands
“http://”+
user name
alphanumeric or ;/?:@&=+$\.-_!~*'()%,
starts with “http://”
may contain one pound sign (#)
Used in VPN extended authentication
1-31
alphanumeric or _-
Used in other commands
0-30
alphanumeric or _first character: letters or _-
username
6-20
alphanumeric or .@_registration
user name
1+
alphanumeric or -_.
logging commands
user@domainname
1-80
alphanumeric or .@_-
vrrp group name: less
than 15 chars
1-15
alphanumeric or _-
week-day sequence,
i.e. 1=first,2=second
1
1-4
xauth method
1-31
alphanumeric or _-
xauth password
1-31
alphanumeric or ;|`~!@#$%^&*()_+\{}':,./<>=-
mac address
0-12 (even
number)
hexadecimal
for example: aa aabbcc aabbccddeeff
1.8 Ethernet Interfaces
How you specify an Ethernet interface depends on the ZyWALL model.
• For the ZyWALL USG 300 and above, use gex, x = 1~N, where N equals the highest
numbered Ethernet interface for your ZyWALL model.
• The ZyWALL USG 100 and 200 models use a name such as wan1, wan2, opt, lan1, extwlan, or dmz.
1.9 Saving Configuration Changes
Use the write command to save the current configuration to the ZyWALL.
24
ZyWALL (ZLD) CLI Reference Guide
Chapter 1 Command Line Interface
"
Always save the changes before you log out after each management session.
All unsaved changes will be lost after the system restarts.
1.10 Logging Out
Enter the exit or end command in configure mode to go to privilege mode.
Enter the exit command in user mode or privilege mode to log out of the CLI.
ZyWALL (ZLD) CLI Reference Guide
25
Chapter 1 Command Line Interface
26
ZyWALL (ZLD) CLI Reference Guide
CHAPTER
2
User and Privilege Modes
This chapter describes how to use these two modes.
2.1 User And Privilege Modes
This is the mode you are in when you first log into the CLI. (Do not confuse ‘user mode’ with
types of user accounts the ZyWALL uses. See Chapter 25 on page 237 for more information
about the user types. ‘User’ type accounts can only run ‘exit’ in this mode. However, they may
need to log into the device in order to be authenticated for ‘user-aware’ policies, for example a
firewall rule that a particular user is exempt from or a VPN tunnel that only certain people may
use.)
Type ‘enable’ to go to ‘privilege mode’. No password is required. All commands can be run
from here except those marked with an asterisk. Many of these commands are for troubleshooting purposes, for example the htm (hardware test module) and debug commands.
Customer support may ask you to run some of these commands and send the results if you
need assistance troubleshooting your device.
For admin logins, all commands are visible in ‘user mode’ but not all can be run there. The
following table displays which commands can be run in ‘user mode’. All commands can be
run in ‘privilege mode’.
1
The htm and psm commands are for ZyXEL’s internal manufacturing process.
Table 4 User (U) and Privilege (P) Mode Commands
COMMAND
MODE
DESCRIPTION
apply
P
Applies a configuration file.
atse
U/P
Displays the seed code
clear
U/P
Clears system or debug logs or DHCP binding.
configure
U/P
Use ‘configure terminal’ to enter configuration mode.
copy
P
Copies configuration files.
debug (*)
U/P
For support personnel only! The device needs to have the debug flag enabled.
delete
P
Deletes configuration files.
details
P
Performs diagnostic commands.
ZyWALL (ZLD) CLI Reference Guide
27
Chapter 2 User and Privilege Modes
Table 4 User (U) and Privilege (P) Mode Commands (continued)
COMMAND
MODE
DESCRIPTION
diag
P
Provided for support personnel to collect internal system information. It is not
recommended that you use these.
diag-info
P
Has the ZyWALL create a new diagnostic file.
dir
P
Lists files in a directory.
disable
U/P
Goes from privilege mode to user mode
enable
U/P
Goes from user mode to privilege mode
exit
U/P
Goes to a previous mode or logs out.
htm
U/P
Goes to htm (hardware test module) mode for testing hardware components. You
may need to use the htm commands if your customer support Engineer asks you
to during troubleshooting.
Note: These commands are for ZyXEL’s internal manufacturing
process.
interface
U/P
no packet-trace U/P
Dials or disconnects an interface.
Turns of packet tracing.
nslookup
U/P
Resolves an IP address to a host name and vice-versa.
packet-trace
U/P
Performs a packet trace.
ping
U/P
Pings an IP address or host name.
psm
U/P
Goes to psm (product support module) mode for setting product parameters. You
may need to use the htm commands if your customer support Engineer asks you
to during troubleshooting.
Note: These commands are for ZyXEL’s internal manufacturing
process.
reboot
P
Restarts the device.
release
P
Releases DHCP information from an interface.
rename
P
Renames a configuration file.
renew
P
Renews DHCP information for an interface.
run
P
Runs a script.
setenv
U/P
Turns stop-on-error on (terminates booting if an error is found in a configuration
file) or off (ignores configuration file errors and continues booting).
show
U/P
Displays command statistics. See the associated command chapter in this guide.
shutdown
P
Writes all d data to disk and stops the system processes. It does not turn off the
power.
telnet
U/P
Establishes a connection to the TCP port number 23 of the specified host name or
IP address.
test aaa
U/P
Tests whether the specified user name can be successfully authenticated by an
external authentication server.
traceroute
P
Traces the route to the specified host name or IP address.
write
P
Saves the current configuration to the ZyWALL. All unsaved changes are lost after
the ZyWALL restarts.
28
ZyWALL (ZLD) CLI Reference Guide
Chapter 2 User and Privilege Modes
Subsequent chapters in this guide describe the configuration commands. User/privilege mode
commands that are also configuration commands (for example, ‘show’) are described in more
detail in the related configuration command chapter.
2.1.1 Debug Commands
Debug commands marked with an asterisk (*) are not available when the debug flag is on and
are for ZyXEL service personnel use only. The debug commands follow a syntax that is
Linux-based, so if there is a Linux equivalent, it is displayed in this chapter for your reference.
You must know a command listed here well before you use it. Otherwise, it may cause
undesired results.
Table 5 Debug Commands
COMMAND SYNTAX
DESCRIPTION
debug alg
FTP/SIP ALG debug commands
debug anti-spam
Anti-Spam debug commands
debug app
Application patrol debug command
debug app show l7protocol
(*)
Shows app patrol protocol list
debug ca (*)
Certificate debug commands
debug content-filter
Content Filtering debug commands
debug device-ha (*)
Device HA debug commands
debug eps
Endpoint security debug commands
debug force-auth (*)
Authentication policy debug commands
debug gui (*)
GUI cgi related debug commands
debug gui (*)
Web Configurator releated debug
commands
debug hardware (*)
Hardware debug commands
debug idp
IDP debug commands
debug idp-av
IDP and Anti-Virus debug commands
debug interface
Interface debug commands
debug interface ifconfig
[interface]
Shows system interfaces detail
debug interface-group
Port grouping debug commands
debug ip dns
DNS debug commands
debug ip virtual-server
Virtual Server (NAT) debug commands.
debug ipsec
IPSec VPN debug commands
debug logging
System logging debug commands
debug manufacture
Manufacturing related debug
commands
debug myzyxel server (*)
Myzyxel.com debug commands
debug network arpignore (*) Enable/Display the ignoring of ARP
responses for interfaces which don't
own the IP address
ZyWALL (ZLD) CLI Reference Guide
LINUX COMMAND EQUIVALENT
> cat /etc/l7_protocols/
protocol.list
> ifconfig [interface]
cat /proc/sys/net/ipv4/
conf/*/arp_ignore
29
Chapter 2 User and Privilege Modes
Table 5 Debug Commands (continued)
COMMAND SYNTAX
DESCRIPTION
LINUX COMMAND EQUIVALENT
debug no myzyxel server (*) Set the myZyXEL.com registration/
update server to the official site
debug policy-route (*)
Policy route debug command
debug reset content-filter
profiling
Content Filtering debug commands
debug service-register
Service registration debug command
debug show content-filter
server
Category-based content filtering debug
command
debug show myzyxel server
status
Myzyxel.com debug commands
debug show ipset
Lists the ZyWALL‘s received cards
debug show myzyxel server
status
Myzyxel.com debug commands
debug sslvpn
SSL VPN debug commands
debug [cmdexec|corefile|ip
ZLD internal debug commands
|kernel|mac-idrewrite|observer|switch
|system|zyinetpkt|zysh-iptop] (*)
debug update server (*)
30
Update server debug command
ZyWALL (ZLD) CLI Reference Guide
CHAPTER
3
Object Reference
This chapter describes how to use object reference commands.
3.1 Object Reference Commands
The object reference commands are used to see which configuration settings reference a
specfic object. You can use this table when you want to delete an object because you have to
remove references to the object first.
Table 6 show reference Commands
COMMAND
DESCRIPTION
show reference object username
[username]
Displays which configuration settings reference the
specified user object.
show reference object address
[profile]
Displays which configuration settings reference the
specified address object.
show reference object eps
[profile]
Displays which configuration settings reference the
specified endpoint security object.
show reference object service
[profile]
Displays which configuration settings reference the
specified service object.
show reference object schedule
[profile]
Displays which configuration settings reference the
specified schedule object.
show reference object interface
[interface_name |
virtual_interface_name]
Displays which configuration settings reference the
specified interface or virtual interface object.
show reference object aaa
authentication [default |
auth_method]
Displays which configuration settings reference the
specified AAA authentication object.
show reference object ca
category {local|remote}
[cert_name]
Displays which configuration settings reference the
specified authentication method object.
show reference object account
pppoe [profile]
Displays which configuration settings reference the
specified PPPoE account object.
show reference object account
pptp [profile]
Displays which configuration settings reference the
specified PPTP account object.
show reference object sslvpn
application [profile]
Displays which configuration settings reference the
specified SSL VPN application object.
show reference object crypto map
[crypto_name]
Displays which configuration settings reference the
specified VPN connection object.
ZyWALL (ZLD) CLI Reference Guide
31
Chapter 3 Object Reference
Table 6 show reference Commands (continued)
COMMAND
DESCRIPTION
show reference object isakmp
policy [isakmp_name]
Displays which configuration settings reference the
specified VPN gateway object.
show reference object sslvpn
policy [profile]
Displays which configuration settings reference the
specified SSL VPN object.
show reference object zone
[profile]
Displays which configuration settings reference the
specified zone object.
show reference object-group
username [username]
Displays which configuration settings reference the
specified user group object.
show reference object-group
address [profile]
Displays which configuration settings reference the
specified address group object.
show reference object-group
service [profile]
Displays which configuration settings reference the
specified service group object.
show reference object-group
interface [profile]
Displays which configuration settings reference the
specified trunk object.
show reference object-group aaa
ad [group_name]
Displays which configuration settings reference the
specified AAA AD group object.
show reference object-group aaa
ldap [group_name]
Displays which configuration settings reference the
specified AAA LDAP group object.
show reference object-group aaa
radius [group_name]
Displays which configuration settings reference the
specified AAA RADIUS group object.
3.1.1 Object Reference Command Example
This example shows how to check which configuration is using an address object named
LAN1_SUBNET. For the command output, firewall rule 3 named LAN1-to-USG-2000 is
using the address object.
Router(config)# show reference object address LAN1_SUBNET
LAN1_SUBNET References:
Category
Rule Priority
Rule Name
Description
===========================================================================
Firewall
3
N/A
LAN1-to-USG-2000
Router(config)#
32
ZyWALL (ZLD) CLI Reference Guide
CHAPTER
4
Status
This chapter explains some commands you can use to display information about the
ZyWALL’s current operational state.
Table 7 Status Show Commands
COMMAND
DESCRIPTION
show boot status
Displays details about the ZyWALL’s startup state.
show comport status
Displays whether the console and auxiliary ports are on or off.
show cpu status
Displays the CPU utilization.
show disk
Displays the disk utilization.
show extension-slot
Displays the status of the extension card slot and the USB ports and the names of any
connected devices.
show fan-speed
Displays the current fan speed.
show led status
Displays the status of each LED on the ZyWALL.
show mac
Displays the ZyWALL’s MAC address.
show mem status
Displays what percentage of the ZyWALL’s memory is currently being used.
show ram-size
Displays the size of the ZyWALL’s on-board RAM.
show redundantpower status
Displays the status of the ZyWALL’s power modules. The ZyWALL has two power
modules. It can continue operating on a single power module if one fails.
show serial-number
Displays the serial number of this ZyWALL.
show socket listen
Displays the ZyWALL’s listening ports
show socket open
Displays the ports that are open on the ZyWALL.
show system uptime
Displays how long the ZyWALL has been running since it last restarted or was turned
on.
show version
Displays the ZyWALL’s model, firmware and build information.
Here are examples of the commands that display the CPU and disk utilization.
Router(config)# show cpu status
CPU utilization: 0 %
CPU utilization for 1 min: 0 %
CPU utilization for 5 min: 0 %
Router(config)# show disk
;
<cr>
|
Router(config)# show disk
No. Disk
Size(MB)
Usage
===========================================================================
1
image
67
83%
2
onboard flash
163
15%
ZyWALL (ZLD) CLI Reference Guide
33
Chapter 4 Status
Here are examples of the commands that display the fan speed, MAC address, memory usage,
RAM size, and serial number.
Router(config)# show fan-speed
FAN1(F00)(rpm): limit(hi)=6500, limit(lo)=1400, max=6650,
FAN2(F01)(rpm): limit(hi)=6500, limit(lo)=1400, max=6809,
FAN3(F02)(rpm): limit(hi)=6500, limit(lo)=1400, max=6683,
FAN4(F03)(rpm): limit(hi)=6500, limit(lo)=1400, max=6633,
Router(config)# show mac
MAC address: 28:61:32:89:37:61-28:61:32:89:37:67
Router(config)# show mem status
memory usage: 39%
Router(config)# show ram-size
ram size: 510MB
Router(config)# show serial-number
serial number: S060Z12020460
min=6642,
min=6783,
min=6666,
min=6617,
avg=6644
avg=6795
avg=6674
avg=6627
Here is an example of the command that displays the listening ports.
Router(config)# show socket listen
No.
Proto Local_Address
Foreign_Address
State
===========================================================================
1
tcp
0.0.0.0:2601
0.0.0.0:0
LISTEN
2
tcp
0.0.0.0:2602
0.0.0.0:0
LISTEN
3
tcp
127.0.0.1:10443
0.0.0.0:0
LISTEN
4
tcp
0.0.0.0:2604
0.0.0.0:0
LISTEN
5
tcp
0.0.0.0:80
0.0.0.0:0
LISTEN
6
tcp
127.0.0.1:8085
0.0.0.0:0
LISTEN
7
tcp
1.1.1.1:53
0.0.0.0:0
LISTEN
8
tcp
172.23.37.205:53
0.0.0.0:0
LISTEN
9
tcp
10.0.0.8:53
0.0.0.0:0
LISTEN
10
tcp
172.23.37.240:53
0.0.0.0:0
LISTEN
11
tcp
192.168.1.1:53
0.0.0.0:0
LISTEN
12
tcp
127.0.0.1:53
0.0.0.0:0
LISTEN
13
tcp
0.0.0.0:21
0.0.0.0:0
LISTEN
14
tcp
0.0.0.0:22
0.0.0.0:0
LISTEN
15
tcp
127.0.0.1:953
0.0.0.0:0
LISTEN
16
tcp
0.0.0.0:443
0.0.0.0:0
LISTEN
17
tcp
127.0.0.1:1723
0.0.0.0:0
LISTEN
34
ZyWALL (ZLD) CLI Reference Guide
Chapter 4 Status
Here is an example of the command that displays the open ports.
Router(config)# show socket open
No.
Proto Local_Address
Foreign_Address
State
===========================================================================
1
tcp
172.23.37.240:22
172.23.37.10:1179
ESTABLISHED
2
udp
127.0.0.1:64002
0.0.0.0:0
3
udp
0.0.0.0:520
0.0.0.0:0
4
udp
0.0.0.0:138
0.0.0.0:0
5
udp
0.0.0.0:138
0.0.0.0:0
6
udp
0.0.0.0:138
0.0.0.0:0
7
udp
0.0.0.0:138
0.0.0.0:0
8
udp
0.0.0.0:138
0.0.0.0:0
9
udp
0.0.0.0:138
0.0.0.0:0
10
udp
0.0.0.0:138
0.0.0.0:0
11
udp
0.0.0.0:32779
0.0.0.0:0
12
udp
192.168.1.1:4500
0.0.0.0:0
13
udp
1.1.1.1:4500
0.0.0.0:0
14
udp
10.0.0.8:4500
0.0.0.0:0
15
udp
172.23.37.205:4500
0.0.0.0:0
16
udp
172.23.37.240:4500
0.0.0.0:0
17
udp
127.0.0.1:4500
0.0.0.0:0
18
udp
127.0.0.1:63000
0.0.0.0:0
19
udp
127.0.0.1:63001
0.0.0.0:0
20
udp
127.0.0.1:63002
0.0.0.0:0
21
udp
0.0.0.0:161
0.0.0.0:0
22
udp
127.0.0.1:63009
0.0.0.0:0
23
udp
192.168.1.1:1701
0.0.0.0:0
24
udp
1.1.1.1:1701
0.0.0.0:0
25
udp
10.0.0.8:1701
0.0.0.0:0
26
udp
172.23.37.205:1701
0.0.0.0:0
27
udp
172.23.37.240:1701
0.0.0.0:0
28
udp
127.0.0.1:1701
0.0.0.0:0
29
udp
127.0.0.1:63024
0.0.0.0:0
30
udp
127.0.0.1:30000
0.0.0.0:0
31
udp
1.1.1.1:53
0.0.0.0:0
32
udp
172.23.37.205:53
0.0.0.0:0
33
udp
10.0.0.8:53
0.0.0.0:0
34
udp
172.23.37.240:53
0.0.0.0:0
35
udp
192.168.1.1:53
0.0.0.0:0
36
udp
127.0.0.1:53
0.0.0.0:0
37
udp
0.0.0.0:67
0.0.0.0:0
38
udp
127.0.0.1:63046
0.0.0.0:0
39
udp
127.0.0.1:65097
0.0.0.0:0
40
udp
0.0.0.0:65098
0.0.0.0:0
41
udp
192.168.1.1:500
0.0.0.0:0
42
udp
1.1.1.1:500
0.0.0.0:0
43
udp
10.0.0.8:500
0.0.0.0:0
44
udp
172.23.37.205:500
0.0.0.0:0
45
udp
172.23.37.240:500
0.0.0.0:0
46
udp
127.0.0.1:500
0.0.0.0:0
ZyWALL (ZLD) CLI Reference Guide
35
Chapter 4 Status
Here are examples of the commands that display the system uptime and model, firmware, and
build information.
Router> show system uptime
system uptime: 04:18:00
Router> show version
ZyXEL Communications Corp.
model
: ZyWALL USG 100
firmware version: 2.20(AQQ.0)b3
BM version
: 1.08
build date
: 2009-11-21 01:18:06
This example shows the current LED states on the ZyWALL. The SYS LED lights on and
green. The AUX and HDD LEDs are both off.
Router> show led status
sys: green
aux: off
hdd: off
Router>
36
ZyWALL (ZLD) CLI Reference Guide
CHAPTER
5
Registration
This chapter introduces myzyxel.com and shows you how to register the ZyWALL for IDP/
AppPatrol, anti-virus, content filtering, and SSL VPN services using commands.
5.1 myZyXEL.com overview
myZyXEL.com is ZyXEL’s online services center where you can register your ZyWALL and
manage subscription services available for the ZyWALL.
"
You need to create an account before you can register your device and
activate the services at myZyXEL.com.
You can directly create a myZyXEL.com account, register your ZyWALL and activate a
service using the Licensing > Registration screens. Alternatively, go to http://
www.myZyXEL.com with the ZyWALL’s serial number and LAN MAC address to register it.
Refer to the web site’s on-line help for details.
"
To activate a service on a ZyWALL, you need to access myZyXEL.com via that
ZyWALL.
5.1.1 Subscription Services Available on the ZyWALL
The ZyWALL can use anti-virus, IDP/AppPatrol (Intrusion Detection and Prevention and
application patrol), SSL VPN, and content filtering subscription services.
• The ZyWALL’s anti-virus packet scanner uses the signature files on the ZyWALL to
detect virus files. Your ZyWALL scans files transmitting through the enabled interfaces
into the network. Subscribe to signature files for ZyXEL’s anti-virus engine or one
powered by Kaspersky. After the service is activated, the ZyWALL can download the upto-date signature files from the update server (http://myupdate.zywall.zyxel.com).
ZyWALL (ZLD) CLI Reference Guide
37
Chapter 5 Registration
•
•
•
•
When using the trial, you can switch from one engine to the other in the Registration
screen. There is no limit on the number of times you can change the anti-virus engine
selection during the trial, but you only get a total of one anti-virus trial period (not a
separate trial period for each anti-virus engine). After the service is activated, the
ZyWALL can download the up-to-date signature files from the update server (http://
myupdate.zywall.zyxel.com).
After the trial expires, you need to purchase an iCard for the anti-virus engine you want to
use and enter the PIN number (license key) in the Registration > Service screen. You
must use the ZyXEL anti-virus iCard for the ZyXEL anti-virus engine and the Kaspersky
anti-virus iCard for the Kaspersky anti-virus engine. If you were already using an iCard
anti-virus subscription, any remaining time on your earlier subscription is automatically
added to the new subscription. Even if the earlier iCard anti-virus subscription was for a
different anti-virus engine. For example, suppose you purchase a one-year Kaspersky
engine anti-virus service subscription and use it for six months. Then you purchase a oneyear ZyXEL engine anti-virus service subscription and enter the iCard’s PIN number
(license key) in the Registration > Service screen. The one-year ZyXEL engine anti-virus
service subscription is automatically extended to 18 months.
The IDP and application patrol features use the IDP/AppPatrol signature files on the
ZyWALL. IDP detects malicious or suspicious packets and responds immediately.
Application patrol conveniently manages the use of various applications on the network.
After the service is activated, the ZyWALL can download the up-to-date signature files
from the update server (http://myupdate.zywall.zyxel.com).
SSL VPN tunnels provide secure network access to remote users. You can purchase and
enter a license key to have the ZyWALL use more SSL VPN tunnels.
The content filter allows or blocks access to web sites. Subscribe to category-based
content filtering to block access to categories of web sites based on content. Your
ZyWALL accesses an external database that has millions of web sites categorized based
on content. You can have the ZyWALL block, block and/or log access to web sites based
on these categories.
You will get automatic e-mail notification of new signature releases from mySecurityZone
after you activate the IDP/AppPatrol service. You can also check for new signatures at
http://mysecurity.zyxel.com.
See the respective chapters for more information about these features.
"
38
To update the signature file or use a subscription service, you have to register
the ZyWALL and activate the corresponding service at myZyXEL.com (through
the ZyWALL).
ZyWALL (ZLD) CLI Reference Guide
Chapter 5 Registration
5.2 Registration Commands
The following table identifies the values required for many of these commands. Other input
values are discussed with the corresponding commands.
Table 8 Input Values for General Registration Commands
LABEL
DESCRIPTION
user_name
The user name of your myZyXEL.com account. You must use six to 20
alphanumeric characters (and the underscore). Spaces are not allowed.
password
The password for the myZyXEL.com account. You must use six to 20
alphanumeric characters (and the underscore). Spaces are not allowed.
The following table describes the commands available for registration. You must use the
configure terminal command to enter the configuration mode before you can use these
commands.
Table 9 Command Summary: Registration
COMMAND
DESCRIPTION
device-register checkuser user_name
Checks if the user name exists in the
myZyXEL.com database.
device-register username user_name password
password [e-mail user@domainname] [country-code
country_code] [reseller-name name] [resellermail email-address] [reseller-phone phonenumber] [vat vat-number]
Registers the device with an existing account or
creates a new account and registers the device at
one time.
country_code: see Table 10 on page 41
service-register checkexpire
Gets information of all service subscriptions from
myZyXEL.com and updates the status table.
service-register service-type standard licensekey key_value
Activates a standard service subscription with the
license key.
service-register service-type trial service
{content-filter|idp}
Activates the content filter or IDP trial service
subscription.
service-register service-type trial service all
{kav|zav}
Activates all of the trial service subscriptions,
including Kaspersky or ZyXEL anti-virus.
service-register service-type trial service av
{kav|zav}
Activates a Kaspersky or ZyXEL anti-virus trial
service subscription.
service-register service-type trial av-engine
{kav|zav}
Changes from one anti-virus engine to the other.
show device-register status
Displays whether the device is registered and
account information.
show service-register reseller-info
Displays your seller’s information that you have
entered when registration.
show service-register server-type
Displays the type of the register server to which
your ZyWALL is connected.
show service-register status {all|contentfilter|idp|sslvpn|av}
Displays service license information.
ZyWALL (ZLD) CLI Reference Guide
39
Chapter 5 Registration
5.2.1 Command Examples
The following commands allow you to register your device with an existing account or create
a new account and register the device at one time, and activate a trial service subscription.
Router# configure terminal
Router(config)# device-register username alexctsui password 123456
Router(config)# service-register service-type trial service content-filter
The following command displays the account information and whether the device is
registered.
Router# configure terminal
Router(config)# show device-register status
username
: example
password
: 123456
device register status : yes
expiration self check : no
The following command displays the service registration status and type and how many days
remain before the service expires.
Router# configure terminal
Router(config)# show service-register status all
Service
Status
Type
Count
Expiration
===========================================================================
IDP Signature
Licensed
Standard N/A
176
Anti-Virus
Not Licensed None
N/A
0
SSLVPN
Not Licensed None
5
N/A
Content-Filter
Not Licensed None
N/A
0
The following command displays the seller details you have entered on the ZyWALL.
Router# configure terminal
Router(config)# show service-register reseller-info
seller’s name: ABC
seller’s e-mail: abc@example.com
seller’s contact number: 12345678
vat number:
40
ZyWALL (ZLD) CLI Reference Guide
Chapter 5 Registration
5.3 Country Code
The following table displays the number for each country.
Table 10 Country Codes
COUNTRY CODE
COUNTRY NAME
COUNTRY CODE
COUNTRY NAME
001
Afghanistan
002
Albania
003
Algeria
004
American Samoa
005
Andorra
006
Angola
007
Anguilla
008
Antarctica
009
Antigua & Barbuda
010
Argentina
011
Armenia
012
Aruba
013
Ascension Island
014
Australia
015
Austria
016
Azerbaijan
017
Bahamas
018
Bahrain
019
Bangladesh
020
Barbados
021
Belarus
022
Belgium
023
Belize
024
Benin
025
Bermuda
026
Bhutan
027
Bolivia
028
Bosnia and Herzegovina
029
Botswana
030
Bouvet Island
031
Brazil
032
British Indian Ocean Territory
033
Brunei Darussalam
034
Bulgaria
035
Burkina Faso
036
Burundi
037
Cambodia
038
Cameroon
039
Canada
040
Cape Verde
041
Cayman Islands
042
Central African Republic
043
Chad
044
Chile
045
China
046
Christmas Island
047
Cocos (Keeling) Islands
048
Colombia
049
Comoros
050
Congo, Democratic Republic of the
051
Congo, Republic of
052
Cook Islands
053
Costa Rica
054
Cote d'Ivoire
055
Croatia/Hrvatska
056
Cyprus
057
Czech Republic
058
Denmark
059
Djibouti
060
Dominica
061
Dominican Republic
062
East Timor
063
Ecuador
064
Egypt
065
El Salvador
066
Equatorial Guinea
067
Eritrea
068
Estonia
069
Ethiopia
070
Falkland Islands (Malvina)
ZyWALL (ZLD) CLI Reference Guide
41
Chapter 5 Registration
Table 10 Country Codes (continued)
COUNTRY CODE
COUNTRY NAME
COUNTRY CODE
COUNTRY NAME
071
Faroe Islands
072
Fiji
073
Finland
074
France
075
France (Metropolitan)
076
French Guiana
077
French Polynesia
078
French Southern Territories
079
Gabon
080
Gambia
081
Georgia
082
Germany
083
Ghana
084
Gibraltar
085
Great Britain
086
Greece
087
Greenland
088
Grenada
089
Guadeloupe
090
Guam
091
Guatemala
092
Guernsey
093
Guinea
094
Guinea-Bissau
095
Guyana
096
Haiti
097
Heard and McDonald Islands
098
Holy See (City Vatican State)
099
Honduras
100
Hong Kong
101
Hungary
102
Iceland
103
India
104
Indonesia
105
Ireland
106
Isle of Man
107
Italy
108
Jamaica
109
Japan
110
Jersey
111
Jordan
112
Kazakhstan
113
Kenya
114
Kiribati
115
Korea, Republic of
116
Kuwait
117
Kyrgyzstan
118
Lao People’s Democratic Republic
119
Latvia
120
Lebanon
121
Lesotho
122
Liberia
123
Liechtenstein
124
Lithuania
125
Luxembourg
126
Macau
127
Macedonia, Former Yugoslav
Republic
128
Madagascar
129
Malawi
130
Malaysia
131
Maldives
132
Mali
133
Malta
134
Marshall Islands
135
Martinique
136
Mauritania
137
Mauritius
138
Mayotte
139
Mexico
140
Micronesia, Federal State of
141
Moldova, Republic of
142
Monaco
143
Mongolia
144
Montserrat
145
Morocco
146
Mozambique
42
ZyWALL (ZLD) CLI Reference Guide
Chapter 5 Registration
Table 10 Country Codes (continued)
COUNTRY CODE
COUNTRY NAME
COUNTRY CODE
COUNTRY NAME
147
Namibia
148
Nauru
149
Nepal
150
Netherlands
151
Netherlands Antilles
152
New Caledonia
153
New Zealand
154
Nicaragua
155
Niger
156
Nigeria
157
Niue
158
Norfolk Island
159
Northern Mariana Islands
160
Norway
161
Not Determined
162
Oman
163
Pakistan
164
Palau
165
Panama
166
Papua New Guinea
167
Paraguay
168
Peru
169
Philippines
170
Pitcairn Island
171
Poland
172
Portugal
173
Puerto Rico
174
Qatar
175
Reunion Island
176
Romania
177
Russian Federation
178
Rwanda
179
Saint Kitts and Nevis
180
Saint Lucia
181
Saint Vincent and the Grenadines
182
San Marino
183
Sao Tome and Principe
184
Saudi Arabia
185
Senegal
186
Seychelles
187
Sierra Leone
188
Singapore
189
Slovak Republic
190
Slovenia
191
Solomon Islands
192
Somalia
193
South Africa
194
South Georgia and the South
Sandwich Islands
185
Spain
196
Sri Lanka
197
St Pierre and Miquelon
198
St. Helena
199
Suriname
200
Svalbard and Jan Mayen Islands
201
Swaziland
202
Sweden
203
Switzerland
204
Taiwan
205
Tajikistan
206
Tanzania
207
Thailand
208
Togo
209
Tokelau
210
Tonga
211
Trinidad and Tobago
212
Tunisia
213
Turkey
214
Turkmenistan
215
Turks and Caicos Islands
216
Tuvalu
217
US Minor Outlying Islands
218
Uganda
219
Ukraine
220
United Arab Emirates
221
United Kingdom
222
United States
ZyWALL (ZLD) CLI Reference Guide
43
Chapter 5 Registration
Table 10 Country Codes (continued)
COUNTRY CODE
COUNTRY NAME
COUNTRY CODE
COUNTRY NAME
223
Uruguay
224
Uzbekistan
225
Vanuatu
226
Venezuela
227
Vietnam
228
Virgin Islands (British)
229
Virgin Islands (USA)
230
Wallis And Futuna Islands
231
Western Sahara
232
Western Samoa
233
Yemen
234
Yugoslavia
235
Zambia
236
Zimbabwe
44
ZyWALL (ZLD) CLI Reference Guide
P ART II
Network
Interfaces (47)
Trunks (85)
Route (91)
Routing Protocol (99)
Zones (103)
DDNS (107)
Virtual Servers (111)
HTTP Redirect (117)
ALG (121)
45
46
CHAPTER
6
Interfaces
This chapter shows you how to use interface-related commands.
6.1 Interface Overview
In general, an interface has the following characteristics.
•
•
•
•
•
•
An interface is a logical entity through which (layer-3) packets pass.
An interface is bound to a physical port or another interface.
Many interfaces can share the same physical port.
An interface is bound to at most one zone.
Many interface can belong to the same zone.
Layer-3 virtualization (IP alias, for example) is a kind of interface.
Some characteristics do not apply to some types of interfaces.
6.1.1 Types of Interfaces
You can create several types of interfaces in the ZyWALL. The types supported vary by
ZyWALL model.
• Port groups create a hardware connection between physical ports at the layer-2 (data link,
MAC address) level.
• Ethernet interfaces are the foundation for defining other interfaces and network policies.
RIP and OSPF are also configured in these interfaces.
• VLAN interfaces receive and send tagged frames. The ZyWALL automatically adds or
removes the tags as needed. Each VLAN can only be associated with one Ethernet
interface.
• Bridge interfaces create a software connection between Ethernet or VLAN interfaces at
the layer-2 (data link, MAC address) level. Unlike port groups, bridge interfaces can take
advantage of some security features in the ZyWALL. You can also assign an IP address
and subnet mask to the bridge.
• PPPoE/PPTP interfaces support Point-to-Point Protocols (PPP). ISP accounts are
required for PPPoE/PPTP interfaces.
• Cellular interfaces are for 3G WAN connections via a connected 3G device.
• WLAN interfaces are for wireless LAN (IEEE 802.11b/g) connections via an installed
wireless LAN card.
ZyWALL (ZLD) CLI Reference Guide
47
Chapter 6 Interfaces
• Virtual interfaces (IP alias) provide additional routing information in the ZyWALL.
There are three types: virtual Ethernet interfaces, virtual VLAN interfaces, and virtual
bridge interfaces.
• The auxiliary interface, along with an external modem, provides an interface the
ZyWALL can use to dial out. This interface can be used as a backup WAN interface, for
example. The auxiliary interface controls the DIAL BACKUP port (labeled AUX on
some models).
• Trunks manage load balancing between interfaces.
Port groups, trunks, and the auxiliary interface have a lot of characteristics that are specific to
each type of interface. These characteristics are listed in the following tables and discussed in
more detail farther on.
Table 11 Characteristics of Ethernet, VLAN, Bridge, PPPoE/PPTP, and Virtual Interface (ZyWALL USG
300 and Above)
CHARACTERISTICS
ETHERNET
VLAN
BRIDGE
PPPOE/PPTP
VIRTUAL
Name*
gex
vlanx
brx
pppx
**
static IP address
Yes
Yes
Yes
Yes
Yes
DHCP client
Yes
Yes
Yes
Yes
No
routing metric
Yes
Yes
Yes
Yes
Yes
bandwidth restrictions
Yes
Yes
Yes
Yes
Yes
packet size (MTU)
Yes
Yes
Yes
Yes
No
data size (MSS)
Yes
Yes
Yes
Yes
No
traffic prioritization
Yes
Yes
Yes
Yes
No
DHCP server
Yes
Yes
Yes
No
No
DHCP relay
Yes
Yes
Yes
No
No
Yes
Yes
Yes
Yes
No
IP Address Assignment
Interface Parameters
DHCP
Ping Check
* - The format of interface names is strict. Each name consists of 2-4 letters (interface type), followed by a
number (x, limited by the maximum number of each type of interface). For example, Ethernet interface
names are ge1, ge2, ge3, ...; VLAN interfaces are vlan0, vlan1, vlan2, ...; and so on.
** - The names of virtual interfaces are derived from the interfaces on which they are created. For example,
virtual interfaces created on Ethernet interface ge1 are called ge1:1, ge1:2, and so on. Virtual interfaces
created on VLAN interface vlan2 are called vlan2:1, vlan2:2, and so on. You cannot specify the number
after the colon(:) in the web configurator; it is a sequential number. You can specify the number after the
colon if you use the CLI to set up a virtual Interface Parameters
Table 12 Ethernet, VLAN, Bridge, PPP, and Virtual Interface Characteristics (ZyWALL USG
100 and 200 Models)
CHARACTERISTICS
ETHERNET ETHERNET ETHERNET VLAN BRIDGE
PPP
VIRTUAL
Name*
opt
wan1, wan2 lan1, extwlan, dmz
vlanx
brx
pppx
**
Configurable Zone
Yes
No
No
Yes
Yes
No
No
Yes
Yes
Yes
Yes
Yes
Yes
Yes
IP Address
Assignment
Static IP address
48
ZyWALL (ZLD) CLI Reference Guide
Chapter 6 Interfaces
Table 12 Ethernet, VLAN, Bridge, PPP, and Virtual Interface Characteristics (ZyWALL USG
100 and 200 Models) (continued)
CHARACTERISTICS
ETHERNET ETHERNET ETHERNET VLAN BRIDGE
PPP
VIRTUAL
DHCP client
Yes
Yes
No
Yes
Yes
Yes
No
Routing metric
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Bandwidth
restrictions
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Packet size
(MTU)
Yes
Yes
Yes
Yes
Yes
Yes
No
Data size (MSS)
Yes
Yes
Yes
Yes
Yes
Yes
No
DHCP server
Yes
No
Yes
Yes
Yes
No
No
DHCP relay
Yes
No
Yes
Yes
Yes
No
No
Connectivity Check
Yes
Yes
No
Yes
Yes
Yes
No
Interface Parameters
DHCP
* - Each name consists of 2-4 letters (interface type), followed by a number (x). For most interfaces, x is limited
by the maximum number of the type of interface. For VLAN interfaces, x is defined by the number you
enter in the VLAN name field. For example, Ethernet interface names are wan1, wan2, opt, lan1, extwlan, dmz; VLAN interfaces are vlan0, vlan1, vlan2, ...; and so on.
** - The names of virtual interfaces are derived from the interfaces on which they are created. For example,
virtual interfaces created on Ethernet interface wan1 are called wan1:1, wan1:2, and so on. Virtual
interfaces created on VLAN interface vlan2 are called vlan2:1, vlan2:2, and so on. You cannot specify the
number after the colon(:) in the web configurator; it is a sequential number. You can specify the number
after the colon if you use the CLI to set up a virtual interface.
Table 13 Cellular and WLAN Interface Characteristics
CHARACTERISTICS
CELLULAR
WLAN
Name*
cellularx
wlan-x-x
Configurable Zone
Yes**
Yes
Static IP address
Yes
Yes
DHCP client
Yes
No
Routing metric
Yes
No
Bandwidth
restrictions
Yes
Yes
Packet size
(MTU)
Yes
Yes
Data size (MSS)
Yes
Yes
DHCP server
No
Yes
DHCP relay
No
Yes
Connectivity Check
Yes
No
IP Address
Assignment
Interface Parameters
DHCP
* - Each name consists of letters (interface type), followed by a number (x). For most interfaces, x is limited by
the maximum number of the type of interface. For WLAN interfaces, the first number identifies the slot
and the second number identifies the individual interface.
ZyWALL (ZLD) CLI Reference Guide
49
Chapter 6 Interfaces
** - Cellular interfaces can be added to the WAN zone or no zone.
6.1.2 Relationships Between Interfaces
In the ZyWALL, interfaces are usually created on top of other interfaces. Only Ethernet
interfaces are created directly on top of the physical ports (or port groups). The relationships
between interfaces are explained in the following table.
Table 14 Relationships Between Different Types of Interfaces
INTERFACE
REQUIRED PORT /
INTERFACE
auxiliary interface
auxiliary port
port group
physical port
Ethernet interface
physical port
port group
VLAN interface
Ethernet interface
bridge interface
Ethernet interface*
WLAN interface*
VLAN interface*
PPPoE/PPTP interface
(ZyWALL USG 300 and above)
Ethernet interface*
VLAN interface*
bridge interface
PPPoE/PPTP interface
(ZyWALL USG 100 and 200
models)
WAN1, WAN2, OPT*
virtual interface
(virtual Ethernet interface)
(virtual VLAN interface)
(virtual bridge interface)
trunk
Ethernet interface*
VLAN interface*
bridge interface
Ethernet interface
Cellular interface
VLAN interface
bridge interface
PPPoE/PPTP interface
auxiliary interface
* - You cannot set up a PPPoE/PPTP interface, virtual Ethernet interface, or virtual VLAN interface if the
underlying interface is a member of a bridge. You also cannot add an Ethernet interface or VLAN interface
to a bridge if the member interface has a virtual interface or PPPoE/PPTP interface on top of it.
50
ZyWALL (ZLD) CLI Reference Guide
Chapter 6 Interfaces
6.2 Interface General Commands Summary
The following table identifies the values required for many of these commands. Other input
values are discussed with the corresponding commands.
Table 15 Input Values for General Interface Commands
LABEL
DESCRIPTION
interface_name
The name of the interface.
Ethernet interface: For the ZyWALL USG 300 and above, use gex, x = 1 - N,
where N equals the highest numbered Ethernet interface for your ZyWALL model.
ZyWALL USG 100 and 200 models use a name such as wan1, wan2, opt,
lan1, ext-wlan, or dmz.
virtual interface on top of Ethernet interface: add a colon (:) and the number of the
virtual interface. For example: gex:y, x = 1 - N, y = 1 - 4
VLAN interface: vlanx, x = 0 - 4094
virtual interface on top of VLAN interface: vlanx:y, x = 0 - 4094, y = 1 - 4
bridge interface: brx, x = 0 - N, where N depends on the number of bridge
interfaces your ZyWALL model supports.
virtual interface on top of bridge interface: brx:y, x = the number of the bridge
interface, y = 1 - 4
PPPoE/PPTP interface: pppx, x = 0 - N, where N depends on the number of
PPPoE/PPTP interfaces your ZyWALL model supports.
profile_name
The name of the DHCP pool. You may use 1-31 alphanumeric characters,
underscores(_), or dashes (-), but the first character cannot be a number. This
value is case-sensitive.
domain_name
Fully-qualified domain name. You may up to 254 alphanumeric characters,
dashes (-), or periods (.), but the first character cannot be a period.
The following sections introduce commands that are supported by several types of interfaces.
See Section 6.6 on page 68 for the unique commands for each type of interface.
6.2.1 Basic Interface Properties and IP Address Commands
This table lists basic properties and IP address commands.
Table 16 interface General Commands: Basic Properties and IP Address Assignment
COMMAND
DESCRIPTION
show interface {ethernet | vlan | bridge | ppp
| auxiliary} status
Displays the connection status of the specified type
of interfaces.
show interface {interface_name | ethernet |
vlan | bridge | ppp | virtual ethernet |
virtual vlan | virtual bridge | auxiliary |
all}
Displays information about the specified interface,
specified type of interfaces, or all interfaces. See
Section 6.6.1 on page 71 for all possible cellular
status description.
show interface send statistics interval
Displays the interval for how often the ZyWALL
refreshes the sent packet statistics for the
interfaces.
show interface summary all
Displays basic information about the interfaces.
show interface summary all status
Displays the connection status of the interfaces.
[no] interface interface_name
Creates the specified interface if necessary and
enters sub-command mode. The no command
deletes the specified interface.
ZyWALL (ZLD) CLI Reference Guide
51
Chapter 6 Interfaces
Table 16 interface General Commands: Basic Properties and IP Address Assignment (continued)
COMMAND
52
DESCRIPTION
[no] description description
Specifies the description for the specified interface.
The no command clears the description.
description: You can use alphanumeric and
()+/:=?!*#@$_%- characters, and it can be up
to 60 characters long.
[no] downstream <0..1048576>
This is reserved for future use.
Specifies the downstream bandwidth for the
specified interface. The no command sets the
downstream bandwidth to 1048576.
exit
Leaves the sub-command mode.
[no] ip address dhcp
Makes the specified interface a DHCP client; the
DHCP server gives the specified interface its IP
address, subnet mask, and gateway. The no
command makes the IP address static IP address
for the specified interface. (See the next command
to set this IP address.)
[no] ip address ip subnet_mask
Assigns the specified IP address and subnet mask
to the specified interface. The no command clears
the IP address and the subnet mask.
[no] ip gateway ip
Adds the specified gateway using the specified
interface. The no command removes the gateway.
ip gateway ip metric <0..15>
Sets the priority (relative to every gateway on every
interface) for the specified gateway. The lower the
number, the higher the priority.
[no] metric <0..15>
Sets the PPPoE/PPTP or cellular interface’s priority
relative to other interfaces. The lower the number,
the higher the priority.
[no] mss <536..1460>
Specifies the maximum segment size (MSS) the
interface is to use. MSS is the largest amount of
data, specified in bytes, that the interface can
handle in a single, unfragmented piece. The no
command has the interface use its default MSS.
[no] mtu <576..1500>
Specifies the Maximum Transmission Unit, which is
the maximum number of bytes in each packet
moving through this interface. The ZyWALL divides
larger packets into smaller fragments. The no
command resets the MTU to 1500.
[no] shutdown
Deactivates the specified interface. The no
command activates it.
traffic-prioritize {tcp-ack|contentfilter|dns|ipsec-vpn|ssl-vpn} bandwidth
<0..1048576> priority <1..7> [maximizebandwidth-usage];
Applies traffic priority when the interface sends
TCP-ACK traffic, traffic for querying the content
filter, traffic for resolving domain names, or
encrypted traffic for an IPSec or SSL VPN tunnel. It
also sets how much bandwidth the traffic can use
and can turn on maximize bandwidth usage.
traffic-prioritize {tcp-ack|contentfilter|dns|ipsec-vpn|ssl-vpn} deactivate
Turns off traffic priority settings for when the
interface sends the specified type of traffic.
[no] upstream <0..1048576>
Specifies the upstream bandwidth for the specified
interface. The no command sets the upstream
bandwidth to 1048576.
ZyWALL (ZLD) CLI Reference Guide
Chapter 6 Interfaces
Table 16 interface General Commands: Basic Properties and IP Address Assignment (continued)
COMMAND
DESCRIPTION
interface reset
{interface_name|virtual_interface_name|all}
Resets the interface statistics TxPkts (transmitted
packets) and RxPkts (received packets) counts to
0. You can use the show interface summary
all status command to see the interface
statistics.
interface send statistics interval <15..3600>
Sets how often the ZyWALL sends interface
statistics to external servers. For example, syslog
server and Vantage Report server.
show interface-name
Displays all PPP and Ethernet interface system
name and user-defined name mappings.
interface-name {ppp_interface |
ethernet_interface} user_defined_name
Specifies a name for a PPP or an Ethernet
interface. It can use alphanumeric characters,
hyphens, and underscores, and it can be up to 11
characters long.
ppp_interface | ethernet_interface: This
must be the system name of a PPP or an Ethernet
interface. Use the show interface-name
command to see the system name of interfaces.
user_defined_name:
• This name cannot be one of the follows:
"ethernet", "ppp", "vlan", "bridge", "virtual",
"wlan", "cellular", "aux", "tunnel", "status",
"summary", "all"
• This name cannot begin with one of the follows
either:
"ge", "ppp", "vlan", "wlan-", "br", "cellular",
"aux", "tunnel".
interface-rename old_user_defined_name
new_user_defined_name
Modifies the user-defined name of a PPP or an
Ethernet interface.
6.2.1.1 Basic Interface Properties Command Examples
The following commands make Ethernet interface ge1 a DHCP client.
Router# configure terminal
Router(config)# interface ge1
Router(config-if)# ip address dhcp
Router(config-if)# exit
ZyWALL (ZLD) CLI Reference Guide
53
Chapter 6 Interfaces
This example shows how to modify the name of interface ge4 to “VIP”. First you have to
check the interface system name (ge4 in this example) on the ZyWALL. Then change the
name and display the result.
Router> show interface-name
No. System Name
User Defined Name
===========================================================================
1
ge1
ge1
2
ge2
ge2
3
ge3
ge3
4
ge4
ge4
5
ge5
ge5
Router> configure terminal
Router(config)# interface-name ge4 VIP
Router(config)# show interface-name
No. System Name
User Defined Name
===========================================================================
1
ge1
ge1
2
ge2
ge2
3
ge3
ge3
4
ge4
VIP
5
ge5
ge5
Router(config)#
This example shows how to change the user defined name from VIP to Partner. Note that you
have to use the “interface-rename” command if you do not know the system name of the
interface. To use the “interface-name” command, you have to find out the corresponding
system name first (ge4 in this example). This example also shows how to change the user
defined name from Partner to Customer using the “interface-name” command.
Router(config)# interface-rename VIP Partner
Router(config)# show interface-name
No. System Name
User Defined Name
===========================================================================
1
ge1
ge1
2
ge2
ge2
3
ge3
ge3
4
ge4
Partner
5
ge5
ge5
Router(config)#
Router(config)# interface-name ge4 Customer
Router(config)# show interface-name
No. System Name
User Defined Name
===========================================================================
1
ge1
ge1
2
ge2
ge2
3
ge3
ge3
4
ge4
Customer
5
ge5
ge5
54
ZyWALL (ZLD) CLI Reference Guide
Chapter 6 Interfaces
This example shows how to restart an interface. You can check all interface names on the
ZyWALL. Then use either the system name or user-defined name of an interface (ge4 or
Customer in this example) to restart it.
Router> show interface-name
No. System Name
User Defined Name
===========================================================================
1
ge1
ge1
2
ge2
ge2
3
ge3
ge3
4
ge4
Customer
5
ge5
ge5
Router> configure terminal
Router(config)# interface reset ge4
Router(config)# interface reset Customer
Router(config)#
6.2.2 DHCP Setting Commands
This table lists DHCP setting commands. DHCP is based on DHCP pools. Create a DHCP
pool if you want to assign a static IP address to a MAC address or if you want to specify the
starting IP address and pool size of a range of IP addresses that can be assigned to DHCP
clients. There are different commands for each configuration. Afterwards, in either case, you
have to bind the DHCP pool to the interface.
Table 17 interface Commands: DHCP Settings
COMMAND
DESCRIPTION
show ip dhcp pool [profile_name]
Shows information about the specified DHCP pool
or about all DHCP pools.
ip dhcp pool rename profile_name profile_name
Renames the specified DHCP pool from the first
profile_name to the second profile_name.
[no] ip dhcp pool profile_name
Creates a DHCP pool if necessary and enters subcommand mode. You can use the DHCP pool to
create a static entry or to set up a range of IP
addresses to assign dynamically.
About the sub-command settings:
• If you use the host command, the ZyWALL
treats this DHCP pool as a static DHCP entry.
• If you do not use the host command and use
the network command, the ZyWALL treats
this DHCP pool as a pool of IP addresses.
• If you do not use the host command or the
network command, the DHCP pool is not
properly configured and cannot be bound to
any interface.
The no command removes the specified DHCP
pool.
show
Shows information about the specified DHCP pool.
Use the following commands if you want to create
a static DHCP entry. If you do not use the host
command, the commands that are not in this
section have no effect, but you can still set them.
ZyWALL (ZLD) CLI Reference Guide
55
Chapter 6 Interfaces
Table 17 interface Commands: DHCP Settings (continued)
COMMAND
[no] host ip
DESCRIPTION
Specifies the static IP address the ZyWALL should
assign. Use this command, along with
hardware-address, to create a static DHCP
entry.
Note: The IP address must be in the
same subnet as the interface to
which you plan to bind the DHCP
pool.
When this command is used, the ZyWALL treats
this DHCP pool like a static entry, regardless of the
network setting. The no command clears this
field.
[no] hardware-address mac_address
Reserves the DHCP pool for the specified MAC
address. Use this command, along with host, to
create a static DHCP entry. The no command
clears this field.
[no] client-identifier mac_address
Specifies the MAC address that appears in the
DHCP client list. The no command clears this field.
[no] client-name host_name
Specifies the host name that appears in the DHCP
client list. The no command clears this field.
host_name: You may use 1-31 alphanumeric
characters, underscores(_), or dashes (-), but the
first character cannot be a number. This value is
case-sensitive.
Use the following commands if you want to create
a pool of IP addresses. These commands have no
effect if you use the host command. You can still
set them, however.
network IP/<1..32>
network ip mask
no network
Specifies the IP address and subnet mask of the
specified DHCP pool. The subnet mask can be
written in w.x.y.z format or in /<1..32> format.
Note: The DHCP pool must have the
same subnet as the interface to
which you plan to bind it.
The no command clears these fields.
56
[no] default-router ip
Specifies the default gateway DHCP clients should
use. The no command clears this field.
[no] description description
Specifies a description for the DHCP pool for
identification. The no command removes the
description.
[no] domain-name domain_name
Specifies the domain name assigned to DHCP
clients. The no command clears this field.
ZyWALL (ZLD) CLI Reference Guide
Chapter 6 Interfaces
Table 17 interface Commands: DHCP Settings (continued)
COMMAND
[no] starting-address ip pool-size
<1..65535>
DESCRIPTION
Sets the IP start address and maximum pool size of
the specified DHCP pool. The final pool size is
limited by the subnet mask.
Note: You must specify the network
number first, and the start address
must be in the same subnet.
The no command clears the IP start address and
maximum pool size.
[no] first-dns-server {ip | interface_name
{1st-dns | 2nd-dns | 3rd-dns} | ZyWALL}
Sets the first DNS server to the specified IP
address, the specified interface’s first, second, or
third DNS server, or the ZyWALL itself. The no
command resets the setting to its default value.
[no] second-dns-server {ip |
interface_name {1st-dns | 2nd-dns | 3rddns} | ZyWALL}
Sets the second DNS server to the specified IP
address, the specified interface’s first, second, or
third DNS server, or the ZyWALL itself. The no
command resets the setting to its default value.
[no] third-dns-server {ip | interface_name
{1st-dns | 2nd-dns | 3rd-dns} | ZyWALL}
Sets the third DNS server to the specified IP
address, the specified interface’s first, second, or
third DNS server, or the ZyWALL itself. The no
command resets the setting to its default value.
[no] first-wins-server ip
Specifies the first WINS server IP address to
assign to the remote users. The no command
removes the setting.
[no] second-wins-server ip
Specifies the second WINS server IP address to
assign to the remote users. The no command
removes the setting.
[no] lease {<0..365> [<0..23> [<0..59>]] |
infinite}
Sets the lease time to the specified number of
days, hours, and minutes or makes the lease time
infinite. The no command resets the first DNS
server setting to its default value.
interface interface_name
Enters sub-command mode.
[no] ip dhcp-pool profile_name
Binds the specified interface to the specified DHCP
pool. You have to remove any DHCP relays first.
The no command removes the binding.
[no] ip helper-address ip
Creates the specified DHCP relay. You have to
remove the DHCP pool first, if the DHCP pool is
bound to the specified interface. The no command
removes the specified DHCP relay.
release dhcp interface-name
Releases the TCP/IP configuration of the specified
interface. The interface must be a DHCP client.
This command is available in privilege mode, not
configuration mode.
renew dhcp interface-name
Renews the TCP/IP configuration of the specified
interface. The interface must be a DHCP client.
This command is available in privilege mode, not
configuration mode.
show ip dhcp binding [ip]
Displays information about DHCP bindings for the
specified IP address or for all IP addresses.
clear ip dhcp binding {ip | *}
Removes the DHCP bindings for the specified IP
address or for all IP addresses.
ZyWALL (ZLD) CLI Reference Guide
57
Chapter 6 Interfaces
6.2.2.1 DHCP Setting Command Examples
The following example uses these commands to configure DHCP pool DHCP_TEST.
Router# configure terminal
Router(config)# ip dhcp pool DHCP_TEST
Router(config-ip-dhcp-pool)# network 192.168.1.0 /24
Router(config-ip-dhcp-pool)# domain-name zyxel.com
Router(config-ip-dhcp-pool)# first-dns-server 10.1.5.1
Router(config-ip-dhcp-pool)# second-dns-server ge1 1st-dns
Router(config-ip-dhcp-pool)# third-dns-server 10.1.5.2
Router(config-ip-dhcp-pool)# default-router 192.168.1.1
Router(config-ip-dhcp-pool)# lease 0 1 30
Router(config-ip-dhcp-pool)# starting-address 192.168.1.10 pool-size 30
Router(config-ip-dhcp-pool)# hardware-address 00:0F:20:74:B8:18
Router(config-ip-dhcp-pool)# client-identifier 00:0F:20:74:B8:18
Router(config-ip-dhcp-pool)# client-name TWtester1
Router(config-ip-dhcp-pool)# exit
Router(config)# interface ge1
Router(config-if)# ip dhcp-pool DHCP_TEST
Router(config-if)# exit
Router(config)# show ip dhcp server status
binding interface : ge1
binding pool
: DHCP_TEST
6.2.3 Interface Parameter Command Examples
This table shows an example of each interface type’s sub-commands. The sub-commands vary
for different interface types.
Table 18 Examples for Different Interface Parameters
58
ETHERNET
VIRTUAL INTERFACE
PPPOE/PPTP
Router(config)# interface wan1
Router(config-if-wan1)#
description
downstream
exit
ip
mac
mss
mtu
no
ping-check
property
shutdown
traffic-prioritize
type
upstream
use-defined-mac
Router(config)# interface wan1:1
Router(config-if-vir)#
description
downstream
exit
ip
no
shutdown
upstream
Router(config)# interface wan1_ppp
Router(config-if-ppp)#
account
bind
connectivity
description
downstream
exit
local-address
metric
mss
mtu
no
ping-check
remote-address
shutdown
traffic-prioritize
upstream
CELLULAR
WLAN
VLAN
ZyWALL (ZLD) CLI Reference Guide
Chapter 6 Interfaces
Table 18 Examples for Different Interface Parameters
ETHERNET
VIRTUAL INTERFACE
PPPOE/PPTP
Router(config)# interface cellular1
Router(config-if-cellular)#
account
band
budget
connectivity
description
device
downstream
exit
local-address
metric
mtu
no
pin
ping-check
remote-address
shutdown
traffic-prioritize
upstream
Router(config)# interface wlan-1-1
Router(config-if-wlan)#
block-intra
description
downstream
exit
group-key
hide
idle
ip
mtu
no
ping-check
reauth
security
shutdown
ssid
station-limit
traffic-prioritize
upstream
wep-key
Router(config)# interface vlan1
Router(config-if-vlan)#
description
downstream
exit
ip
mss
mtu
no
ping-check
port
shutdown
traffic-prioritize
upstream
vlan-id
BRIDGE
AUXILIARY
Router(config)# interface br0
Router(config-if-brg)#
description
downstream
exit
ip
join
mss
mtu
no
ping-check
shutdown
traffic-prioritize
upstream
Router(config)# interface aux
Router(config-if-aux)#
authentication
description
dial-timeout
dialing-type
exit
idle
initial-string
no
password
phone-number
port-speed
shutdown
traffic-prioritize
username
6.2.4 RIP Commands
This table lists the commands for RIP settings.
Table 19 interface Commands: RIP Settings
COMMAND
DESCRIPTION
router rip
Enters sub-command mode.
[no] network interface_name
Enables RIP for the specified interface. The no
command disables RIP for the specified interface.
[no] passive-interface interface_name
Sets the RIP direction of the specified interface to
in-only. The no command makes RIP bi-directional
in the specified interface.
[no] outonly-interface interface_name
Sets the RIP direction of the specified interface to
out-only. The no command makes RIP bidirectional in the specified interface.
interface interface_name
ZyWALL (ZLD) CLI Reference Guide
Enters sub-command mode.
59
Chapter 6 Interfaces
Table 19 interface Commands: RIP Settings (continued)
COMMAND
DESCRIPTION
[no] ip rip {send | receive} version
<1..2>
Sets the send or receive version to the specified
version number. The no command sets the send or
received version to the current global setting for
RIP. See Chapter 9 on page 99 for more
information about routing protocols.
[no] ip rip v2-broadcast
Enables RIP-2 packets using subnet broadcasting.
The no command uses multi-casting.
show rip {global
interface_name}}
| interface {all |
Displays RIP settings.
6.2.5 OSPF Commands
This table lists the commands for OSPF settings.
Table 20 interface Commands: OSPF Settings
COMMAND
DESCRIPTION
router ospf
Enters sub-command mode.
[no] network interface_name area ip
Makes the specified interface part of the specified
area. The no command removes the specified
interface from the specified area, disabling OSPF
in this interface.
[no] passive-interface interface_name
Sets the OSPF direction of the specified interface
to in-only. The no command makes OSPF bidirectional in the specified interface.
interface interface_name
60
Enters sub-command mode.
[no] ip ospf priority <0..255>
Sets the priority of the specified interface to the
specified value. The no command sets the priority
to 1.
[no] ip ospf cost <1..65535>
Sets the cost to route packets through the specified
interface. The no command sets the cost to 10.
no ip ospf authentication
Disables authentication for OSPF in the specified
interface.
ip ospf authentication
Enables text authentication for OSPF in the
specified interface.
ip ospf authentication message-digest
Enables MD5 authentication for OSPF in the
specified interface.
ip ospf authentication same-as-area
To exchange OSPF routing information with peer
border routers, you must use the same
authentication method that they use. This
command makes OSPF authentication in the
specified interface follow the settings in the
corresponding area.
[no] ip ospf authentication-key password
Sets the simple text password for OSPF text
authentication in the specified interface. The no
command clears the text password.
password: 1-8 alphanumeric characters or
underscores
ZyWALL (ZLD) CLI Reference Guide
Chapter 6 Interfaces
Table 20 interface Commands: OSPF Settings (continued)
COMMAND
DESCRIPTION
ip ospf message-digest-key <1..255> md5
password
Sets the ID and password for OSPF MD5
authentication in the specified interface.
password: 1-16 alphanumeric characters or
underscores
no ip ospf message-digest-key
Clears the ID and password for OSPF MD5
authentication in the specified interface.
[no] ip ospf hello-interval <1..65535>
Sets the number of seconds between “hello”
messages to peer routers. These messages let
peer routers know the ZyWALL is available. The
no command sets the number of seconds to 10.
See ip ospf dead-interval for more
information.
[no] ip ospf dead-interval <1..65535>
Sets the number of seconds the ZyWALL waits for
“hello” messages from peer routers before it
assumes the peer router is not available and
deletes associated routing information. The no
command sets the number of seconds to 40. See
ip ospf hello-interval for more
information.
[no] ip ospf retransmit-interval
<1..65535>
Sets the number of seconds the ZyWALL waits for
an acknowledgment in response to a link state
advertisement before it re-sends the
advertisement.
Link state advertisements (LSA) are used to share
the link state and routing information between
routers.
ZyWALL (ZLD) CLI Reference Guide
61
Chapter 6 Interfaces
6.2.6 Connectivity Check (Ping-check) Commands
Use these commands to have an interface regularly check the connection to the gateway you
specified to make sure it is still available. You specify how often the interface checks the
connection, how long to wait for a response before the attempt is a failure, and how many
consecutive failures are required before the ZyWALL stops routing to the gateway. The
ZyWALL resumes routing to the gateway the first time the gateway passes the connectivity
check.
This table lists the ping-check commands
Table 21 interface Commands: Ping Check
COMMAND
DESCRIPTION
show ping-check [interface_name | status]
Displays information about ping check settings for
the specified interface or for all interfaces.
status: displays the current connectivity check
status for any interfaces upon which it is activated.
show ping-check [interface_name]
Displays information about ping check settings for
the specified interface or for all interfaces.
[no] connectivity-check continuous-log
activate
Use this command to have the ZyWALL logs
connectivity check result continously. The no
command disables the setting.
show connectivity-check continuous-log status
Displays the continuous log setting about
connectivity check.
interface interface_name
Enters sub-command mode.
[no] ping-check activate
Enables ping check for the specified interface. The
no command disables ping check for the specified
interface.
62
ping-check {domain_name | ip | defaultgateway}
Specifies what the ZyWALL pings for the ping
check; you can specify a fully-qualified domain
name, IP address, or the default gateway for the
interface.
ping-check {domain_name | ip | defaultgateway} period <5..30>
Specifies what the ZyWALL pings for the ping
check and sets the number of seconds between
each ping check.
ping-check {domain_name | ip | defaultgateway} timeout <1..10>
Specifies what the ZyWALL pings for the ping
check and sets the number of seconds the
ZyWALL waits for a response.
ping-check {domain_name | ip | defaultgateway} fail-tolerance <1..10>
Specifies what the ZyWALL pings for the ping
check and sets the number of times the ZyWALL
times out before it stops routing through the
specified interface.
ping-check {domain_name | ip | defaultgateway} method {icmp | tcp}
Sets how the ZyWALL checks the connection to the
gateway.
icmp: ping the gateway you specify to make sure it
is still available.
tcp: perform a TCP handshake with the gateway
you specify to make sure it is still available.
ping-check {domain_name | ip | defaultgateway} port <1..65535>
Specifies the port number to use for a TCP
connectivity check.
ZyWALL (ZLD) CLI Reference Guide
Chapter 6 Interfaces
6.2.6.1 Connectivity Check Command Example
The following commands show you how to set the WAN1 interface to use a TCP handshake
on port 8080 to check the connection to IP address 1.1.1.2
Router# configure terminal
Router(config)# interface wan1
Router(config-if-wan1)# ping-check 1.1.1.2 method tcp port 8080
Router(config-if-wan1)# exit
Router(config)# show ping-check
Interface: wan1
Check Method: tcp
IP Address: 1.1.1.2
Period: 30
Timeout: 5
Fail Tolerance: 5
Activate: yes
Port: 8080
Router(config)#
6.3 Ethernet Interface Specific Commands
This section covers commands that are specific to Ethernet interfaces.
The following table identifies the values required for many of these commands. Other input
values are discussed with the corresponding commands.
Table 22 Input Values for Ethernet Interface Commands
LABEL
DESCRIPTION
interface_name
The name of the Ethernet interface. This depends on the ZyWALL model.
For the ZyWALL USG 300 and above, use gex, x = 1~N, where N equals
the highest numbered Ethernet interface for your ZyWALL model.
The ZyWALL USG 100 and 200 models use a name such as wan1, wan2,
opt, lan1, ext-wlan, or dmz.
6.3.1 MAC Address Setting Commands
This table lists the commands you can use to set the MAC address of an interface. On the
ZyWALL USG 100 and 200 models, these commands only apply to a WAN or OPT interface.
Table 23 interface Commands: MAC Setting
COMMAND
DESCRIPTION
interface interface_name
Enters sub-command mode.
no mac
Has the interface use its default MAC address.
mac mac
Specifies the MAC address the interface is to use.
ZyWALL (ZLD) CLI Reference Guide
63
Chapter 6 Interfaces
Table 23 interface Commands: MAC Setting (continued)
COMMAND
DESCRIPTION
type {internal|external|general}
Sets which type of network you will connect this
interface. The ZyWALL automatically adds default
route and SNAT settings for traffic it routes from
internal interfaces to external interfaces; for
example LAN to WAN traffic.
internal: Set this to connect to a local network.
Other corresponding configuration options: DHCP
server and DHCP relay. The ZyWALL automatically
adds default SNAT settings for traffic flowing from
this interface to an external interface.
external: Set this to connect to an external
network (like the Internet). The ZyWALL
automatically adds this interface to the default
WAN trunk.
general: Set this if you want to manually
configure a policy route to add routing and SNAT
settings for the interface.
no use-defined-mac
Has the interface use its default MAC address.
use-defined-mac
Has the interface use a MAC address that you
specify.
6.3.2 Port Grouping Commands
This section covers commands that are specific to port grouping.
"
In CLI, representative interfaces are also called representative ports.
Table 24 Basic Interface Setting Commands
COMMAND
DESCRIPTION
show port-grouping
Displays which physical ports are assigned to each
representative interface.
port-grouping representative_interface port
<1..x>
Adds the specified physical port to the specified
representative interface.
representative_interface: gex in a ZyWALL
USG 300 or above.
A dmz, ext-wlan, or lan1 interface in a ZyWALL
USG 100 or 200.
<1..x> where x equals the highest numbered port
for your ZyWALL model.
no port <1..x>
Removes the specified physical port from its
current representative interface and adds it to its
default representative interface (for example, port x
--> gex).
port status Port<1..x>
Enters a sub-command mode to configure the
specified port’s settings.
64
[no] duplex <full | half>
Sets the port’s duplex mode. The no command
returns the default setting.
exit
Leaves the sub-command mode.
ZyWALL (ZLD) CLI Reference Guide
Chapter 6 Interfaces
Table 24 Basic Interface Setting Commands (continued)
COMMAND
DESCRIPTION
[no] negotiation auto
Sets the port to use auto-negotiation to determine
the port speed and duplex. The no command turns
off auto-negotiation.
[no] speed <100,10>
Sets the Ethernet port’s connection speed in Mbps.
The no command returns the default setting.
show port setting
Displays the Ethernet port negotiation, duplex, and
speed settings.
show port status
Displays statistics for the Ethernet ports.
6.3.2.1 Port Grouping Command Examples
The following commands add physical port 5 to representative interface ge1.
Router# configure terminal
Router(config)# show port-grouping
No. Representative Name Port1 Port2 Port3 Port4 Port5
=========================================================
1
ge1
yes
no
no
no
no
2
ge2
no
yes
no
no
no
3
ge3
no
no
yes
no
no
4
ge4
no
no
no
yes
no
5
ge5
no
no
no
no
yes
Router(config)# port-grouping ge1
Router(config-port-grouping)# port 5
Router(config-port-grouping)# exit
Router(config)# show port-grouping
No. Representative Name Port1 Port2 Port3 Port4 Port5
=========================================================
1
ge1
yes
no
no
no
yes
2
ge2
no
yes
no
no
no
3
ge3
no
no
yes
no
no
4
ge4
no
no
no
yes
no
5
ge5
no
no
no
no
no
The following commands set port 1 to use auto-negotiation auto and port 2 to use a 10 Mbps
connection speed and half duplex.
Router(config)# port status
Router(config-port-status)#
Router(config-port-status)#
Router(config)# port status
Router(config-port-status)#
Router(config-port-status)#
Router(config-port-status)#
Router(config)# exit
ZyWALL (ZLD) CLI Reference Guide
Port1
negotiation auto
exit
Port2
duplex half
speed 10
exit
65
Chapter 6 Interfaces
6.4 Virtual Interface Specific Commands
Virtual interfaces use many of the general interface commands discussed at the beginning of
Section 6.2 on page 51. There are no additional commands for virtual interfaces.
6.4.1 Virtual Interface Command Examples
The following commands set up a virtual interface on top of Ethernet interface ge1. The virtual
interface is named ge1:1 with the following parameters: IP 1.2.3.4, subnet 255.255.255.0,
gateway 4.6.7.8, upstream bandwidth 345, downstream bandwidth 123, and description “I am
vir interface”.
Router# configure terminal
Router(config)# interface ge1:1
Router(config-if-vir)# ip address 1.2.3.4 255.255.255.0
Router(config-if-vir)# ip gateway 4.6.7.8
Router(config-if-vir)# upstream 345
Router(config-if-vir)# downstream 123
Router(config-if-vir)# description I am vir interface
Router(config-if-vir)# exit
6.5 PPPoE/PPTP Specific Commands
This section covers commands that are specific to PPPoE/PPTP interfaces. PPPoE/PPTP
interfaces also use many of the general interface commands discussed at the beginning of
Section 6.2 on page 51.
The following table identifies the values required for many of these commands. Other input
values are discussed with the corresponding commands.
Table 25 Input Values for PPPoE/PPTP Interface Commands
LABEL
DESCRIPTION
interface_name
PPPoE/PPTP interface: pppx, x = 0 - N, where N depends on the number of
PPPoE/PPTP interfaces your ZyWALL model supports.
profile_name
The name of the ISP account. You may use 1-31 alphanumeric characters,
underscores(_), or dashes (-), but the first character cannot be a number. This
value is case-sensitive.
This table lists the PPPoE/PPTP interface commands.
Table 26 interface Commands: PPPoE/PPTP Interfaces
COMMAND
DESCRIPTION
interface dial interface_name
Connects the specified PPPoE/PPTP interface.
interface disconnect interface_name
Disconnects the specified PPPoE/PPTP interface.
interface interface_name
Creates the specified interface if necessary and
enters sub-command mode.
[no] account profile_name
66
Specifies the ISP account for the specified PPPoE/
PPTP interface. The no command clears the ISP
account field.
ZyWALL (ZLD) CLI Reference Guide
Chapter 6 Interfaces
Table 26 interface Commands: PPPoE/PPTP Interfaces (continued)
COMMAND
DESCRIPTION
[no] bind interface_name
Specifies the base interface for the PPPoE/PPTP
interface. The no command removes the base
interface.
[no] connectivity {nail-up | dial-ondemand}
Specifies whether the specified PPPoE/PPTP
interface is always connected (nail-up) or
connected only when used (dial-on-demand). The
no command sets it to dial-on-demand.
[no] local-address ip
Specifies a static IP address for the specified
PPPoE/PPTP interface. The no command makes
the PPPoE/PPTP interface a DHCP client; the
other computer assigns the IP address.
[no] remote-address ip
Specifies the IP address of the PPPoE/PPTP
server. If the PPPoE/PPTP server is not available
at this IP address, no connection is made. The no
command lets the ZyWALL get the IP address of
the PPPoE/PPTP server automatically when it
establishes the connection.
[no] mss <536..1452>
Specifies the maximum segment size (MSS) the
interface can use. MSS is the largest amount of
data, specified in bytes, that the interface can
handle in a single, unfragmented piece. The no
command has the ZyWALL use its default MSS
setting.
mtu <576..1492>
Sets the Maximum Transmission Unit in bytes.
show interface ppp system-default
Displays system default PPP interfaces (nondeletable) that come with the ZyWALL.
show interface ppp user-define
Displays all PPP interfaces that were manually
configured on the ZyWALL.
6.5.1 PPPoE/PPTP Interface Command Examples
The following commands show you how to configure PPPoE/PPTP interface ppp0 with the
following characteristics: base interface ge1, ISP account Hinet, local address 1.1.1.1, remote
address 2.2.2.2, MTU 1200, upstream bandwidth 345, downstream bandwidth 123, description
“I am ppp0”, and dialed only when used.
Router# configure terminal
Router(config)# interface ppp0
Router(config-if-ppp)# account Hinet
Router(config-if-ppp)# bind ge1
Router(config-if-ppp)# local-address 1.1.1.1
Router(config-if-ppp)# remote-address 2.2.2.2
Router(config-if-ppp)# mtu 1200
Router(config-if-ppp)# upstream 345
Router(config-if-ppp)# downstream 123
Router(config-if-ppp)# connectivity dial-on-demand
Router(config-if-ppp)# description I am ppp0
Router(config-if-ppp)# exit
ZyWALL (ZLD) CLI Reference Guide
67
Chapter 6 Interfaces
The following commands show you how to connect and disconnect ppp0.
Router# interface dial ppp0
Router# interface disconnect ppp0
6.6 Cellular Interface Specific Commands
Use a 3G (Third Generation) cellular device with the ZyWALL for wireless broadband
Internet access.
Use these commands to add, edit, dial, disconnect, or delete cellular interfaces. When you add
a new cellular interface, make sure you enter the account. You must use the configure
terminal command to enter the configuration mode before you can use these commands.
Table 27 Cellular Interface Commands
COMMAND
DESCRIPTION
[no] interface interface_name
Creates the specified interface if necessary and enters subcommand mode. The no command deletes the specified
interface.
[no] account profile_name
Specifies the ISP account for the specified cellular interface.
The no command clears the ISP account field.
[no] band {auto|wcdma|gsm}
Sets (or clears) the cellular band that the cellular interface
uses.
auto has the ZyWALL always use the fastest network that is
in range.
gsm has this interface only use a 2.5G or 2.75G network
(respectively). If you only have a GSM network available to
you, you may want to use this so the ZyWALL does not spend
time looking for a WCDMA network.
wcdma has this interface only use a 3G or 3.5G network
(respectively). You may want to use this if you want to make
sure the interface does not use the GSM network.
[no] network-selection {auto|home}
Home network is the network to which you are originally
subscribed.
Home has the 3G device connect only to the home network. If
the home network is down, the ZyWALL's 3G Internet
connection is also unavailable.
Auto is the default setting and allows the 3G device to
connect to a network to which you are not subscribed when
necessary, for example when the home network is down or
another 3G base station's signal is stronger. This is
recommended if you need continuous Internet connectivity. If
you select this, you may be charged using the rate of a
different network.
[no] budget active
Sets a monthly limit for the user account of the installed 3G
card. You can set a limit on the total traffic and/or call time.
The ZyWALL takes the actions you specified when a limit is
exceeded during the month. Use the no command to disable
budget control.
[no] budget time active <1..672>
Sets the amount of time (in hours) that the 3G connection can
be used within one month. If you change the value, the
ZyWALL resets the statistics. Use the no command to disable
time budget control.
68
ZyWALL (ZLD) CLI Reference Guide
Chapter 6 Interfaces
Table 27 Cellular Interface Commands (continued)
COMMAND
DESCRIPTION
[no] budget data active {downloadupload|download|upload}
<1..100000>
Sets how much downstream and/or upstream data (in Mega
bytes) can be transmitted via the 3G connection within one
month.
download: set a limit on the downstream traffic (from the ISP
to the ZyWALL).
upload: set a limit on the upstream traffic (from the ZyWALL
to the ISP).
download-upload: set a limit on the total traffic in both
directions.
If you change the value, the ZyWALL resets the statistics.
Use the no command to disable data budget control.
budget reset-day <0..31>
Sets the date on which the ZyWALL resets the budget every
month. If the date you selected is not available in a month,
such as 30th or 31th, the ZyWALL resets the budget on the
last day of the month.
budget reset-counters
Resets the time and data budgets immediately. The count
starts over with the 3G connection’s full configured monthly
time and data budgets. This does not affect the normal
monthly budget restart.
budget {log|log-alert}[recursive
<1..65535>]
Sets the ZyWALL to create a log (log) or an alert log (logalert) when the time or data limit is exceeded. You can also
specify how often (from 1 to 65535 minutes) to generate a log
or an alert.
no budget log [recursive]
Sets the ZyWALL to not create a log when the time or data
limit is exceeded. Specify recursive to have the ZyWALL
only create a log one time when the time or data limit is
exceeded.
budget new-connection
{allow|disallow}
Sets to permit (allow) or drop/block (disallow) new 3G
connections when the time or data limit is exceeded.
budget current-connection
{keep|drop}
Sets to maintain the existing 3G connection (keep) or
disconnect it (drop) when the time or data limit is exceeded.
You cannot set budget new-connection to allow and budget
current-connection to drop at the same time.
If you set budget new-connection to disallow and budget
current-connection to keep, the ZyWALL allows you to
transmit data using the current connection, but you cannot
build a new connection if the existing connection is
disconnected.
budget percentage {ptime|pdata}
<0..99>
Sets a percentage (0~99) of time budget (ptime) or data
(pdata) limit. When the specified limit is exceeded, the
ZyWALL takes the action configured using the budget
{log-percentage|log-percentage-alert}
command.
budget {log-percentage|logpercentage-alert} [recursive
<1..65535>]
Sets to have the ZyWALL create a log (log-percentage) or
an alart log (log-percentage-alert) when the set
percentage of time budget or data limit is exceeded. You can
configure the percentage using the budget percentage
command.
You can also set how often (from 1 to 65535 minutes) to send
the log or alert.
ZyWALL (ZLD) CLI Reference Guide
69
Chapter 6 Interfaces
Table 27 Cellular Interface Commands (continued)
COMMAND
DESCRIPTION
no budget log-percentage
[recursive]
Sets the ZyWALL to not create a log when the set percentage
of time budget or data limit is exceeded. You can configure
the percentage using the budget percentage command.
You can also specify recursive to have the ZyWALL only
create a log one time when the set percentage of time budget
or data limit is exceeded.
connectivity {nail-up | dial-ondemand}
Sets the connection to be always on or only when there is
traffic.
[no] device <device_model_name>
Sets (or clears) the model name of the cellular device that the
cellular interface uses. Use 0-30 alphanumeric characters,
underscores(_), or dashes (-).
[no] local-address <ip>
Sets (or clears) the cellular interface’s local (own) IP address.
mtu <576..1492>
Sets the Maximum Transmission Unit in bytes.
[no] pin <pin code>
Sets (or clears) the PIN code for the cellular device’s 3G card.
Use 1-4 alphanumeric characters, underscores(_), or dashes
(-).
[no] remote-address <ip>
Sets (or clears) the IP address of the cellular interface’s peer
(like a gateway or PPPoE server).
interface cellular budget-auto-save
<5..1440>
Sets how often (in minutes) the ZyWALL saves time and data
usage records for a connection using the 3G card.
show interface cellular
[corresponding-slot|devicestatus|support-device]
Shows the status of the specified cellular interface.
show interface cellular correspondingslot
Shows which cellular interface is on which slot and whether
which cellular interface has been configured.
show interface cellular device-status
Displays the installed SIM card and 3G card status.
show interface cellular support-device
Displays all 3G card models the ZyWALL can support.
show interface cellular budget-autosave
Displays how often (in minutes) the ZyWALL records time and
data usage of your 3G budgets.
show interface cellular status
Displays the traffic statistics and connection status for your
cellular interfaces. See Section 6.6.1 on page 71 for all
possible cellular status descriptions.
show interface interface_name [budget]
Displays the budget control settings for the specified cellular
interface.
show interface interface_name device
status
Displays the 3G card and SIM card information for the
specified cellular interface.
show interface interface_name device
profile
Displays the 3G connection profile settings of the specified
cellular interface.
70
ZyWALL (ZLD) CLI Reference Guide
Chapter 6 Interfaces
6.6.1 Cellular Status
The following table describes the different kinds of cellular connection status on the
ZyWALL.
Table 28 Cellular Status
STATUS
DESCRIPTION
No device
no 3G device is connected to the ZyWALL.
No service
no 3G network is available in the area; you cannot connect to the Internet.
Limited service
returned by the service provider in cases where the SIM card is expired, the
user failed to pay for the service and so on; you cannot connect to the Internet.
Device detected
displays when you connect a 3G device.
Device error
a 3G device is connected but there is an error.
Probe device fail
the ZyWALL’s test of the 3G device failed.
Probe device ok
the ZyWALL’s test of the 3G device failed.
Init device fail
the ZyWALL was not able to initialize the 3G device.
Init device ok
the ZyWALL initialized the 3G card.
Check lock fail
the ZyWALL’s check of whether or not the 3G device is locked failed.
Device locked
the 3G device is locked.
SIM error
there is a SIM card error on the 3G device.
SIM locked-PUK
the PUK is locked on the 3G device’s SIM card.
SIM locked-PIN
the PIN is locked on the 3G device’s SIM card.
Unlock PUK fail
Your attempt to unlock a WCDMA 3G device’s PUK failed because you entered
an incorrect PUK.
Unlock PIN fail
Your attempt to unlock a WCDMA 3G device’s PIN failed because you entered
an incorrect PIN.
Unlock device fail
Your attempt to unlock a CDMA2000 3G device failed because you entered an
incorrect device code.
Device unlocked
You entered the correct device code and unlocked a CDMA2000 3G device.
Get dev-info fail
The ZyWALL cannot get cellular device information.
Get dev-info ok
The ZyWALL succeeded in retrieving 3G device information.
Searching network
The 3G device is searching for a network.
Get signal fail
The 3G device cannot get a signal from a network.
Network found
The 3G device found a network.
Apply config
The ZyWALL is applying your configuration to the 3G device.
Inactive
The 3G interface is disabled.
Active
The 3G interface is enabled.
Incorrect device
The connected 3G device is not compatible with the ZyWALL.
Correct device
The ZyWALL detected a compatible 3G device.
Set band fail
Applying your band selection was not successful.
Set band ok
The ZyWALL successfully applied your band selection.
Set profile fail
Applying your ISP settings was not successful.
Set profile ok
The ZyWALL successfully applied your ISP settings.
ZyWALL (ZLD) CLI Reference Guide
71
Chapter 6 Interfaces
Table 28 Cellular Status
STATUS
DESCRIPTION
PPP fail
The ZyWALL failed to create a PPP connection for the cellular interface.
Need auth-password
You need to enter the password for the 3G card in the cellular edit screen.
Device ready
The ZyWALL successfully applied all of your configuration and you can use the
3G connection.
6.6.2 Cellular Interface Command Examples
This example shows the configuration of a cellular interface named cellular2 for use with a
Sierra Wireless AC850 3G card. It uses only a 3G (or 3.5G) connection, PIN code 1234, an
MTU of 1200 bytes, a description of "This is cellular2” and sets the connection to be nailedup.
Router(config)# interface cellular2
Router(config-if-cellular)# device AC850
Router(config-if-cellular)# band wcdma
Router(config-if-cellular)# pin 1234
Router(config-if-cellular)# connectivity nail-up
Router(config-if-cellular)# description This is cellular2
Router(config-if-cellular)# mtu 1200
Router(config-if-cellular)# exit
This second example shows specifying a new PIN code of 4567.
Router(config)# interface cellular2
Router(config-if-cellular)# pin 4567
Router(config-if-cellular)# exit
This example shows the 3G and SIM card information for interface cellular2 on the ZyWALL.
Router(config)# show interface cellular2 device status
interface name: cellular2
extension slot: USB 1
service provider: Chunghwa Telecom
cellular system: WCDMA
signal strength: -95 dBm
signal quality: Poor
device type: WCDMA
device manufacturer: Huawei
device model: E220/E270/E800A
device firmware: 076.11.07.106
device IMEI/ESN: 351827019784694
SIM card IMSI: 466923100565274
72
ZyWALL (ZLD) CLI Reference Guide
Chapter 6 Interfaces
This example shows the 3G connection profile settings for interface cellular2 on the ZyWALL.
You have to dial *99***1# to use profile 1, but authentication is not required. Dail *99***2#
to use profile 2 and authentication is required.
Router(config)# show interface cellular2 device profile
profile: 1
apn: internet
dial-string: *99***1#
authentication: none
user: n/a
password: n/a
profile: 2
apn: internet
dial-string: *99***2#
authentication: chap
user:
password: ***
----------------------SNIP!------------------------------------------------
6.7 USB Storage Specific Commands
Use these commands to configure settings that apply to the USB storage device connected to
the ZyWALL.
"
For the ZyWALL which supports more than one USB ports, these commands
only apply to the USB storage device that is first attached to the ZyWALL.
Table 29 USB Storage General Commands
COMMAND
DESCRIPTION
show usb-storage
Displays the status of the connected USB storage device.
[no] usb-storage activate
Enables or disables the connected USB storage service.
usb-storage warn number
<percentage|megabyte>
Sets a number and the unit (percentage or megabyte) to
have the ZyWALL send a warning message when the
remaining USB storage space is less than the set value.
usb-storage mount
Mounts the connected USB storage device.
usb-storage umount
Unmounts the connected USB storage device.
[no] logging usb-storage
Sets to have the ZyWALL log or not log any information about
the connected USB storage device(s) for the system log.
show logging status usb-storage
Displays the logging settings for the connected USB storage
device.
logging usb-storage category category
level <all|normal>
Configures the logging settings for the specified category for
the connected USB storage device.
logging usb-storage category category
disable
Stops logging for the specified category to the connected
USB storage device.
ZyWALL (ZLD) CLI Reference Guide
73
Chapter 6 Interfaces
Table 29 USB Storage General Commands (continued)
COMMAND
DESCRIPTION
logging usb-storage flushThreshold
<1..100>
Configures the maximum storage space (in percentage) for
storing syetem logs on the connected USB storage device.
[no] diag-info copy usb-storage
Sets to have the ZyWALL save or stop saving the current
system diagnostics information to the connected USB storage
device. You may need to send this file to customer support for
troubleshooting.
show diag-info copy usb-storage
Displays whether (enable or disable) the ZyWALL saves the
current system diagnostics information to the connected USB
storage device.
[no] corefile copy usb-storage
Sets to have the ZyWALL save or not save a process’s core
dump to the connected USB storage device if the process
terminates abnormally (crashes). You may need to send this
file to customer support for troubleshooting.
show corefile copy usb-storage
Displays whether (enable or disable) the ZyWALL saves core
dump files to the connected USB storage device.
6.7.1 USB Storage General Commands Example
This example shows how to display the status of the connected USB storage device.
Router> show usb-storage
USBStorage Configuration:
Activation: enable
Criterion Number: 100
Criterion Unit: megabyte
USB Storage Status:
Device description: N/A
Usage: N/A
Filesystem: N/A
Speed: N/A
Status: none
Detail: none
6.8 WLAN Specific Commands
You can install a compatible WLAN card to use the ZyWALL as an access point (AP) for a
wireless network.
The following table identifies the values required for several WLAN commands. Other input
values are discussed with the corresponding commands.
Table 30 Input Values for WLAN Interface Commands
74
LABEL
DESCRIPTION
psk-key
Use 8 to 63 case-sensitive alphanumeric characters or 64 hexadecimal
characters. This is used for WLAN interface commands. See Table 32 on page 76
ZyWALL (ZLD) CLI Reference Guide
Chapter 6 Interfaces
6.8.1 WLAN General Commands
Use these commands to configure global settings that apply to all of the wireless LAN
interfaces you create on the WLAN card.
Table 31 WLAN General Commands
COMMAND
DESCRIPTION
wlan slot_name
Specifies the slot the WLAN card is installed in and enters
sub-command mode.
slot_name: The name of the slot where the WLAN card is
installed in the ZyWALL. Use slotx where x equals the
number of the card slot.
[no] activate
Turns the wireless device on. The no command turns it off.
band <b | g | bg>
Sets whether wireless clients can connect to the ZyWALL
using IEEE 802.11b, IEEE 802.11g, or both.
channel <wireless_channel | auto>
Sets the wireless operating channel.
wireless_channel: Specify the channel number. The
numbers available vary by region.
[no] ctsrts <256..2346>
Sets the Clear To Send/Request To Send threshold. CTS/
RTS reduces data collisions caused by wireless clients that
are associated with the same AP but out of range of one
another. The no command turns off CTS/RTS.
[no] frag <256..2346>
Sets the threshold (number of bytes) for the fragmentation
boundary for directed messages. It is the maximum data
fragment size that can be sent.
[no] super
Enables super mode (fast frame and packet bursting).
role ap
Sets the ZyWALL to act as an AP (only the AP role is
supported at the time of writing.
output-power [100% | 50% | 25% |
12.5%]
Sets the wireless output power. Reducing output power can
help reduce interference with other nearby APs.
qos [none | wmm}
Applies Wi-Fi Multimedia Quality of Service (QoS) or no
wireless QoS.
guard-interval [short | long]
Sets Guard Interval to Short (increases data throughput) or
Long (prioritize data integrity).
[no] amsdu
Enables Aggregated Mac Service Data Unit (AMSDU) for
faster data transfer rates.
[no] ampdu
Enables Aggregated Mac Protocol Data Unit (AMPDU) for
faster data transfer rates.
[no] block-ack
Adds the block ACK (BA) mechanism to increase data output.
exit
Leaves the sub-command mode.
ZyWALL (ZLD) CLI Reference Guide
75
Chapter 6 Interfaces
6.8.1.1 WLAN General Commands Example
This example sets wireless slot 1 to use the IEEE 802.11b and IEEE 802.11g bands, channel 5,
super mode, 50 % output power, and enables it.
Router(config)# wlan slot1
Router(config-wlan-slot)# band bg
Router(config-wlan-slot)# channel 5
Router(config-wlan-slot)# super
Router(config-wlan-slot)# output-power 50%
Router(config-wlan-slot)# activate
Router(config-wlan-slot)# exit
Router(config)#
6.8.2 WLAN Interface Commands
Use these commands to configure global settings that apply to all of the wireless LAN
interfaces you create on the WLAN card.
Table 32 WLAN Interface Commands
COMMAND
DESCRIPTION
[no] interface ap_interface
Creates the specified interface if necessary and enters subcommand mode. The no command deletes the specified
interface.
ap_interface: The name of the WLAN Access Point
interface. Use wlan-x-y where x equals the number of the
card slot and y equals the number of the individual WLAN
interface. For example, wlan-1-1.
76
[no] block-intra
Enables intra-BSS blocking (prevents) wireless clients in this
profile’s BSS from communicating with one another.
group-key <30..30000>
Sets the WPA2 group key update timer. This is the interval in
seconds for how often the AP sends a new group key out to
all clients.
[no] hide
Obscures the SSID in the outgoing beacon frame so a station
cannot obtain the SSID through scanning.
idle <30..30000>
Sets the WPA2 idle timeout. The ZyWALL automatically
disconnects a wireless station that has been inactive for this
number of seconds. The wireless station needs to enter the
username and password again before access to the wired
network is allowed.
[no] ip address ip subnet_mask
Assigns the specified IP address and subnet mask to the
specified interface. The no command clears the IP address
and the subnet mask.
[no]ip gateway ip [metric <0..15>]
Adds the specified gateway for the interface. Sets the priority
(relative to every gateway on every interface) for the specified
gateway. The lower the number, the higher the priority. The
no command removes the gateway.
[no] mtu <576..2304>
Specifies the Maximum Transmission Unit, which is the
maximum number of bytes in each packet moving through
this interface. The ZyWALL divides larger packets into smaller
fragments. The no command resets the MTU to 1500.
ZyWALL (ZLD) CLI Reference Guide
Chapter 6 Interfaces
Table 32 WLAN Interface Commands (continued)
COMMAND
DESCRIPTION
reauth <30..30000>
Sets the WPA2 reauthentication timer. This is at what interval
wireless stations have to resend usernames and passwords
in order to stay connected. If a RADIUS server authenticates
wireless stations, the reauthentication timer on the RADIUS
server has priority.
security mode {none | wep | wpa |
wpa-wpa2 | wpa2}
Sets what type of security the wireless interface uses.
none: applies no security.
wep: WEP security (extremely weak).
wpa: WPA security.
wpa-wpa2: WPA/WPA2-Enterprise or WPA/WPA2-PSK
security.
wpa2: WPA2 security (strongest option).
security wep <64 | 128> default-key
<1..4>
Sets WEP encryption to use a 64 or 128 bit key and selects
the default key.
security wep mode <open | share>
Sets the WEP encryption to use open or shared key
authentication.
security wpa <tkip | aes> eap
internal profile-name tls-cert
certificate name
Configures WPA enterprise security using TKIP or AES and
an existing AAA authentication method object (profilename). Set the certificate the ZyWALL uses to authenticate
itself to the wireless clients. The wireless clients must use
TTLS authentication protocol and PAP inside the TTLS
secure tunnel.
security wpa <tkip | aes> eap
external
Configures WPA enterprise security using TKIP or AES and
an external server. Use the security external command
to specify the server’s address.
security wpa <tkip | aes> psk key
psk-key
Configures WPA security using TKIP or AES and a PreShared Key (PSK).
security wpa-wpa2 <tkip | aes> eap
internal profile-name tls-cert
certificate name
This allows users to either use WPA or WPA2 enterprise
security to connect to the wireless interface. You have to also
configure to use either TKIP or AES and an existing AAA
authentication method object (profile-name). Set the
certificate the ZyWALL uses to authenticate itself to the
wireless clients. The wireless clients must use TTLS
authentication protocol and PAP inside the TTLS secure
tunnel.
security wpa-wpa2 <tkip | aes> eap
external
Configures WPA or WPA2 enterprise security using TKIP or
AES and an external server. Use the security external
command to specify the server’s address.
security wpa-wpa2 <tkip | aes> psk
key psk-key
Configures WPA or WPA2 security using TKIP or AES and a
Pre-Shared Key (PSK).
security wpa2 <tkip | aes> eap
internal profile-name tls-cert
certificate name
Configures WPA2 enterprise security using TKIP or AES and
an existing AAA authentication method object (profilename). Select the certificate the ZyWALL uses to authenticate
itself to the wireless clients. The wireless clients must use
TTLS authentication protocol and PAP inside the TTLS
secure tunnel.
security wpa2 <tkip | aes> eap
external
Configures WPA2 enterprise security using TKIP or AES and
an external server. Use the security external command
to specify the server’s address.
security wpa2 <tkip | aes> psk key
psk-key
Configures WPA2 security using TKIP or AES and a PreShared Key (PSK).
ZyWALL (ZLD) CLI Reference Guide
77
Chapter 6 Interfaces
Table 32 WLAN Interface Commands (continued)
COMMAND
DESCRIPTION
[no] security dot1x acct ip port
<1..65535>
Sets the IP address and port number of an external
accounting server.
[no] security dot1x auth ip port
<1..65535>
Sets the IP address and port number of an external
authentication (RADIUS) server.
[no] security dot1x activate
Enables IEEE 802.1x accounting and authentication.
[no] security external acct ip port
<1..65535>
Sets the IP address and port number of an external
accounting server.
[no] security external auth ip port
<1..65535>
Sets the IP address and port number of an external
authentication (RADIUS) server.
no security {none | wep | wpa |
wpa-wpa2 | wpa2}
Disables the specified security mode for the wireless
interface.
ssid ssid
Sets the (Service Set IDentity). This identifies the Service Set
with which a wireless station is associated. Wireless stations
associating to the ZyWALL must have the same SSID.
ssid: Use up to 32 printable 7-bit ASCII characters as a
name for the wireless LAN.
station-limit <1..255>
Sets the highest number of wireless clients that are allowed to
connect to the wireless interface at the same time.
wep-key <1..4> key
There are four data encryption keys to secure your data from
eavesdropping by unauthorized wireless users. The values
for the keys must be set up exactly the same on the access
points as they are on the wireless stations.
If you set WEP encryption to use a 64 bit key using the
security mode and security wep 64 commands, type
any 5 characters (ASCII string) or 5 pairs of hexadecimal
characters ("0-9", "A-F") preceded by 0x for each key.
If you set WEP encryption to use a 128 bit key using the
security mode and security wep 128 commands, type
13 characters (ASCII string) or 13 pairs of hexadecimal
characters ("0-9", "A-F") preceded by 0x for each key.
6.8.2.1 WLAN Interface Commands Example
This example configures WLAN AP interface 2 for slot 1 to use SSID WLAN_test, WPA
security modes with a pre-shared key of 12345678, IP address 1.1.1.1, netmask 255.255.255.0,
and a gateway IP address of 1.2.3.4 with a priority of 10.
Router(config)# interface wlan-1-2
Router(config-if-wlan)# ssid WLAN_test
Router(config-if-wlan)# security wpa tkip psk key 12345678
Router(config-if-wlan)# security mode wpa
Router(config-if-wlan)# ip address 1.1.1.1 255.255.255.0
Router(config-if-wlan)# ip gateway 1.2.3.4 metric 10
Router(config-if-wlan)# exit
78
ZyWALL (ZLD) CLI Reference Guide
Chapter 6 Interfaces
6.8.3 WLAN MAC Filter Commands
Use these commands to give specific wireless clients exclusive access to the ZyWALL (allow
association) or block specific devices from accessing the ZyWALL (deny association) based
on the devices’ MAC addresses.
Table 33 WLAN General Commands
COMMAND
DESCRIPTION
[no] wlan mac-filter mac_address
[description description]
Specifies the MAC address (in XX:XX:XX:XX:XX:XX format)
of the wireless station that is to be allowed or denied access
to the ZyWALL. The no command removes the entry.
description: You can use alphanumeric and ()+/
:=?!*#@$_%- characters, and it can be up to 60
characters long.
[no] wlan mac-filter activate
Turns the MAC address filter on or off.
wlan mac-filter associate <allow |
deny>
Defines the filter action for the list of MAC addresses in the
MAC address filter table. Allow permits them to access to the
ZyWALL, MAC addresses not listed will be blocked.
Deny blocks the listed addresses from accessing the router,
MAC addresses not listed will be allowed to access the router.
show wlan mac-filter status
Displays the MAC filter’s activation and association settings.
show wlan mac-filter
Displays the WLAN MAC filter entries.
6.8.3.1 WLAN MAC Filter Commands Example
This example creates a MAC filter entry for MAC address 01:02:03:04:05:06 and sets the
ZyWALL to allow wireless access from that entry’s MAC address only.
Router(config)# wlan mac-filter 01:02:03:04:05:06 description example
Router(config)# wlan mac-filter associate allow
Router(config)# wlan mac-filter activate
Router(config)# show wlan mac-filter status
Enable: yes
Association: allow
Router(config)# show wlan mac-filter
No. MAC
Description
===========================================================================
1
01:02:03:04:05:06
example
6.9 VLAN Interface Specific Commands
This section covers commands that are specific to VLAN interfaces. VLAN interfaces also use
many of the general interface commands discussed at the beginning of Section 6.2 on page 51.
ZyWALL (ZLD) CLI Reference Guide
79
Chapter 6 Interfaces
The following table identifies the values required for many of these commands. Other input
values are discussed with the corresponding commands.
Table 34 Input Values for VLAN Interface Commands
LABEL
DESCRIPTION
interface_name
VLAN interface: vlanx, x = 0 - 4094
Ethernet interface: For the ZyWALL USG 300 and above, use gex, x = 1 N, where N equals the highest numbered Ethernet interface for your
ZyWALL model.
The ZyWALL USG 100 and 200 models use a name such as wan1,
wan2, opt, lan1, ext-wlan, or dmz.
This table lists the VLAN interface commands.
Table 35 interface Commands: VLAN Interfaces
COMMAND
DESCRIPTION
interface interface_name
Creates the specified interface if necessary and
enters sub-command mode.
[no] port interface_name
Specifies the Ethernet interface on which the VLAN
interface runs. The no command clears the port.
[no] vlan-id <1..4094>
Specifies the VLAN ID used to identify the VLAN.
The no command clears the VLAN ID.
show port vlanid
Displays the Ethernet interface VLAN settings.
6.9.1 VLAN Interface Command Examples
The following commands show you how to set up VLAN vlan100 with the following
parameters: VLAN ID 100, interface ge1, IP 1.2.3.4, subnet 255.255.255.0, MTU 598,
gateway 2.2.2.2, description "I am vlan100”, upstream bandwidth 345, and downstream
bandwidth 123.
Router# configure terminal
Router(config)# interface vlan100
Router(config-if-vlan)# vlan-id 100
Router(config-if-vlan)# port ge1
Router(config-if-vlan)# ip address 1.2.3.4 255.255.255.0
Router(config-if-vlan)# ip gateway 2.2.2.2
Router(config-if-vlan)# mtu 598
Router(config-if-vlan)# upstream 345
Router(config-if-vlan)# downstream 123
Router(config-if-vlan)# description I am vlan100
Router(config-if-vlan)# exit
6.10 Bridge Specific Commands
This section covers commands that are specific to bridge interfaces. Bridge interfaces also use
many of the general interface commands discussed at the beginning of Section 6.2 on page 51.
80
ZyWALL (ZLD) CLI Reference Guide
Chapter 6 Interfaces
The following table identifies the values required for many of these commands. Other input
values are discussed with the corresponding commands.
Table 36 Input Values for Bridge Interface Commands
LABEL
DESCRIPTION
interface_name
The name of the interface.
Ethernet interface: For the ZyWALL USG 300 and above, use gex, x = 1 - N,
where N equals the highest numbered Ethernet interface for your ZyWALL
model.
The ZyWALL USG 100 and 200 models use a name such as wan1, wan2,
opt, lan1, ext-wlan, or dmz.
VLAN interface: vlanx, x = 0 - 4094
bridge interface: brx, x = 0 - N, where N depends on the number of bridge
interfaces your ZyWALL model supports.
This table lists the bridge interface commands.
Table 37 interface Commands: Bridge Interfaces
COMMAND
DESCRIPTION
interface interface_name
Creates the specified interface if necessary and
enters sub-command mode.
[no] join interface_name
show bridge available member
Adds the specified Ethernet interface or VLAN
interface to the specified bridge. The no command
removes the specified interface from the specified
bridge.
Displays the available interfaces that could be
added to a bridge.
6.10.1 Bridge Interface Command Examples
The following commands show you how to set up a bridge interface named br0 with the
following parameters: member ge1, IP 1.2.3.4, subnet 255.255.255.0, MTU 598, gateway
2.2.2.2, upstream bandwidth 345, downstream bandwidth 123, and description “I am br0”.
Router# configure terminal
Router(config)# interface br0
Router(config-if-brg)# join ge1
Router(config-if-brg)# ip address 1.2.3.4 255.255.255.0
Router(config-if-brg)# ip gateway 2.2.2.2
Router(config-if-brg)# mtu 598
Router(config-if-brg)# upstream 345
Router(config-if-brg)# downstream 123
Router(config-if-brg)# description I am br0
Router(config-if-brg)# exit
ZyWALL (ZLD) CLI Reference Guide
81
Chapter 6 Interfaces
6.11 Auxiliary Interface Specific Commands
The first table below lists the auxiliary interface commands, and the second table explains
the values you can input with these commands.
Table 38 interface Commands: Auxiliary Interface
COMMAND
DESCRIPTION
interface dial aux
interface disconnect aux
Dials or disconnects the auxiliary interface.
interface aux
Enters sub-command mode.
82
[no] authentication {chap-pap | chap | pap
| mschap | mschap-v2}
Specifies the authentication type of the auxiliary
interface. The no command sets the authentication
to chap-pap.
[no] dial-timeout <30..120>
Specifies the number of seconds the auxiliary
interface waits for an answer each time it tries to
connect. The no command disables the timeout.
[no] dialing-type {tone | pulse}
Specifies the dial type of the auxiliary interface. The
no command sets the dial type to tone.
[no] idle <0..360>
Specifies the number of seconds the auxiliary
interface waits for activity before it automatically
disconnects. The no command disables the idle
timeout.
[no] initial-string initial_string
Specifies the initial string of the auxiliary interface.
The no command sets the initial string to “ATZ”.
initial_string: You can use up to 64
characters. Semicolons (;) and backslashes (\) are
not allowed.
[no] password password
Specifies the password of the auxiliary interface.
The no command clears the password.
password: You can use up to 63 printable ASCII
characters. Spaces are not allowed.
[no] phone-number phone
Specifies the phone number of the auxiliary
interface. You can use 1-20 numbers, commas (,),
or plus signs (+). Use a comma to pause during
dialing. Use a plus sign to tell the external modem
to make an international call. The no command
clears the phone number.
[no] port-speed {9600 | 19200 | 38400 |
57600 | 115200}
Specifies the baud rate of the auxiliary interface.
The no command sets the baud rate to 115200.
[no] username username
Specifies the username of the auxiliary interface.
The no command clears the username.
username: You can use alphanumeric,
underscores (_), dashes (-), and /@$ characters,
and it can be up to 30 characters long.
ZyWALL (ZLD) CLI Reference Guide
Chapter 6 Interfaces
6.11.1 Auxiliary Interface Command Examples
The following commands show you how to set up the auxiliary interface aux with the
following parameters: phone-number 0340508888, tone dialing, port speed 115200, initialstring ATZ, timeout 10 seconds, retry count 2, retry interval 100 seconds, username kk,
password kk@u2online, chap-pap authentication, and description “I am aux interface”.
Router# configure terminal
Router(config)# interface aux
Router(config-if-aux)# phone-number 0340508888
Router(config-if-aux)# dialing-type tone
Router(config-if-aux)# port-speed 115200
Router(config-if-aux)# initial-string ATZ
Router(config-if-aux)# timeout 10
Router(config-if-aux)# retry-count 2
Router(config-if-aux)# retry-interval 100
Router(config-if-aux)# username kk
Router(config-if-aux)# password kk@u2online
Router(config-if-aux)# authentication chap-pap
Router(config-if-aux)# description I am aux interface
Router(config-if-aux)# exit
The following commands show how to dial, disconnect, and stop the auxiliary interface.
Router# interface dial aux
Router# interface disconnect aux
ZyWALL (ZLD) CLI Reference Guide
83
Chapter 6 Interfaces
84
ZyWALL (ZLD) CLI Reference Guide
CHAPTER
7
Trunks
This chapter shows you how to configure trunks on your ZyWALL.
7.1 Trunks Overview
You can group multiple interfaces together into trunks to have multiple connections share the
traffic load to increase overall network throughput and enhance network reliability. If one
interface’s connection goes down, the ZyWALL sends traffic through another member of the
trunk. For example, you can use two interfaces for WAN connections. You can connect one
interface to one ISP (or network) and connect the another to a second ISP (or network). The
ZyWALL can balance the load between multiple connections. If one interface's connection
goes down, the ZyWALL can automatically send its traffic through another interface.
You can use policy routing to specify through which interface to send specific traffic types.
You can use trunks in combination with policy routing. You can also define multiple trunks for
the same physical interfaces. This allows you to send specific traffic types through the
interface that works best for that type of traffic, and if that interface’s connection goes down,
the ZyWALL can still send its traffic through another interface.
7.2 Trunk Scenario Examples
Suppose one of the ZyWALL's interfaces is connected to an ISP that is also your Voice over IP
(VoIP) service provider. You may want to set that interface as active and set another interface
(connected to another ISP) to passive. This way VoIP traffic goes through the interface
connected to the VoIP service provider whenever the interface’s connection is up.
Another example would be if you use multiple ISPs that provide different levels of service to
different places. Suppose ISP A has better connections to Europe while ISP B has better
connections to Australia. You could use policy routing and trunks to send traffic for your
European branch offices primarily through ISP A and traffic for your Australian branch offices
primarily through ISP B.
ZyWALL (ZLD) CLI Reference Guide
85
Chapter 7 Trunks
7.3 Trunk Commands Input Values
The following table explains the values you can input with the interface-group
commands.
Table 39 interface-group Command Input Values
LABEL
DESCRIPTION
group-name
A descriptive name for the trunk.
For the ZyWALL USG 300 and above, use up to 31 characters (a-zA-Z0-9_-). The
name cannot start with a number. This value is case-sensitive.
The ZyWALL USG 100 and 200 models use WAN_TRUNK or WAN_TRUNK2-5.
interfacename
The name of an interface, it could be an Ethernet, PPP, VLAN or bridge interface. The
possible number of each interface type and the abbreviation to use are as follows.
Ethernet interface: For the ZyWALL USG 300 and above, use gex, x = 1 - N, where N
equals the highest numbered Ethernet interface for your ZyWALL model.
The ZyWALL USG 100 and 200 models use a name such as wan1, wan2, opt,
lan1, ext-wlan, or dmz.
PPPoE/PPTP interface: pppx, x = 0 - N, where N depends on the number of PPPoE/
PPTP interfaces your ZyWALL model supports.
VLAN interface: vlanx, x = 0 - 4094
bridge interface: brx, x = 0 - N, where N depends on the number of bridge interfaces
your ZyWALL model supports.
num
The interface’s position in the trunk’s list of members <1..8>.
<CR>
Carriage Return (the “enter” key).
7.4 Trunk Commands Summary
The following table lists the interface-group commands. You must use the configure
terminal command to enter the configuration mode before you can use these commands.
See Table 39 on page 86 for details about the values you can input with these commands.
Table 40 interface-group Commands Summary
86
COMMAND
DESCRIPTION
show interface-group {systemdefault|user-define|group-name}
Displays pre-configured system default trunks, your
own user configuration trunks or a specified trunk’s
settings.
[no] interface-group group-name
Creates a trunk name and enters the trunk subcommand mode where you can configure the trunk.
The no command removes the trunk.
algorithm {wrr|llf|spillover}
Sets the trunk’s load balancing algorithm.
exit
Leaves the trunk sub-command mode.
flush
Deletes a trunk’s interface settings.
interface {num|append|insert
num} interface-name [weight
<1..10>|limit
<1..2097152>|passive]
This subcommand adds an interface to a trunk. Sets
the interface’s number. It also sets the interface’s
weight and spillover limit or sets it to be passive.
ZyWALL (ZLD) CLI Reference Guide
Chapter 7 Trunks
Table 40 interface-group Commands Summary (continued)
COMMAND
DESCRIPTION
loadbalancing-index
<outbound|inbound|total>
Use this command only if you use least load first or
spill-over as the trunk’s load balancing algorithm.
Set either outbound, inbound or outbound and
inbound traffic (total) to which the ZyWALL will apply
the specified algorithm. Outbound traffic means the
traffic travelling from an internal interface (ex. LAN) to
an external interface (ex. WAN). Inbound traffic means
the opposite.
mode {normal|trunk}
Sets the mode for a trunk. Do this first in the trunk’s
sub-command mode.
move <1..8> to <1..8>
Changes a the interface order in a trunk.
[no] interface
{num|interface-name}
Removes an interface from the trunk.
system default-interface-group
group-name
Sets the ZyWALL to first attempt to use the the
specified WAN trunk.
[no] system default-snat
Enables or disables Source NAT (SNAT). When SNAT
is enabled, the ZyWALL uses the IP address of the
outgoing interface as the source IP address of the
packets it sends out through the WAN interfaces.
show system default-snat
Displays whether the ZyWALL enable SNAT or not.
The ZyWALL performs SNAT by default for traffic going
to or from the WAN interfaces.
show system default-interfacegroup
Dispalys the WAN trunk the ZyWALL first attempts to
use.
7.5 Trunk Command Examples
The following example creates a weighted round robin trunk for Ethernet interfaces ge1 and
ge2. The ZyWALL sends twice as much traffic through ge1.
Router# configure terminal
Router(config)# interface-group wrr-example
Router(if-group)# mode trunk
Router(if-group)# algorithm wrr
Router(if-group)# interface 1 ge1 weight 2
Router(if-group)# interface 2 ge2 weight 1
Router(if-group)# exit
Router(config)#
ZyWALL (ZLD) CLI Reference Guide
87
Chapter 7 Trunks
The following example creates a least load first trunk for Ethernet interface ge3 and VLAN 5,
which will only apply to outgoing traffic through the trunk. The ZyWALL sends new session
traffic through the least utilized of these interfaces.
Router# configure terminal
Router(config)# interface-group llf-example
Router(if-group)# mode trunk
Router(if-group)# algorithm llf
Router(if-group)# interface 1 ge3
Router(if-group)# interface 2 vlan5
Router(if-group)# loadbalancing-index outbound
Router(if-group)# exit
Router(config)#
The following example creates a spill-over trunk for Ethernet interfaces ge1 and ge3, which
will apply to both incoming and outgoing traffic through the trunk.. The ZyWALL sends
traffic through ge1 until it hits the limit of 1000 kbps. The ZyWALL sends anything over
1000 kbps through ge3.
Router# configure terminal
Router(config)# interface-group spill-example
Router(if-group)# mode trunk
Router(if-group)# algorithm spill-over
Router(if-group)# interface 1 ge1 limit 1000
Router(if-group)# interface 2 ge3 limit 1000
Router(if-group)# loadbalancing-index total
Router(if-group)# exit
Router(config)#
88
ZyWALL (ZLD) CLI Reference Guide
Chapter 7 Trunks
7.6 Link Sticking
You can have the ZyWALL send each local computer’s traffic through a single WAN interface
for a specified period of time. This is useful when a redirect server forwards a user request for
a file and informs the file server that a particular WAN IP address is requesting the file. If the
user’s subsequent sessions came from a different WAN IP address, the file server would deny
the request. Here is an example.
Figure 14 Link Sticking
1
3
WAN1
B
WAN2
2
4
LAN
A
C
1 LAN user A tries to download a file from server B on the Internet. The ZyWALL uses
WAN1 to send the request to server B.
2 However remote server B is actually a redirect server. So server B sends a file list to
LAN user A. The file list lets LAN user A’s computer know that the desired file is
actually on file server (C). At the same time, register server B informs file server C that
a computer located at the WAN1’s IP address will download a file.
3 The ZyWALL is using active/active load balancing. So when LAN user A tries to
retrieve the file from file server C, the request goes out through WAN2.
4 File server C finds that the request comes from WAN2’s IP address instead of WAN1’s
IP address and rejects the request.
5 If link sticking had been configured, the ZyWALL would have still used WAN1 to send
LAN user A’s request to file server C and the file server would have given the file to A.
ZyWALL (ZLD) CLI Reference Guide
89
Chapter 7 Trunks
7.7 Link Sticking Commands Summary
The following table lists the ip load-balancing link-sticking commands for
link sticking. (The link sticking commands have the prefix ip load-balancing because
they affect the ZyWALL’s load balancing behavior.) You must use the configure
terminal command to enter the configuration mode before you can use these commands.
See Table 39 on page 86 for details about the values you can input with these commands.
Table 41 ip load-balancing link-sticking Commands Summary
COMMAND
DESCRIPTION
[no] ip load-balancing linksticking activate
Turns link sticking on or off.
[no] ip load-balancing linksticking timeout timeout
Sets for how many seconds (30-3600) the ZyWALL
sends all of each local computer’s traffic through one
WAN interface.
show ip load-balancing linksticking status
Displays the current link sticking settings.
7.8 Link Sticking Command Example
This example shows how to activate link sticking and set the timeout to 600 seconds (ten
minutes).
Router(config)# ip load-balancing link-sticking activate
Router(config)# ip load-balancing link-sticking timeout 600
Router(config)# show ip load-balancing link-sticking status
active
: yes
timeout
: 300
90
ZyWALL (ZLD) CLI Reference Guide
CHAPTER
8
Route
This chapter shows you how to configure policies for IP routing and static routes on your
ZyWALL.
8.1 Policy Route
Traditionally, routing is based on the destination address only and the ZyWALL takes the
shortest path to forward a packet. IP Policy Routing (IPPR) provides a mechanism to override
the default routing behavior and alter the packet forwarding based on the policy defined by the
network administrator. Policy-based routing is applied to incoming packets on a per interface
basis, prior to the normal routing.
8.2 Policy Route Commands
The following table identifies the values required for many of these commands. Other input
values are discussed with the corresponding commands.
Table 42 Input Values for General Policy Route Commands
LABEL
DESCRIPTION
address_object
The name of the IP address (group) object. You may use 1-31 alphanumeric
characters, underscores(_), or dashes (-), but the first character cannot be a
number. This value is case-sensitive.
interface_name
The name of the interface.
Ethernet interface: For the ZyWALL USG 300 and above, use gex, x = 1 - N,
where N equals the highest numbered Ethernet interface for your ZyWALL
model.
The ZyWALL USG 100 and 200 models use a name such as wan1, wan2,
opt, lan1, ext-wlan, or dmz.
virtual interface on top of Ethernet interface: add a colon (:) and the number of
the virtual interface. For example: gex:y, x = 1 - N, y = 1 - 4
VLAN interface: vlanx, x = 0 - 4094
virtual interface on top of VLAN interface: vlanx:y, x = 0 - 4094, y = 1 - 12
bridge interface: brx, x = 0 - N, where N depends on the number of bridge
interfaces your ZyWALL model supports.
virtual interface on top of bridge interface: brx:y, x = the number of the bridge
interface, y = 1 - 4
PPPoE/PPTP interface: pppx, x = 0 - N, where N depends on the number of
PPPoE/PPTP interfaces your ZyWALL model supports.
policy_number
The number of a policy route. 1 - X where X is the highest number of policy
routes the ZyWALL model supports. See the ZyWALL’s User’s Guide for details.
ZyWALL (ZLD) CLI Reference Guide
91
Chapter 8 Route
Table 42 Input Values for General Policy Route Commands (continued)
LABEL
DESCRIPTION
schedule_object The name of the schedule. You may use 1-31 alphanumeric characters,
underscores(_), or dashes (-), but the first character cannot be a number. This
value is case-sensitive.
service_name
The name of the service (group). You may use 1-31 alphanumeric characters,
underscores(_), or dashes (-), but the first character cannot be a number. This
value is case-sensitive.
user_name
The name of a user (group). You may use 1-31 alphanumeric characters,
underscores(_), or dashes (-), but the first character cannot be a number. This
value is case-sensitive.
The following table describes the commands available for policy route. You must use the
configure terminal command to enter the configuration mode before you can use these
commands.
Table 43 Command Summary: Policy Route
COMMAND
DESCRIPTION
[no] bwm activate
Globally enables bandwidth management. You
must globally activate bandwidth management to
have individual policy routes or application patrol
policies apply bandwidth management. The no
command globally disables bandwidth
management.
policy {policy_number | append | insert
policy_number}
Enters the policy-route sub-command mode to
configure, add or insert a policy.
92
[no] auto-destination
When you set tunnel as the next-hop type
(using the next-hop tunnel command) for
this route, you can use this command to have the
ZyWALL use the local network of the peer router
that initiated an incoming dynamic IPSec tunnel
as the destination address of the policy instead of
what you configure by using the destination
command. The no command disables the setting.
[no] auto-disable
When you set interface or trunk as the nexthop type (using the next-hop interface or
next-hop trunk command) for this route, you
can use this command to have the ZyWALL
automatically disable this policy route when the
next-hop’s connection is down. The no command
disables the setting.
[no] bandwidth <1..1048576> priority
<1..1024> [maximize-bandwidth-usage]
Sets the maximum bandwidth and priority for the
policy. The no command removes bandwidth
settings from the rule. You can also turn
maximize bandwidth usage on or off.
[no] deactivate
Disables the specified policy. The no command
enables the specified policy.
[no] description description
Sets a descriptive name for the policy. The no
command removes the name for the policy.
[no] destination {address_object|any}
Sets the destination IP address the matched
packets must have. The no command resets the
destination IP address to the default (any). any
means all IP addresses.
ZyWALL (ZLD) CLI Reference Guide
Chapter 8 Route
Table 43 Command Summary: Policy Route (continued)
COMMAND
DESCRIPTION
[no] dscp {any | <0..63>}
Sets a custom DSCP code point (0~63). This is
the DSCP value of incoming packets to which
this policy route applies. any means all DSCP
value or no DSCP marker.
[no] dscp class {default | dscp_class}
Sets a DSCP class. Use default to apply this
policy route to incoming packets that are marked
with DSCP value 0. Use one of the pre-defined
AF classes (including af11~af13, af21~af23,
af31~af33, and af41~af43) to apply this policy
route to incoming packets that are marked with
the DSCP AF class.
The “af” entries stand for Assured Forwarding.
The number following the “af” identifies one of
four classes and one of three drop preferences.
See Assured Forwarding (AF) PHB for DiffServ
on page 95 for more details.
dscp-marking <0..63>
Sets a DSCP value to have the ZyWALL apply
that DSCP value to the route’s outgoing packets.
dscp-marking class {default | dscp_class}
Sets how the ZyWALL handles the DSCP value
of the outgoing packets that match this route. Set
this to default to have the ZyWALL set the
DSCP value of the packets to 0. Set this to an “af”
class (including af11~af13, af21~af23,
af31~af33, and af41~af43) which stands for
Assured Forwarding. The number following the
“af” identifies one of four classes and one of three
drop preferences. See Assured Forwarding (AF)
PHB for DiffServ on page 95 for more details.
no dscp-marking
Use this command to have the ZyWALL not
modify the DSCP value of the route’s outgoing
packets.
[no] interface interface_name
Sets the interface on which the incoming packets
are received. The no command resets the
incoming interface to the default (any). any
means all interfaces.
[no] next-hop {auto|gateway address object
|interface interface_name |trunk
trunk_name|tunnel tunnel_name}
Sets the next-hop to which the matched packets
are routed. The no command resets next-hop
settings to the default (auto).
[no] schedule schedule_object
Sets the schedule. The no command removes
the schedule setting to the default (none). none
means any time.
[no] service {service_name|any}
Sets the IP protocol. The no command resets
service settings to the default (any). any means
all services.
[no] snat {outgoing-interface|pool
{address_object}}
Sets the source IP address of the matched
packets that use SNAT. The no command
removes source NAT settings from the rule.
[no] source {address_object|any}
Sets the source IP address that the matched
packets must have. The no command resets the
source IP address to the default (any). any
means all IP addresses.
ZyWALL (ZLD) CLI Reference Guide
93
Chapter 8 Route
Table 43 Command Summary: Policy Route (continued)
COMMAND
DESCRIPTION
[no] sslvpn tunnel_name
Sets the incoming interface to an SSL VPN
tunnel. The no command removes the SSL VPN
tunnel through which the incoming packets are
received.
[no] trigger <1..8> incoming service_name
trigger service_name
Sets a port triggering rule. The no command
removes port trigger settings from the rule.
trigger append incoming service_name trigger
service_name
Adds a new port triggering rule to the end of the
list.
trigger delete <1..8>
Removes a port triggering rule.
trigger insert <1..8> incoming service_name
trigger service_name
Adds a new port triggering rule before the
specified number.
trigger move <1..8> to <1..8>
Moves a port triggering rule to the number that
you specified.
[no] tunnel tunnel_name
Sets the incoming interface to an IPSec VPN
tunnel. The no command removes the IPSec
VPN tunnel through which the incoming packets
are received.
[no] user user_name
Sets the user name. The no command resets the
user name to the default (any). any means all
users.
[no] policy controll-ipsec-dynamic-rules
activate
Enables the ZyWALL to use policy routes to
manually specify the destination addresses of
dynamic IPSec rules. You must manually create
these policy routes. The ZyWALL automatically
obtains source and destination addresses for
dynamic IPSec rules that do not match any of the
policy routes.
The no command has the ZyWALL automatically
obtain source and destination addresses for all
dynamic IPSec rules.
policy default-route
Enters the policy-route sub-command mode to
set a route with the name “default-route”.
policy delete policy_number
Removes a routing policy.
policy flush
Clears the policy routing table.
policy list table
Displays all policy route settings.
policy move policy_number to policy_number
Moves a routing policy to the number that you
specified.
[no] policy override-direct-route activate
Use this command to have the ZyWALL forward
packets that match a policy route according to
the policy route instead of sending the packets to
a directly connected network. Use the no
command to disable it.
show bwm activation
Displays whether or not the global setting for
bandwidth management on the ZyWALL is
enabled.
show bwm-usage < [policy-route policy_number] |
[interface interface_name]
Displays the specified policy route or interface’s
bandwidth allotment, current bandwidth usage,
and bandwidth usage statistics.
show policy-route [policy_number]
Displays all or specified policy route settings.
94
ZyWALL (ZLD) CLI Reference Guide
Chapter 8 Route
Table 43 Command Summary: Policy Route (continued)
COMMAND
DESCRIPTION
show policy-route begin <1..200> end <1..200>
Displays the specified range of policy route
settings.
show policy-route controll-ipsec-dynamic-rules
Displays whether the ZyWALL checks policy
routes first before IPSec dynamic rules.
show policy-route override-direct-route
Displays whether or not the ZyWALL forwards
packets that match a policy route according to
the policy route instead of sending the packets to
a directly connected network.
show policy-route rule_count
Displays the number of policy routes that have
been configured on the ZyWALL.
show policy-route underlayer-rules
Displays all policy route rule details for advanced
debugging.
8.2.1 Assured Forwarding (AF) PHB for DiffServ
Assured Forwarding (AF) behavior is defined in RFC 2597. The AF behavior group defines
four AF classes. Inside each class, packets are given a high, medium or low drop precedence.
The drop precedence determines the probability that routers in the network will drop packets
when congestion occurs. If congestion occurs between classes, the traffic in the higher class
(smaller numbered class) is generally given priority. Combining the classes and drop
precedence produces the following twelve DSCP encodings from AF11 through AF43. The
decimal equivalent is listed in brackets.
Table 44 Assured Forwarding (AF) Behavior Group
CLASS 1
CLASS 2
CLASS 3
CLASS 4
Low Drop Precedence
AF11 (10)
AF21 (18)
AF31 (26)
AF41 (34)
Medium Drop Precedence
AF12 (12)
AF22 (20)
AF32 (28)
AF42 (36)
High Drop Precedence
AF13 (14)
AF23 (22)
AF33 (30)
AF43 (38)
ZyWALL (ZLD) CLI Reference Guide
95
Chapter 8 Route
8.2.2 Policy Route Command Example
The following commands create two address objects (TW_SUBNET and GW_1) and insert a
policy that routes the packets (with the source IP address TW_SUBNET and any destination
IP address) through the interface ge1 to the next-hop router GW_1. This route uses the IP
address of the outgoing interface as the matched packets’ source IP address.
Router(config)# address-object TW_SUBNET 192.168.2.0 255.255.255.0
Router(config)# address-object GW_1 192.168.2.250
Router(config)# policy insert 1
Router(policy-route)# description example
Router(policy-route)# destination any
Router(policy-route)# interface ge1
Router(policy-route)# next-hop gateway GW_1
Router(policy-route)# snat outgoing-interface
Router(policy-route)# source TW_SUBNET
Router(policy-route)# exit
Router(config)# show policy-route 1
index: 1
active: yes
description: example
user: any
schedule: none
interface: ge1
tunnel: none
sslvpn: none
source: TW_SUBNET
destination: any
DSCP code: any
service: any
nexthop type: Gateway
nexthop: GW_1
nexthop state: Not support
auto destination: no
bandwidth: 0
bandwidth priority: 0
maximize bandwidth usage: no
SNAT: outgoing-interface
DSCP marking: preserve
amount of port trigger: 0
Router(config)#
8.3 IP Static Route
The ZyWALL has no knowledge of the networks beyond the network that is directly
connected to the ZyWALL. For instance, the ZyWALL knows about network N2 in the
following figure through gateway R1. However, the ZyWALL is unable to route a packet to
network N3 because it doesn't know that there is a route through the same gateway R1 (via
gateway R2). The static routes are for you to tell the ZyWALL about the networks beyond the
network connected to the ZyWALL directly.
96
ZyWALL (ZLD) CLI Reference Guide
Chapter 8 Route
Figure 15 Example of Static Routing Topology
8.4 Static Route Commands
The following table describes the commands available for static route. You must use the
configure terminal command to enter the configuration mode before you can use these
commands.
Table 45 Command Summary: Static Route
COMMAND
DESCRIPTION
[no] ip route {w.x.y.z} {w.x.y.z}
{interface|w.x.y.z} <0..127>
Sets a static route. The no command disables a
static route.
ip route replace {w.x.y.z} {w.x.y.z}
{interface|w.x.y.z} <0..127> with {w.x.y.z}
{w.x.y.z} {interface|w.x.y.z} <0..127>
Changes an existing route’s settings.
show ip route-settings
Displays static route information. Use show ip
route to see learned route information. See
Section 9.2.5 on page 102.
8.4.1 Static Route Commands Example
The following command sets a static route with IP address 10.10.10.0 and subnet mask
255.255.255.0 and with the next-hop interface ge1. Then use the show command to display
the setting.
Router(config)# ip route 10.10.10.0 255.255.255.0 ge1
Router(config)#
Router(config)# show ip route-settings
Route
Netmask
Nexthop
Metric
===========================================================================
10.10.10.0
255.255.255.0
ge1
0
ZyWALL (ZLD) CLI Reference Guide
97
Chapter 8 Route
98
ZyWALL (ZLD) CLI Reference Guide
CHAPTER
9
Routing Protocol
This chapter describes how to set up RIP and OSPF routing protocols for the ZyWALL.
9.1 Routing Protocol Overview
Routing protocols give the ZyWALL routing information about the network from other
routers. The ZyWALL then stores this routing information in the routing table, which it uses
when it makes routing decisions. In turn, the ZyWALL can also provide routing information
via routing protocols to other routers.
The ZyWALL supports two standards, RIP and OSPF, for routing protocols. RIP and OSPF
are compared in Table 46 on page 99, and they are discussed further in the next two sections.
Table 46 OSPF vs. RIP
OSPF
RIP
Network Size
Large
Small (with up to 15 routers)
Metric
Bandwidth, hop count, throughput, round
trip time and reliability.
Hop count
Convergence
Fast
Slow
9.2 Routing Protocol Commands Summary
The following table describes the values required for many routing protocol commands. Other
values are discussed with the corresponding commands.
Table 47 Input Values for Routing Protocol Commands
LABEL
DESCRIPTION
ip
The 32-bit name of the area or virtual link in IP address format.
authkey
The password for text or MD5 authentication. You may use alphanumeric
characters or underscores(_).
text password: 1-8 characters long
MD5 password: 1-16 characters long
The following sections list the routing protocol commands.
ZyWALL (ZLD) CLI Reference Guide
99
Chapter 9 Routing Protocol
9.2.1 RIP Commands
This table lists the commands for RIP.
Table 48 router Commands: RIP
COMMAND
DESCRIPTION
router rip
Enters sub-command mode.
[no] network interface_name
Enables RIP on the specified Ethernet interface.
The no command disables RIP on the specified
interface.
[no] redistribute {static | ospf}
Enables redistribution of routing information
learned from the specified source. The no
command disables redistribution from the specified
source.
redistribute {static | ospf} metric
<0..16>
Sets the metric when redistributing routing
information learned from the specified source.
[no] version <1..2>
Sets the default RIP version for all interfaces with
RIP enabled. If the interface RIP version is blank,
the interface uses the default version. This is not
available in the GUI. The no command sets the
default RIP version to 2.
[no] passive-interface interface_name
Sets the direction to “In-Only” for the specified
interface. The no command sets the direction to bidirectional.
[no] authentication mode {md5 | text}
Sets the authentication mode for RIP. The no
command sets the authentication mode to “none”.
[no] authentication string authkey
Sets the password for text authentication. The no
command clears the password.
authentication key <1..255> key-string
authkey
Sets the MD5 ID and password for MD5
authentication.
no authentication key
Clears the MD5 ID and password.
[no] outonly-interface interface_name
Sets the direction to “Out-Only” for the specified
interface. The no command sets the direction to
“BiDir”.
9.2.2 General OSPF Commands
This table lists the commands for general OSPF configuration.
Table 49 router Commands: General OSPF Configuration
COMMAND
DESCRIPTION
router ospf
Enters sub-command mode.
100
[no] redistribute {static | rip}
Enables redistribution of routing information
learned from the specified non-OSPF source. The
no command disables redistribution from the
specified non-OSPF source.
[no] redistribute {static | rip} metrictype <1..2> metric <0..16777214>
Sets the metric for routing information learned from
the specified non-OSPF source. The no command
clears the metric.
ZyWALL (ZLD) CLI Reference Guide
Chapter 9 Routing Protocol
Table 49 router Commands: General OSPF Configuration (continued)
COMMAND
DESCRIPTION
[no] passive-interface interface_name
Sets the direction to “In-Only” for the specified
interface. The no command sets the direction to
“BiDir”.
[no] router-id IP
Sets the 32-bit ID (in IP address format) of the
ZyWALL. The no command resets it to “default”, or
the highest available IP address.
9.2.3 OSPF Area Commands
This table lists the commands for OSPF areas.
Table 50 router Commands: OSPF Areas
COMMAND
DESCRIPTION
router ospf
Enters sub-command mode.
[no] network interface area IP
Adds the specified interface to the specified area.
The no command removes the specified interface
from the specified area.
[no] area IP [{stub | nssa}]
Creates the specified area and sets it to the
indicated type. The no command removes the
area.
[no] area IP authentication
Enables text authentication in the specified area.
The no command disables authentication in the
specified area.
[no] area IP authentication message-digest
Enables MD5 authentication in the specified area.
The no command disables authentication in the
specified area.
[no] area IP authentication
authentication-key authkey
Sets the password for text authentication in the
specified area. The no command clears the
password.
[no] area IP authentication messagedigest-key <1..255> md5 authkey
Sets the MD5 ID and password for MD5
authentication in the specified area. The no
command clears the MD5 ID and password.
9.2.4 Virtual Link Commands
This table lists the commands for virtual links in OSPF areas.
Table 51 router Commands: Virtual Links in OSPF Areas
COMMAND
DESCRIPTION
show ospf area IP virtual-link
Displays information about virtual links for the
specified area.
router ospf
[no] area IP virtual-link IP
Creates the specified virtual link in the specified
area. The no command removes the specified
virtual link.
[no] area IP virtual-link IP
authentication
Enables text authentication in the specified virtual
link. The no command disables authentication in
the specified virtual link.
ZyWALL (ZLD) CLI Reference Guide
101
Chapter 9 Routing Protocol
Table 51 router Commands: Virtual Links in OSPF Areas (continued)
COMMAND
DESCRIPTION
[no] area IP virtual-link IP
authentication message-digest
Enables MD5 authentication in the specified virtual
link. The no command disables authentication in
the specified virtual link.
[no] area IP virtual-link IP
authentication authentication-key authkey
Sets the password for text authentication in the
specified virtual link. The no command clears the
password in the specified virtual link.
[no] area IP virtual-link IP
authentication message-digest-key <1..255>
md5 authkey
Sets the MD5 ID and password for MD5
authentication in the specified virtual link. The no
command clears the MD5 ID and password in the
specified virtual link.
[no] area IP virtual-link IP
authentication same-as-area
Sets the virtual link’s authentication method to the
area’s default authentication.
[no] area IP virtual-link IP
authentication-key authkey
Sets the password for text authentication in the
specified virtual link. The no command clears the
password.
area IP virtual-link IP message-digest-key
<1..255> md5 authkey
Sets the MD5 ID and password for MD5
authentication in the specified virtual link.
no area IP virtual-link IP message-digestkey <1..255>
Clears the MD5 ID in the specified virtual link.
9.2.5 Learned Routing Information Commands
This table lists the commands to look at learned routing information.
Table 52 ip route Commands: Learned Routing Information
COMMAND
DESCRIPTION
show ip route [kernel | connected | static |
ospf | rip | bgp]
Displays learned routing and other routing
information.
9.2.6 show ip route Command Example
The following example shows learned routing information on the ZyWALL.
Router> show ip route
Flags: A - Activated route, S - Static route, C - directly Connected
O - OSPF derived, R - RIP derived, G - selected Gateway
! - reject, B - Black hole, L - Loop
IP Address/Netmask
Gateway
IFace
Metric
Flags
Persist
===========================================================================
0.0.0.0/0
172.16.1.254
wan1
0
ASG
10.59.0.0/24
0.0.0.0
ext-wlan
0
ACG
127.0.0.0/8
0.0.0.0
lo
0
ACG
172.16.1.0/24
0.0.0.0
wan1
0
ACG
192.168.1.0/24
0.0.0.0
lan1
0
ACG
192.168.2.0/24
0.0.0.0
lan2
0
ACG
192.168.3.0/24
0.0.0.0
dmz
0
ACG
-
102
ZyWALL (ZLD) CLI Reference Guide
CHAPTER
10
Zones
Set up zones to configure network security and network policies in the ZyWALL.
10.1 Zones Overview
A zone is a group of interfaces and VPN tunnels. The ZyWALL uses zones, not interfaces, in
many security and policy settings, such as firewall rules and remote management.
Zones cannot overlap. Each Ethernet interface, VLAN interface, bridge interface, PPPoE/
PPTP interface, auxiliary interface, and VPN tunnel can be assigned to at most one zone.
Virtual interfaces are automatically assigned to the same zone as the interface on which they
run.
Figure 16 Example: Zones
ZyWALL (ZLD) CLI Reference Guide
103
Chapter 10 Zones
10.2 Zone Commands Summary
The following table describes the values required for many zone commands. Other values are
discussed with the corresponding commands.s
Table 53 Input Values for Zone Commands
LABEL
DESCRIPTION
profile_name
The name of a zone, or the name of a VPN tunnel.
For the ZyWALL USG 300 and above, use up to 31 characters (a-zA-Z0-9_-). The
name cannot start with a number. This value is case-sensitive.
The ZyWALL USG 100 and 200 models use pre-defined zone names like DMZ,
LAN1, SSL VPN, WLAN, IPSec VPN, OPT, and WAN.
This table lists the zone commands.
Table 54 zone Commands
COMMAND
DESCRIPTION
show zone [profile_name]
Displays information about the specified zone or about
all zones.
show zone binding-iface
Displays each interface and zone mappings.
show zone default-binding
Displays the pre-configured interface and zone
mappings that come with the ZyWALL.
show zone none-binding
Displays the interfaces, tunnels and SSL VPNs that are
not associated with a zone yet.
show zone system-default
Displays the pre-configured default zones that you
cannot delete from the ZyWALL.
show zone user-define
Displays all customized zones.
[no] zone profile_name
Creates the zone if necessary and enters subcommand mode. The no command deletes the zone.
zone profile_name
Enter the sub-command mode.
[no] block
Blocks intra-zone traffic. The no command allows intrazone traffic.
[no] interface interface_name Adds the specified interface to the specified zone. The
no command removes the specified interface from the
specified zone. See Section 6.2 on page 51 for
information about interface names.
104
[no] crypto profile_name
Adds the specified IPSec VPN tunnel to the specified
zone. The no command removes the specified IPSec
VPN tunnel from the specified zone.
[no] sslvpn profile_name
Adds the specified SSL VPN tunnel to the specified
zone. The no command removes the specified SSL
VPN tunnel from the specified zone.
ZyWALL (ZLD) CLI Reference Guide
Chapter 10 Zones
10.2.1 Zone Command Examples
The following commands add Ethernet interfaces ge1 and ge2 to zone A and block intra-zone
traffic.
Router# configure terminal
Router(config)# zone A
Router(zone)# interface ge1
Router(zone)# interface ge2
Router(zone)# block
Router(zone)# exit
Router(config)# show zone
No. Name
Block Member
===========================================================================
1
A
yes
ge1,ge2
Router(config)# show zone A
blocking intra-zone traffic: yes
No. Type
Member
===========================================================================
1
interface
ge1
2
interface
ge2
ZyWALL (ZLD) CLI Reference Guide
105
Chapter 10 Zones
106
ZyWALL (ZLD) CLI Reference Guide
CHAPTER
11
DDNS
This chapter describes how to configure dynamic DNS (DDNS) services for the ZyWALL.
11.1 DDNS Overview
DNS maps a domain name to a corresponding IP address and vice versa. Similarly, dynamic
DNS maps a domain name to a dynamic IP address. As a result, anyone can use the domain
name to contact you (in NetMeeting, CU-SeeMe, etc.) or to access your FTP server or Web
site, regardless of the current IP address.
"
You must have a public WAN IP address to use Dynamic DNS.
Set up a dynamic DNS account with a supported DNS service provider to be able to use
Dynamic DNS services with the ZyWALL. When registration is complete, the DNS service
provider gives you a password or key. At the time of writing, the ZyWALL supports the
following DNS service providers. See the listed websites for details about the DNS services
offered by each.
Table 55 Network > DDNS
"
DDNS SERVICE
PROVIDER
SERVICE TYPES SUPPORTED
WEBSITE
DynDNS
Dynamic DNS, Static DNS, and Custom
DNS
www.dyndns.com)
Dynu
Basic, Premium
www.dynu.com
No-IP
No-IP
www.no-ip.com
Peanut Hull
Peanut Hull
www.oray.cn
NOTES
Chinese website
Record your DDNS account’s user name, password, and domain name to use
to configure the ZyWALL.
After, you configure the ZyWALL, it automatically sends updated IP addresses to the DDNS
service provider, which helps redirect traffic accordingly.
ZyWALL (ZLD) CLI Reference Guide
107
Chapter 11 DDNS
11.2 DDNS Commands Summary
The following table describes the values required for many DDNS commands. Other values
are discussed with the corresponding commands.
Table 56 Input Values for DDNS Commands
LABEL
DESCRIPTION
profile_name
The name of the DDNS profile. You may use 1-31 alphanumeric characters,
underscores(_), or dashes (-), but the first character cannot be a number. This
value is case-sensitive.
The following table lists the DDNS commands.
Table 57 ip ddns Commands
COMMAND
DESCRIPTION
show ddns [profile_name]
Displays information about the specified DDNS
profile or about all DDNS profiles.
[no] ip ddns profile profile_name
Creates the specified DDNS profile if necessary
and enters sub-command mode. The no command
deletes it.
108
[no] service-type {dyndns | dyndns_static
| dyndns_custom | dynu-basic | dynupremium | no-ip | peanut-hull | 3322-dyn |
3322-static}
Sets the service type in the specified DDNS profile.
The no command clears it.
[no] username username password password
Sets the username and password in the specified
DDNS profile. The no command clears these
fields.
username: You can use up to 31 alphanumeric
characters and the underscore (_).
password: You can use up to 64 alphanumeric
characters and the underscore (_).
[no] host hostname
Sets the domain name in the specified DDNS
profile. The no command clears the domain name.
hostname: You may up to 254 alphanumeric
characters, dashes (-), or periods (.), but the first
character must be alphanumeric.
[no] ip-select {iface | auto | custom}
Sets the IP address update policy in the specified
DDNS profile. The no command clears the policy.
[no] ip-select-backup {iface | auto |
custom}
Sets the alternate IP address update policy in the
specified DDNS profile. The no command clears
the policy.
[no] custom ip
Sets the static IP address in the specified DDNS
profile. The no command clears it.
[no] backup-custom ip
Sets the static IP address for the backup interface
in the specified DDNS profile. The no command
clears it.
[no] mx {ip | domain_name}
Enables the mail exchanger and sets the fullyqualified domain name of the mail server to which
mail from this domain name is forwarded. The no
command disables the mail exchanger.
domain_name: You may up to 254 alphanumeric
characters, dashes (-), or periods (.), but the first
character must be alphanumeric.
ZyWALL (ZLD) CLI Reference Guide
Chapter 11 DDNS
Table 57 ip ddns Commands (continued)
COMMAND
DESCRIPTION
[no] wan-iface interface_name
Sets the WAN interface in the specified DDNS
profile. The no command clears it.
[no] backup-iface interface_name
Sets the backup WAN interface in the specified
DDNS profile. The no command clears it.
[no] ha-iface interface_name
Sets the HA interface in the specified DDNS profile.
The no command clears it.
[no] backmx
Enables the backup mail exchanger. The no
command disables it.
[no] wildcard
Enables the wildcard feature. The no command
disables it.
ZyWALL (ZLD) CLI Reference Guide
109
Chapter 11 DDNS
110
ZyWALL (ZLD) CLI Reference Guide
CHAPTER
12
Virtual Servers
This chapter describes how to set up, manage, and remove virtual servers. Virtual server
commands configure NAT.
12.1 Virtual Server Overview
Virtual server is also known as port forwarding or port translation.
Virtual servers are computers on a private network behind the ZyWALL that you want to make
available outside the private network. If the ZyWALL has only one public IP address, you can
make the computers in the private network available by using ports to forward packets to the
appropriate private IP address.
12.1.1 1:1 NAT and Many 1:1 NAT
1:1 NAT - If the private network server will initiate sessions to the outside clients, use 1:1 NAT
to have the ZyWALL translate the source IP address of the server’s outgoing traffic to the
same public IP address that the outside clients use to access the server.
Many 1:1 NAT - If you have a range of private network servers that will initiate sessions to the
outside clients and a range of public IP addresses, use many 1:1 NAT to have the ZyWALL
translate the source IP address of each server’s outgoing traffic to the same one of the public IP
addresses that the outside clients use to access the server. The private and public ranges must
have the same number of IP addresses.
One many 1:1 NAT rule works like multiple 1:1 NAT rules, but it eases the configuration
effort since you only create one rule.
12.2 Virtual Server Commands Summary
The following table describes the values required for many virtual server commands. Other
values are discussed with the corresponding commands.
Table 58 Input Values for Virtual Server Commands
LABEL
DESCRIPTION
service_object
The name of a service. You may use 1-31 alphanumeric characters,
underscores(_), or dashes (-), but the first character cannot be a number. This
value is case-sensitive.
profile_name
The name of the virtual server. You may use 1-31 alphanumeric characters,
underscores(_), or dashes (-), but the first character cannot be a number. This
value is case-sensitive.
ZyWALL (ZLD) CLI Reference Guide
111
Chapter 12 Virtual Servers
The following table lists the virtual server commands.
Table 59 ip virtual-server Commands
COMMAND
DESCRIPTION
show ip virtual-server [profile_name]
Displays information about the specified virtual
server or about all the virtual servers.
no ip virtual-server profile_name
Deletes the specified virtual server.
ip virtual-server profile_name interface
interface_name original-ip {any | ip |
address_object} map-to {address_object | ip}
map-type any [nat-loopback [nat-1-1-map]
[deactivate] | nat-1-1-map [deactivate] |
deactivate]
Creates or modifies the specified virtual server and
maps the specified destination IP address (for all
destination ports) to the specified destination
address object or IP address. The original
destination IP is defined by the specified interface
(any), the specified IP address (IP), or the specified
address object (address-object). NAT loopback
allows local users to use a domain name to access
this virtual server.
Select what kind of NAT this rule is to perform.
nat-1-1-map: means the NAT type is either 1:1
NAT or many 1:1 NAT. See Section 12.1.1 on page
111 for more information.
Using this command without nat-1-1-map means
the NAT type is Virtual Server. This makes
computers on a private network behind the
ZyWALL available to a public network outside the
ZyWALL (like the Internet).
The deactivate command disables the virtual
server rule.
ip virtual-server profile_name interface
interface_name original-ip {any | IP |
address_object} map-to {address_object | ip}
map-type port protocol {any | tcp | udp}
original-port <1..65535> mapped-port
<1..65535> [nat-loopback [nat-1-1-map]
[deactivate] | nat-1-1-map [deactivate] |
deactivate]
Creates or modifies the specified virtual server and
maps the specified (destination IP address,
protocol, and destination port) to the specified
(destination IP address and destination port). The
original destination IP is defined by the specified
interface (any), the specified IP address (IP), or the
specified address object (address-object). NAT
loopback allows local users to use a domain name
to access this virtual server.
nat-1-1-map: means the NAT type is either 1:1
NAT or many 1:1 NAT. See Section 12.1.1 on page
111 for more information.
Using this command without nat-1-1-map means
the NAT type is Virtual Server. This makes
computers on a private network behind the
ZyWALL available to a public network outside the
ZyWALL (like the Internet).
The deactivate command disables the virtual
server rule.
112
ZyWALL (ZLD) CLI Reference Guide
Chapter 12 Virtual Servers
Table 59 ip virtual-server Commands (continued)
COMMAND
DESCRIPTION
ip virtual-server profile_name interface
interface_name original-ip {any | IP |
address_object} map-to {address_object | ip}
map-type ports protocol {any | tcp | udp}
original-port-begin <1..65535> original-portend <1..65535> mapped-port-begin <1..65535>
[nat-loopback [nat-1-1-map] [deactivate] |
nat-1-1-map [deactivate] | deactivate]
Creates or modifies the specified virtual server and
maps the specified (destination IP address,
protocol, and range of destination ports) to the
specified (destination IP address and range of
destination ports). The original destination IP is
defined by the specified interface (any), the
specified IP address (IP), or the specified address
object (address-object). NAT loopback allows
local users to use a domain name to access this
virtual server.
nat-1-1-map: means the NAT type is either 1:1
NAT or many 1:1 NAT. See Section 12.1.1 on page
111 for more information.
Using this command without nat-1-1-map means
the NAT type is Virtual Server. This makes
computers on a private network behind the
ZyWALL available to a public network outside the
ZyWALL (like the Internet).
The deactivate command disables the virtual
server rule.
ip virtual-server profile_name interface
interface_name original-ip {any | IP |
address_object} map-to {address_object | ip}
map-type original-service service_object
mapped-service service_object [nat-loopback
[nat-1-1-map] [deactivate] | nat-1-1-map
[deactivate] | deactivate]
Creates or modifies the specified virtual server and
maps the specified (destination IP address,
protocol, and service object) to the specified
(destination IP address and service object). The
original destination IP is defined by the specified
interface (any), the specified IP address (IP), or the
specified address object (address-object). NAT
loopback allows local users to use a domain name
to access this virtual server.
nat-1-1-map: means the NAT type is either 1:1
NAT or many 1:1 NAT. See Section 12.1.1 on page
111 for more information.
Using this command without nat-1-1-map means
the NAT type is Virtual Server. This makes
computers on a private network behind the
ZyWALL available to a public network outside the
ZyWALL (like the Internet).
The deactivate command disables the virtual
server rule.
ip virtual-server {activate | deactivate}
profile_name
Activates or deactivates the specified virtual server.
ip virtual-server delete profile_name
Deletes the specified virtual server.
ip virtual-server flush
Deletes all virtual servers.
ip virtual-server rename profile_name
profile_name
Renames the specified virtual server from the first
profile_name to the second profile_name.
ZyWALL (ZLD) CLI Reference Guide
113
Chapter 12 Virtual Servers
12.2.1 Virtual Server Command Examples
The following command creates virtual server WAN-LAN_H323 on the wan1 interface that
maps IP addresses 10.0.0.8 to 192.168.1.56. for TCP protocol traffic on port 1720. It also adds
a NAT loopback entry.
Router# configure terminal
Router(config)# ip virtual-server WAN-LAN_H323 interface wan1 original-ip
10.0.0.8 map-to 192.168.1.56 map-type port protocol tcp original-port 1720
mapped-port 1720 nat-loopback
Router(config)#
The following command shows information about all the virtual servers in the ZyWALL.
Router(config)# show ip virtual-server
virtual server: WAN-LAN_H323
active: yes
interface: wan1
NAT-loopback active: yes
NAT 1-1: no
original IP: 10.0.0.8
mapped IP: 192.168.1.56
mapping type: port
protocol type: tcp
original service:
mapped service:
original start port: 1720
original end port:
mapped start port: 1720
mapped end port:
Router(config)#
12.2.2 Tutorial - How to Allow Public Access to a Server
This is an example of making an HTTP (web) server in the DMZ zone accessible from the
Internet (the WAN zone). You will use a public IP address of 1.1.1.2 on the ge2 (or wan1 on
USG 100 and 200 models) interface and map it to the HTTP server’s private IP address of
192.168.3.7.
Figure 17 Public Server Example Network Topology
DMZ
192.168.3.7
WAN
1.1.1.2
Follow the following steps for the setting.
1 Configure Address object
114
ZyWALL (ZLD) CLI Reference Guide
Chapter 12 Virtual Servers
Create two address objects. One is named DMZ_HTTP for the HTTP server’s private IP
address of 192.168.3.7. The other one is named ge2_HTTP for the ge2 (wan1) public IP
address of 1.1.1.2.
Router# configure terminal
Router(config)# address-object DMZ_HTTP 192.168.3.7
Router(config)# address-object ge2_HTTP 1.1.1.2
Router(config)#
2 Configure NAT
You need a NAT rule to send HTTP traffic coming to IP address 1.1.1.2 on ge2 (wan1) to
the HTTP server’s private IP address of 192.168.3.7. Use the following settings:
• This NAT rule is for any HTTP traffic coming in on ge2 (wan1) to IP address 1.1.1.2.
• The NAT rule sends this traffic to the HTTP server’s private IP address of 192.168.3.7
(defined in the DMZ_HTTP object).
• HTTP traffic and the HTTP server in this example both use TCP port 80. So you set
the port mapping type to “port”, the protocol type to “TCP”, and the original and
mapped ports to “80”.
Router(config)# ip virtual-server To-VirtualServer-WWW interface ge2
original-ip ge2_HTTP map-to DMZ_HTTP map-type port protocol tcp originalport 80 mapped-port 80
Router(config)#
3 Configure firewall
Create a firewall rule to allow HTTP traffic from the WAN zone to the DMZ web server.
Router(config)# firewall insert 1
Router(firewall)# description To-VirtualServer-WWW
Router(firewall)# from WAN
Router(firewall)# to DMZ
Router(firewall)# destinationip DMZ_HTTP
Router(firewall)# service HTTP
Router(firewall)# exit
Router(config)# write
Router(config)#
Now the public can go to IP address 1.1.1.2 to access the HTTP server.
ZyWALL (ZLD) CLI Reference Guide
115
Chapter 12 Virtual Servers
116
ZyWALL (ZLD) CLI Reference Guide
CHAPTER
13
HTTP Redirect
This chapter shows you how to configure HTTP redirection on your ZyWALL.
13.1 HTTP Redirect Overview
HTTP redirect forwards the client’s HTTP request (except HTTP traffic destined for the
ZyWALL) to a web proxy server.
13.1.1 Web Proxy Server
A proxy server helps client devices make indirect requests to access the Internet or outside
network resources/services. A proxy server can act as a firewall or an ALG (application layer
gateway) between the private network and the Internet or other networks. It also keeps hackers
from knowing internal IP addresses.
ZyWALL (ZLD) CLI Reference Guide
117
Chapter 13 HTTP Redirect
13.2 HTTP Redirect Commands
The following table identifies the values required for many of these commands. Other input
values are discussed with the corresponding commands.
Table 60 Input Values for HTTP Redirect Commands
LABEL
DESCRIPTION
description
The name to identify the rule. You may use 1-31 alphanumeric characters,
underscores(_), or dashes (-), but the first character cannot be a number. This
value is case-sensitive.
interface_name
The name of the interface.
Ethernet interface: For the ZyWALL USG 300 and above, use gex, x = 1 - N,
where N equals the highest numbered Ethernet interface for your ZyWALL
model.
The ZyWALL USG 100 and 200 models use a name such as wan1, wan2,
opt, lan1, ext-wlan, or dmz.
virtual interface on top of Ethernet interface: add a colon (:) and the number of
the virtual interface. For example: gex:y, x = 1 - N, y = 1 - 4
VLAN interface: vlanx, x = 0 - 4094
virtual interface on top of VLAN interface: vlanx:y, x = 0 - 4094, y = 1 - 4
bridge interface: brx, x = 0 - N, where N depends on the number of bridge
interfaces your ZyWALL model supports.
virtual interface on top of bridge interface: brx:y, x = the number of the bridge
interface, y = 1 - 4
PPPoE/PPTP interface: pppx, x = 0 - N, where N depends on the number of
PPPoE/PPTP interfaces your ZyWALL model supports.
The following table describes the commands available for HTTP redirection. You must use the
configure terminal command to enter the configuration mode before you can use these
commands.
Table 61 Command Summary: HTTP Redirect
COMMAND
DESCRIPTION
ip http-redirect description interface
interface_name redirect-to w.x.y.z <1..65535>
Sets a HTTP redirect rule.
ip http-redirect description interface
interface_name redirect-to w.x.y.z <1..65535>
deactivate
Disables a HTTP redirect rule.
ip http-redirect activate description
Enables a rule with the specified rule name.
ip http-redirect deactivate description
Disables a rule with the specified rule name.
no ip http-redirect description
Removes a rule with the specified rule name.
ip http-redirect flush
Clears all HTTP redirect rules.
show ip http-redirect [description]
Displays HTTP redirect settings.
118
ZyWALL (ZLD) CLI Reference Guide
Chapter 13 HTTP Redirect
13.2.1 HTTP Redirect Command Examples
The following commands create a HTTP redirect rule, disable it and display the settings.
Router# configure terminal
Router(config)# ip http-redirect example1 interface ge1 redirect-to
10.10.2.3 80
Router(config)# ip http-redirect example1 interface ge1 redirect-to
10.10.2.3 80 deactivate
Router(config)# show ip http-redirect
Name
Interface
Proxy Server
Port
Active
===========================================================================
example1
ge1
10.10.2.3
80
no
ZyWALL (ZLD) CLI Reference Guide
119
Chapter 13 HTTP Redirect
120
ZyWALL (ZLD) CLI Reference Guide
CHAPTER
14
ALG
This chapter covers how to use the ZyWALL’s ALG feature to allow certain applications to
pass through the ZyWALL.
14.1 ALG Introduction
The ZyWALL can function as an Application Layer Gateway (ALG) to allow certain NAT unfriendly applications (such as SIP) to operate properly through the ZyWALL’s NAT.
Some applications cannot operate through NAT (are NAT un-friendly) because they embed IP
addresses and port numbers in their packets’ data payload. The ZyWALL examines and uses
IP address and port number information embedded in the VoIP traffic’s data stream. When a
device behind the ZyWALL uses an application for which the ZyWALL has VoIP pass through
enabled, the ZyWALL translates the device’s private IP address inside the data stream to a
public IP address. It also records session port numbers and allows the related sessions to go
through the firewall so the application’s traffic can come in from the WAN to the LAN.
The ZyWALL only needs to use the ALG feature for traffic that goes through the ZyWALL’s
NAT. The firewall allows related sessions for VoIP applications that register with a server. The
firewall allows or blocks peer to peer VoIP traffic based on the firewall rules.
You do not need to use a TURN (Traversal Using Relay NAT) server for VoIP devices behind
the ZyWALL when you enable the SIP ALG.
ZyWALL (ZLD) CLI Reference Guide
121
Chapter 14 ALG
14.2 ALG Commands
The following table lists the alg commands. You must use the configure terminal
command to enter the configuration mode before you can use these commands.
Table 62 alg Commands
122
COMMAND
DESCRIPTION
[no] alg sip [inactivity-timeout
| signal-port <1025..65535> |
signal-extra-port <1025..65535> |
media-timeout <1..86400> |
signal-timeout <1..86400> |
transformation]
Turns on or configures the ALG.
Use inactivity-timeout to have the ZyWALL
apply SIP media and signaling inactivity time out limits.
Use signal-port with a listening port number (1025
to 65535) if you are using SIP on a port other than
UDP 5060.
Use signal-extra-port with a listening port
number (1025 to 65535) if you are also using SIP on
an additional UDP port number, enter it here.
Use media-timeout and a number of seconds
(1~86400) for how long to allow a voice session to
remain idle (without voice traffic) before dropping it.
Use signal-timeout and a number of seconds
(1~86400) for how long to allow a SIP signaling
session to remain idle (without SIP packets) before
dropping it.
Use transformation to have the ZyWALL modify IP
addresses and port numbers embedded in the SIP
data payload. You do not need to use this if you have a
SIP device or server that will modify IP addresses and
port numbers embedded in the SIP data payload.
The no command turns off the SIP ALG or removes
the settings that you specify.
[no] alg <h323 | ftp> [signalport <1025..65535> | signalextra-port <1025..65535> |
transformation]
Turns on or configures the H.323 or FTP ALG.
Use signal-port with a listening port number (1025
to 65535) if you are using H.323 on a TCP port other
than 1720 or FTP on a TCP port other than 21.
Use signal-extra-port with a listening port
number (1025 to 65535) if you are also using H.323 or
FTP on an additional TCP port number, enter it here.
Use transformation to have the ZyWALL modify IP
addresses and port numbers embedded in the H.323
or FTP data payload. You do not need to use this if you
have an H.323 or FTP device or server that will modify
IP addresses and port numbers embedded in the
H.323 or FTP data payload.
The no command turns off the H.323 or FTP ALG or
removes the settings that you specify.
[no] alg sip defaultport
<1..65535>
Adds (or removes) a custom UDP port number for SIP
traffic.
show alg <sip | h323 | ftp>
Displays the specified ALG’s configuration.
ZyWALL (ZLD) CLI Reference Guide
Chapter 14 ALG
14.3 ALG Commands Example
The following example turns on pass through for SIP and turns it off for H.323.
Router# configure terminal
Router(config)# alg sip
Router(config)# no alg h323
ZyWALL (ZLD) CLI Reference Guide
123
Chapter 14 ALG
124
ZyWALL (ZLD) CLI Reference Guide
P ART III
Firewall
Firewall (127)
125
126
CHAPTER
15
Firewall
This chapter introduces the ZyWALL’s firewall and shows you how to configure your
ZyWALL’s firewall.
15.1 Firewall Overview
The ZyWALL’s firewall is a stateful inspection firewall. The ZyWALL restricts access by
screening data packets against defined access rules. It can also inspect sessions. For example,
traffic from one zone is not allowed unless it is initiated by a computer in another zone first.
A zone is a group of interfaces or VPN tunnels. Group the ZyWALL’s interfaces into different
zones based on your needs. You can configure firewall rules for data passing between zones or
even between interfaces and/or VPN tunnels in a zone.
The following figure shows the ZyWALL’s default firewall rules in action as well as
demonstrates how stateful inspection works. User 1 can initiate a Telnet session from within
the LAN zone and responses to this request are allowed. However, other Telnet traffic initiated
from the WAN or DMZ zone and destined for the LAN zone is blocked. Communications
between the WAN and the DMZ zones are allowed. The firewall allows VPN traffic between
any of the networks.
Figure 18 Default Firewall Action
ZyWALL (ZLD) CLI Reference Guide
127
Chapter 15 Firewall
Your customized rules take precedence and override the ZyWALL’s default settings. The
ZyWALL checks the schedule, user name (user’s login name on the ZyWALL), source IP
address, destination IP address and IP protocol type of network traffic against the firewall
rules (in the order you list them). When the traffic matches a rule, the ZyWALL takes the
action specified in the rule.
For example, if you want to allow a specific user from any computer to access one zone by
logging in to the ZyWALL, you can set up a rule based on the user name only. If you also
apply a schedule to the firewall rule, the user can only access the network at the scheduled
time. A user-aware firewall rule is activated whenever the user logs in to the ZyWALL and
will be disabled after the user logs out of the ZyWALL.
15.2 Firewall Commands
The following table identifies the values required for many of these commands. Other input
values are discussed with the corresponding commands.
Table 63 Input Values for General Firewall Commands
LABEL
DESCRIPTION
address_object
The name of the IP address (group) object. You may use 1-31 alphanumeric
characters, underscores(_), or dashes (-), but the first character cannot be a
number. This value is case-sensitive.
user_name
The name of a user (group). You may use 1-31 alphanumeric characters,
underscores(_), or dashes (-), but the first character cannot be a number.
This value is case-sensitive.
zone_object
The name of the zone. For the ZyWALL USG 300 and above, use up to 31
characters (a-zA-Z0-9_-). The name cannot start with a number. This value is
case-sensitive.
The ZyWALL USG 100 and 200 models use pre-defined zone names like
DMZ, LAN1, SSL VPN, WLAN, IPSec VPN, OPT, and WAN.
rule_number
The priority number of a firewall rule. 1 - X where X is the highest number of
rules the ZyWALL model supports. See the ZyWALL’s User’s Guide for
details.
schedule_object
The name of the schedule. You may use 1-31 alphanumeric characters,
underscores(_), or dashes (-), but the first character cannot be a number.
This value is case-sensitive.
service_name
The name of the service (group). You may use 1-31 alphanumeric characters,
underscores(_), or dashes (-), but the first character cannot be a number.
This value is case-sensitive.
The following table describes the commands available for the firewall. You must use the
configure terminal command to enter the configuration mode before you can use these
commands.
Table 64 Command Summary: Firewall
COMMAND
DESCRIPTION
[no] connlimit max-per-host <1..8192>
Sets he highest number of sessions that the
ZyWALL will permit a host to have at one time.
The no command removes the settings.
firewall rule_number
Enters the firewall sub-command mode to set
a firewall rule. See Table 65 on page 130 for
the sub-commands.
128
ZyWALL (ZLD) CLI Reference Guide
Chapter 15 Firewall
Table 64 Command Summary: Firewall (continued)
COMMAND
DESCRIPTION
firewall zone_object {zone_object|ZyWALL}
rule_number
Enters the firewall sub-command mode to set
a direction specific through-ZyWALL rule or
to-ZyWALL rule. See Table 65 on page 130 for
the sub-commands.
firewall zone_object {zone_object|ZyWALL} append
Enters the firewall sub-command mode to add
a direction specific through-ZyWALL rule or
to-ZyWALL rule to the end of the global rule
list. See Table 65 on page 130 for the subcommands.
firewall zone_object {zone_object|ZyWALL} delete
<1..5000>
Removes a direction specific throughZyWALL rule or to-ZyWALL rule.
<1..5000>: the index number in a direction
specific firewall rule list.
firewall zone_object {zone_object|ZyWALL} flush
Removes all direction specific throughZyWALL rule or to-ZyWALL rules.
firewall zone_object {zone_object|ZyWALL} insert
rule_number
Enters the firewall sub-command mode to add
a direction specific through-ZyWALL rule or
to-ZyWALL rule before the specified rule
number. See Table 65 on page 130 for the
sub-commands.
firewall zone_object {zone_object|ZyWALL} move
rule_number to rule_number
Moves a direction specific through-ZyWALL
rule or to-ZyWALL rule to the number that you
specified.
[no] firewall activate
Enables the firewall on the ZyWALL. The no
command disables the firewall.
firewall append
Enters the firewall sub-command mode to add
a global firewall rule to the end of the global
rule list. See Table 65 on page 130 for the
sub-commands.
firewall default-rule action {allow | deny |
reject} { no log | log [alert] }
Sets how the firewall handles packets that do
not match any other firewall rule.
firewall delete rule_number
Removes a firewall rule.
firewall flush
Removes all firewall rules.
firewall insert rule_number
Enters the firewall sub-command mode to add
a firewall rule before the specified rule
number. See Table 65 on page 130 for the
sub-commands.
firewall move rule_number to rule_number
Moves a firewall rule to the number that you
specified.
show connlimit max-per-host
Displays the highest number of sessions that
the ZyWALL will permit a host to have at one
time.
show firewall
Displays all firewall settings.
show firewall rule_number
Displays a firewall rule’s settings.
show firewall zone_object {zone_object|ZyWALL}
Displays all firewall rules settings for the
specified packet direction.
show firewall zone_object {zone_object|ZyWALL}
rule_number
Displays a specified firewall rule’s settings for
the specified packet direction.
show firewall status
Displays whether the firewall is active or not.
ZyWALL (ZLD) CLI Reference Guide
129
Chapter 15 Firewall
15.2.1 Firewall Sub-Commands
The following table describes the sub-commands for several firewall commands.
Table 65 firewall Sub-commands
COMMAND
DESCRIPTION
action {allow|deny|reject}
Sets the action the ZyWALL takes when packets
match this rule.
[no] activate
Enables a firewall rule. The no command disables
the firewall rule.
[no] ctmatch {dnat | snat}
Use dnat to block packets sent from a computer
on the ZyWALL’s WAN network from being
forwarded to an internal network according to a
virtual server rule.
Use snat to block packets sent from a computer
on the ZyWALL’s internal network from being
forwarded to the WAN network according to a 1:1
NAT or Many 1:1 NAT rule.
The no command forwards the matched packets.
[no] description description
Sets a descriptive name (up to 60 printable ASCII
characters) for a firewall rule. The no command
removes the descriptive name from the rule.
[no] destinationip address_object
Sets the destination IP address. The no command
resets the destination IP address(es) to the default
(any). any means all IP addresses.
[no] from zone_object
Sets the zone on which the packets are received.
The no command removes the zone on which the
packets are received and resets it to the default
(any). any means all interfaces or VPN tunnels.
[no] log [alert]
Sets the ZyWALL to create a log (and optionally an
alert) when packets match this rule. The no
command sets the ZyWALL not to create a log or
alert when packets match this rule.
[no] schedule schedule_object
Sets the schedule that the rule uses. The no
command removes the schedule settings from the
rule.
[no] service service_name
Sets the service to which the rule applies. The no
command resets the service settings to the default
(any). any means all services.
[no] sourceip address_object
Sets the source IP address(es). The no command
resets the source IP address(es) to the default
(any). any means all IP addresses.
[no] sourceport {tcp|udp} {eq
<1..65535>|range <1..65535> <1..65535>}
Sets the source port for a firewall rule. The no
command removes the source port from the rule.
[no] to {zone_object|ZyWALL}
Sets the zone to which the packets are sent. The
no command removes the zone to which the
packets are sent and resets it to the default (any).
any means all interfaces or VPN tunnels.
[no] user user_name
130
Sets a user-aware firewall rule. The rule is
activated only when the specified user logs into the
system. The no command resets the user name to
the default (any). any means all users.
ZyWALL (ZLD) CLI Reference Guide
Chapter 15 Firewall
15.2.2 Firewall Command Examples
The following example shows you how to add a firewall rule to allow a MyService connection
from the WAN zone to the IP addresses Dest_1 in the LAN zone.
•
•
•
•
•
•
•
•
Enter configuration command mode.
Create an IP address object.
Create a service object.
Enter the firewall sub-command mode to add a firewall rule.
Set the direction of travel of packets to which the rule applies.
Set the destination IP address(es).
Set the service to which this rule applies.
Set the action the ZyWALL is to take on packets which match this rule.
Router# configure terminal
Router(config)# service-object MyService tcp eq 1234
Router(config)# address-object Dest_1 10.0.0.10-10.0.0.15
Router(config)# firewall insert 3
Router(firewall)# from WAN
Router(firewall)# to LAN
Router(firewall)# destinationip Dest_1
Router(firewall)# service MyService
Router(firewall)# action allow
ZyWALL (ZLD) CLI Reference Guide
131
Chapter 15 Firewall
The following command displays the firewall rule(s) (including the default firewall rule) that
applies to the packet direction from WAN to LAN. The firewall rule numbers in the menu are
the firewall rules’ priority numbers in the global rule list.
Router# configure terminal
Router(config)# show firewall WAN LAN
firewall rule: 3
description:
user: any, schedule: none
from: WAN, to: LAN
source IP: any, source port: any
destination IP: Dest_1, service: MyService
log: no, action: allow, status: yes
firewall rule: 4
description:
user: any, schedule: none
from: WAN, to: LAN
source IP: any, source port: any
destination IP: any, service: any
log: log, action: deny, status: yes
Router(config)# show firewall WAN LAN 2
firewall rule: 4
description:
user: any, schedule: none
from: WAN, to: LAN
source IP: any, source port: any
destination IP: any, service: any
log: no, action: deny, status: yes
Router(config)#
15.3 Session Limit Commands
The following table identifies the values required for many of these commands. Other input
values are discussed with the corresponding commands.
Table 66 Input Values for General Session Limit Commands
132
LABEL
DESCRIPTION
rule_number
The priority number of a session limit rule, 1 - 1000.
address_object
The name of the IP address (group) object. You may use 1-31 alphanumeric
characters, underscores(_), or dashes (-), but the first character cannot be a
number. This value is case-sensitive.
user_name
The name of a user (group). You may use 1-31 alphanumeric characters,
underscores(_), or dashes (-), but the first character cannot be a number.
This value is case-sensitive.
ZyWALL (ZLD) CLI Reference Guide
Chapter 15 Firewall
The following table describes the session-limit commands. You must use the configure
terminal command to enter the configuration mode before you can use these commands.
Table 67 Command Summary: Session Limit
COMMAND
DESCRIPTION
[no] session-limit activate
Turns the session-limit feature on or off.
session-limit limit <0..8192>
Sets the default number of concurrent NAT/
firewall sessions per host.
session-limit rule_number
Enters the session-limit sub-command mode
to set a session-limit rule.
[no] activate
Enables the session-limit rule. The no
command disables the session limit rule.
[no] address address_object
Sets the source IP address. The no command
sets this to any, which means all IP
addresses.
[no] description description
Sets a descriptive name (up to 64 printable
ASCII characters) for a session-limit rule. The
no command removes the descriptive name
from the rule.
exit
Quits the firewall sub-command mode.
[no] limit <0..8192>
Sets the limit for the number of concurrent
NAT/firewall sessions this rule’s users or
addresses can have. 0 means any.
[no] user user_name
Sets a session-limit rule for the specified user.
The no command resets the user name to the
default (any). any means all users.
session-limit append
Enters the session-limit sub-command mode
to add a session-limit rule to the end of the
session-limit rule list.
session-limit delete rule_number
Removes a session-limit rule.
session-limit flush
Removes all session-limit rules.
session-limit insert rule_number
Enters the session-limit sub-command mode
to add a session-limit rule before the specified
rule number.
session-limit move rule_number to rule_number
Moves a session-limit to the number that you
specified.
show session-limit
Shows the session-limit configuration.
show session-limit begin rule_number end
rule_number
Shows the settings for a range of session-limit
rules.
show session-limit rule_number
Shows the session-limit rule’s settings.
show session-limit status
Shows the general session-limit settings.
ZyWALL (ZLD) CLI Reference Guide
133
Chapter 15 Firewall
134
ZyWALL (ZLD) CLI Reference Guide
P ART IV
VPN
IPSec VPN (137)
SSL VPN (147)
L2TP VPN (153)
135
136
CHAPTER
16
IPSec VPN
This chapter explains how to set up and maintain IPSec VPNs in the ZyWALL.
16.1 IPSec VPN Overview
A virtual private network (VPN) provides secure communications between sites without the
expense of leased site-to-site lines. A secure VPN is a combination of tunneling, encryption,
authentication, access control and auditing. It is used to transport traffic over the Internet or
any insecure network that uses TCP/IP for communication.
Internet Protocol Security (IPSec) is a standards-based VPN that offers flexible solutions for
secure data communications across a public network like the Internet. IPSec is built around a
number of standardized cryptographic techniques to provide confidentiality, data integrity and
authentication at the IP layer.
The following figure is one example of a VPN tunnel.
Figure 19 VPN: Example
The VPN tunnel connects the ZyWALL (X) and the remote IPSec router (Y). These routers
then connect the local network (A) and remote network (B).
A VPN tunnel is usually established in two phases. Each phase establishes a security
association (SA), a contract indicating what security parameters the ZyWALL and the remote
IPSec router will use. The first phase establishes an Internet Key Exchange (IKE) SA between
the ZyWALL and remote IPSec router. The second phase uses the IKE SA to securely
establish an IPSec SA through which the ZyWALL and remote IPSec router can send data
between computers on the local network and remote network. This is illustrated in the
following figure.
ZyWALL (ZLD) CLI Reference Guide
137
Chapter 16 IPSec VPN
Figure 20 VPN: IKE SA and IPSec SA
In this example, a computer in network A is exchanging data with a computer in network B.
Inside networks A and B, the data is transmitted the same way data is normally transmitted in
the networks. Between routers X and Y, the data is protected by tunneling, encryption,
authentication, and other security features of the IPSec SA. The IPSec SA is secure because
routers X and Y established the IKE SA first.
16.2 IPSec VPN Commands Summary
The following table describes the values required for many IPSec VPN commands. Other
values are discussed with the corresponding commands.
Table 68 Input Values for IPSec VPN Commands
138
LABEL
DESCRIPTION
profile_name
The name of a VPN concentrator. You may use 1-31 alphanumeric
characters, underscores(_), or dashes (-), but the first character cannot be
a number. This value is case-sensitive.
policy_name
The name of an IKE SA. You may use 1-31 alphanumeric characters,
underscores(_), or dashes (-), but the first character cannot be a number.
This value is case-sensitive.
map_name
The name of an IPSec SA. You may use 1-31 alphanumeric characters,
underscores(_), or dashes (-), but the first character cannot be a number.
This value is case-sensitive.
domain_name
Fully-qualified domain name. You may use up to 254 alphanumeric
characters, dashes (-), or periods (.), but the first character cannot be a
period.
e_mail
An e-mail address. You can use up to 63 alphanumeric characters,
underscores (_), dashes (-), or @ characters.
ZyWALL (ZLD) CLI Reference Guide
Chapter 16 IPSec VPN
Table 68 Input Values for IPSec VPN Commands (continued)
LABEL
DESCRIPTION
distinguished_name
A domain name. You can use up to 511 alphanumeric, characters, spaces,
or .@=,_- characters.
sort_order
Sort the list of currently connected SAs by one of the following
classifications.
algorithm
encapsulation
inbound
name
outbound
policy
timeout
uptime
The following sections list the IPSec VPN commands.
16.2.1 IKE SA Commands
This table lists the commands for IKE SAs (VPN gateways).
Table 69 isakmp Commands: IKE SAs
COMMAND
DESCRIPTION
show isakmp keepalive
Displays the Dead Peer Detection period.
show isakmp policy [policy_name]
Shows the specified IKE SA or all IKE SAs.
isakmp keepalive <2..60>
Sets the Dead Peer Detection period.
[no] isakmp policy policy_name
Creates the specified IKE SA if necessary and
enters sub-command mode. The no command
deletes the specified IKE SA.
activate
deactivate
Activates or deactivates the specified IKE SA.
authentication {pre-share | rsa-sig}
Specifies whether to use a pre-shared key or a
certificate for authentication.
certificate certificate-name
Sets the certificate that can be used for
authentication.
[no] dpd
Enables Dead Peer Detection (DPD). The no
command disables DPD.
[no] fall-back
Set this to have the ZyWALL reconnect to the
primary address when it becomes available again
and stop using the secondary connection, if the
connection to the primary address goes down and
the ZyWALL changes to using the secondary
connection.
Users will lose their VPN connection briefly while
the ZyWALL changes back to the primary
connection. To use this, the peer device at the
secondary address cannot be set to use a nailedup VPN connection.
fall-back-check-interval <60..86400>
Sets how often (in seconds) the ZyWALL checks if
the primary address is available.
mode {main | aggressive}
Sets the negotiating mode.
ZyWALL (ZLD) CLI Reference Guide
139
Chapter 16 IPSec VPN
Table 69 isakmp Commands: IKE SAs (continued)
COMMAND
transform-set isakmp-algo [isakmp_algo
[isakmp_algo]]
Sets the encryption and authentication algorithms
for each proposal.
ISAKMP_ALGO: {des-md5 | des-sha | 3des-md5 |
3des-sha | aes128-md5 | aes128-sha | aes192md5 | aes192-sha | aes256-md5 | aes256-sha}
lifetime <180..3000000>
Sets the IKE SA life time to the specified value.
group1
group2
group5
Sets the DHx group to the specified group.
[no] natt
Enables NAT traversal. The no command disables
NAT traversal.
local-ip {ip {ip | domain_name} |
interface interface_name}
Sets the local gateway address to the specified IP
address, domain name, or interface.
peer-ip {ip | domain_name} [ip |
domain_name]
Sets the remote gateway address(es) to the
specified IP address(es) or domain name(s).
keystring pre_shared_key
Sets the pre-shared key that can be used for
authentication. The PRE_SHARED_KEY can be:
• 8 - 32 alphanumeric characters or
,;|`~!@#$%^&*()_+\{}':./<>=-".
• 16 - 64 hexadecimal (0-9, A-F) characters,
preceded by “0x”.
The pre-shared key is case-sensitive.
local-id type {ip ip | fqdn domain_name |
mail e_mail | dn distinguished_name}
Sets the local ID type and content to the specified
IP address, domain name, or e-mail address.
peer-id type {any | ip ip | fqdn
domain_name | mail e_mail | dn
distinguished_name}
Sets the peer ID type and content to any value, the
specified IP address, domain name, or e-mail
address.
[no] xauth type {server xauth_method |
client name username password password}
Enables extended authentication and specifies
whether the ZyWALL is the server or client. If the
ZyWALL is the server, it also specifies the
extended authentication method (aaa
authentication profile_name); if the
ZyWALL is the client, it also specifies the
username and password to provide to the remote
IPSec router. The no command disables extended
authentication.
username: You can use alphanumeric characters,
underscores (_), and dashes (-), and it can be up to
31 characters long.
password: You can use most printable ASCII
characters. You cannot use square brackets [ ],
double quotation marks (“), question marks (?),
tabs or spaces. It can be up to 31 characters long.
isakmp policy rename policy_name policy_name
140
DESCRIPTION
Renames the specified IKE SA (first
policy_name) to the specified name (second
policy_name).
ZyWALL (ZLD) CLI Reference Guide
Chapter 16 IPSec VPN
16.2.2 IPSec SA Commands (except Manual Keys)
This table lists the commands for IPSec SAs, excluding manual keys (VPN connections using
VPN gateways).
Table 70 crypto Commands: IPSec SAs
COMMAND
DESCRIPTION
[no] crypto ignore-df-bit
Fragment packets larger than the MTU (Maximum
Transmission Unit) that have the “don’t” fragment”
bit in the header turned on. The no command has
the ZyWALL drop packets larger than the MTU that
have the “don’t” fragment” bit in the header turned
on.
show crypto map [map_name]
Shows the specified IPSec SA or all IPSec SAs.
crypto map dial map_name
Dials the specified IPSec SA manually. This
command does not work for IPSec SAs using
manual keys or for IPSec SAs where the remote
gateway address is 0.0.0.0.
[no] crypto map map_name
Creates the specified IPSec SA if necessary and
enters sub-command mode. The no command
deletes the specified IPSec SA.
crypto map rename map_name map_name
Renames the specified IPSec SA (first map_name)
to the specified name (second map_name).
crypto map map_name
activate
deactivate
Activates or deactivates the specified IPSec SA.
ipsec-isakmp policy_name
Specifies the IKE SA for this IPSec SA and
disables manual key.
encapsulation {tunnel | transport}
Sets the encapsulation mode.
transform-set esp_crypto_algo
[esp_crypto_algo [esp_crypto_algo]]
Sets the active protocol to ESP and sets the
encryption and authentication algorithms for each
proposal.
esp_crypto_algo: {esp-3des-md5 | esp-3dessha | esp-aes128-md5 | esp-aes128-sha | espaes192-md5 | esp-aes192-sha | esp-aes256-md5 |
esp-aes256-sha | esp-des-md5 | esp-des-sha |
esp-null-md5 | esp-null-sha}
transform-set {ah-md5 | ah-sha} [{ah-md5 |
ah-sha} [{ah-md5 | ah-sha}]]
Sets the active protocol to AH and sets the
encryption and authentication algorithms for each
proposal.
ZyWALL (ZLD) CLI Reference Guide
141
Chapter 16 IPSec VPN
Table 70 crypto Commands: IPSec SAs (continued)
COMMAND
DESCRIPTION
scenario {site-to-site-static|site-tosite-dynamic|remote-access-server|remoteaccess-client}
Select the scenario that best describes your
intended VPN connection.
Site-to-site: The remote IPSec router has a
static IP address or a domain name. This ZyWALL
can initiate the VPN tunnel.
site-to-site-dynamic: The remote IPSec
router has a dynamic IP address. Only the remote
IPSec router can initiate the VPN tunnel.
remote-access-server: Allow incoming
connections from IPSec VPN clients. The clients
have dynamic IP addresses and are also known as
dial-in users. Only the clients can initiate the VPN
tunnel.
remote-access-client: Choose this to
connect to an IPSec server. This ZyWALL is the
client (dial-in user) and can initiate the VPN tunnel.
set security-association lifetime seconds
<180..3000000>
Sets the IPSec SA life time.
set pfs {group1 | group2 | group5 | none}
Enables Perfect Forward Secrecy group.
local-policy address_name
Sets the address object for the local policy (local
network).
remote-policy address_name
Sets the address object for the remote policy
(remote network).
[no] policy-enforcement
Drops traffic whose source and destination IP
addresses do not match the local and remote
policy. This makes the IPSec SA more secure. The
no command allows traffic whose source and
destination IP addresses do not match the local
and remote policy.
Note: You must allow traffic whose source
and destination IP addresses do
not match the local and remote
policy, if you want to use the IPSec
SA in a VPN concentrator.
142
[no] nail-up
Automatically re-negotiates the SA as needed. The
no command does not.
[no] replay-detection
Enables replay detection. The no command
disables it.
[no] netbios-broadcast
Enables NetBIOS broadcasts through the IPSec
SA. The no command disables NetBIOS
broadcasts through the IPSec SA.
[no] out-snat activate
Enables out-bound traffic SNAT over IPSec. The
no command disables out-bound traffic SNAT over
IPSec.
out-snat source address_name destination
address_name snat address_name
Configures out-bound traffic SNAT in the IPSec SA.
[no] in-snat activate
Enables in-bound traffic SNAT in the IPSec SA.
The no command disables in-bound traffic SNAT in
the IPSec SA.
ZyWALL (ZLD) CLI Reference Guide
Chapter 16 IPSec VPN
Table 70 crypto Commands: IPSec SAs (continued)
COMMAND
DESCRIPTION
in-snat source address_name destination
address_name snat address_name
Configures in-bound traffic SNAT in the IPSec SA.
[no] in-dnat activate
Enables in-bound traffic DNAT in the IPSec SA.
The no command disables in-bound traffic DNAT
in the IPSec SA.
in-dnat delete <1..10>
Deletes the specified rule for in-bound traffic DNAT
in the specified IPSec SA.
in-dnat move <1..10> to <1..10>
Moves the specified rule (first rule number) to the
specified location (second rule number) for inbound traffic DNAT.
in-dnat append protocol {all | tcp | udp}
original-ip address_name <0..65535>
<0..65535> mapped-ip address_name
<0..65535> <0..65535>
Maps the specified IP address and port range
(original-ip) to the specified IP address and port
range (mapped-ip) and appends this rule to the end
of the rule list for in-bound traffic DNAT.
in-dnat insert <1..10> protocol {all | tcp
| udp} original-ip address_name <0..65535>
<0..65535> mapped-ip address_name
<0..65535> <0..65535>
Maps the specified IP address and port range
(original-ip) to the specified IP address and port
range (mapped-ip) and inserts this rule before the
specified rule.
in-dnat <1..10> protocol {all | tcp | udp}
original-ip address_name <0..65535>
<0..65535> mapped-ip address_name
<0..65535> <0..65535>
Creates or revises the specified rule and maps the
specified IP address and port range (original-ip) to
the specified IP address and port range (mappedip).
ZyWALL (ZLD) CLI Reference Guide
143
Chapter 16 IPSec VPN
16.2.3 IPSec SA Commands (for Manual Keys)
This table lists the additional commands for IPSec SAs using manual keys (VPN connections
using manual keys).
Table 71 crypto map Commands: IPSec SAs (Manual Keys)
COMMAND
DESCRIPTION
crypto map map_name
set session-key {ah <256..4095> auth_key |
esp <256..4095> [cipher enc_key]
authenticator auth_key}
Sets the active protocol, SPI (<256..4095>),
authentication key and encryption key (if any).
auth_key: You can use any alphanumeric
characters or ,;|`~!@#$%^&*()_+\{}':./
<>=-". The length of the key depends on the
algorithm.
md5 - 16-20 characters
sha - 20 characters
enc_key: You can use any alphanumeric
characters or ,;|`~!@#$%^&*()_+\{}':./
<>=-". The length of the key depends on the
algorithm.
des - 8-32 characters
3des - 24-32 characters
aes128 - 16-32 characters
aes192 - 24-32 characters
aes256 - 32 characters
If you want to enter the key in hexadecimal, type
“0x” at the beginning of the key. For example,
"0x0123456789ABCDEF" is in hexadecimal
format; in “0123456789ABCDEF” is in ASCII
format. If you use hexadecimal, you must enter
twice as many characters.
The ZyWALL automatically ignores any characters
above the minimum number of characters required
by the algorithm. For example, if you enter
1234567890XYZ for a DES encryption key, the
ZyWALL only uses 12345678. The ZyWALL still
stores the longer key.
local-ip ip
Sets the local gateway address to the specified IP
address.
peer-ip ip
Sets the remote gateway address to the specified
IP address.
16.2.4 VPN Concentrator Commands
This table lists the commands for the VPN concentrator.
Table 72 vpn-concentrator Commands: VPN Concentrator
COMMAND
DESCRIPTION
show vpn-concentrator [profile_name]
Shows the specified VPN concentrator or all VPN
concentrators.
[no] vpn-concentrator profile_name
Creates the specified VPN concentrator if
necessary and enters sub-command mode. The
no command deletes the specified VPN
concentrator.
144
ZyWALL (ZLD) CLI Reference Guide
Chapter 16 IPSec VPN
Table 72 vpn-concentrator Commands: VPN Concentrator (continued)
COMMAND
DESCRIPTION
Adds the specified IPSec SA to the specified VPN
concentrator. The no command removes the
specified IPSec SA from the specified VPN
concentrator.
[no] crypto map_name
vpn-concentrator rename profile_name
profile_name
Renames the specified VPN concentrator (first
profile_name) to the specified name (second
profile_name).
16.2.5 SA Monitor Commands
This table lists the commands for the SA monitor.
Table 73 sa Commands: SA Monitor
COMMAND
DESCRIPTION
show sa monitor [{begin
<1..1000>} | {end
<1..1000>} | {crypto-map
regexp} | {policy regexp}
|{rsort sort_order} |
{sort sort_order}]
Displays the current IPSec SAs and the status of each one. You can specify a
range of SA entries to display. You can also control the sort order of the
display and search by VPN connection or (local or remote) policy.
regexp: A keyword or regular expression. Use up to 30 alphanumeric and
_+-.()!$*^:?|{}[]<>/ characters.
A question mark (?) lets a single character in the VPN connection or policy
name vary. For example, use “a?c” (without the quotation marks) to specify
abc, acc and so on.
Wildcards (*) let multiple VPN connection or policy names match the pattern.
For example, use “*abc” (without the quotation marks) to specify any VPN
connection or policy name that ends with “abc”. A VPN connection named
“testabc” would match. There could be any number (of any type) of
characters in front of the “abc” at the end and the VPN connection or policy
name would still match. A VPN connection or policy name named “testacc”
for example would not match.
A * in the middle of a VPN connection or policy name has the ZyWALL check
the beginning and end and ignore the middle. For example, with “abc*123”,
any VPN connection or policy name starting with “abc” and ending in “123”
matches, no matter how many characters are in between.
The whole VPN connection or policy name has to match if you do not use a
question mark or asterisk.
See Table 68 on page 138 for other parameter description.
show isakmp sa
Displays current IKE SA and the status of each one.
no sa spi spi
Deletes the SA specified by the SPI.
spi: 2-8 hexadecimal (0-9, A-F) characters
no sa tunnel-name map_name
Deletes the specified IPSec SA.
show vpn-counters
Displays VPN traffic statistics.
ZyWALL (ZLD) CLI Reference Guide
145
Chapter 16 IPSec VPN
146
ZyWALL (ZLD) CLI Reference Guide
CHAPTER
17
SSL VPN
This chapter shows you how to set up secure SSL VPN access for remote user login.
17.1 SSL Access Policy
An SSL access policy allows the ZyWALL to perform the following tasks:
• limit user access to specific applications or files on the network.
• allow user access to specific networks.
• assign private IP addresses and provide DNS/WINS server information to remote users to
access internal networks.
17.1.1 SSL Application Objects
SSL application objects specify an application type and server that users are allowed to access
through an SSL tunnel. See Chapter 33 on page 277 for how to configure SSL application
objects.
17.1.2 SSL Access Policy Limitations
You cannot delete an object that is used by an SSL access policy. To delete the object, you
must first unassociate the object from the SSL access policy.
17.2 SSL VPN Commands
The following table describes the values required for some SSL VPN commands. Other values
are discussed with the corresponding commands.
Table 74 Input Values for SSL VPN Commands
LABEL
DESCRIPTION
profile_name
The descriptive name of an SSL VPN access policy. You may use up to
31 characters (“a-z”, A-Z”, “0-9”) with no spaces allowed.
address_object
The name of an IP address (group) object. You may use 1-31
alphanumeric characters, underscores(_), or dashes (-), but the first
character cannot be a number. This value is case-sensitive.
application_object
The name of an SSL application object. You may use up to 31 characters
(“0-9”, “a-z”, “A-Z”, “-” and “_”). No spaces are allowed.
ZyWALL (ZLD) CLI Reference Guide
147
Chapter 17 SSL VPN
Table 74 Input Values for SSL VPN Commands (continued)
LABEL
DESCRIPTION
user_name
The name of a user (group). You may use 1-31 alphanumeric characters,
underscores(_), or dashes (-), but the first character cannot be a number.
This value is case-sensitive.
eps_profile_name
The name of an endpoint security object.
The following sections list the SSL VPN commands.
17.2.1 SSL VPN Commands
This table lists the commands for SSL VPN. You must use the configure terminal
command to enter the configuration mode before you can use these commands.
Table 75 SSL VPN Commands
COMMAND
DESCRIPTION
show sslvpn policy [profile_name]
Displays the settings of the specified SSL VPN access policy.
show ssl-vpn network-extension
local-ip
Displays the IP address that the ZyWALL uses in setting up the SSL
VPN.
show sslvpn monitor
Displays a list of the users who are currently logged into the VPN
SSL client portal.
sslvpn network-extension local-ip
ip
Sets the IP address that the ZyWALL uses in setting up the SSL
VPN.
sslvpn policy {profile_name |
profile_name append |
profile_name insert <1..16>}
Enters the SSL VPN sub-command mode to add or edit an SSL VPN
access policy.
148
[no] activate
Turns the SSL VPN access policy on or off.
[no] application
application_object
Adds the SSL application object to the SSL VPN access policy.
[no] cache-clean activate
Cleans the cookie, history, and temporary Internet files in the user’s
browser’s cache when the user logs out. The ZyWALL returns them
to the values present before the user logged in. The no command
disables this setting.
[no] description description
Adds information about the SSL VPN access policy. Use up to 60
characters (“0-9”, “a-z”, “A-Z”, “-” and “_”).
[no] eps <1..8>
eps_profile_name
Sets endpoint security objects to be used for the SSL VPN access
policy. The ZyWALL checks authenticated users’ computers against
the policy’s selected endpoint security objects in the order from 1 to 8
you specified. When a user’s computer meets an endpoint security
object’s requirements the ZyWALL grants access and stops
checking.
To make the endpoint security check as efficient as possible, arrange
the endpoint security objects in order with the one that the most
users should match first and the one that the least users should
match last.
[no] eps activate
Sets to have the ZyWALL check that users’ computers meet the
Operating System (OS) and security requirements of one of the SSL
access policy’s selected endpoint security objects before granting
access. The no command disables this setting.
eps insert <1..8>
eps_profile_name
Inserts the specified endpoint security object to the specified position
for the endpoint security objects checking order.
ZyWALL (ZLD) CLI Reference Guide
Chapter 17 SSL VPN
Table 75 SSL VPN Commands
COMMAND
DESCRIPTION
eps move <1..8> to <1..8>
Moves the first specified endpoint security object to the second
specified endpoint security object’s position.
[no] eps periodical-check
activate
Sets whether to have the ZyWALL repeat the endpoint security
check at a regular interval configured using the next command.The
no command disables this setting.
[no] eps periodical-check
<1..1440>
Sets the number of minutes to have the ZyWALL repeat the endpoint
security check at a regular interval. The no command disables this
setting.
[no] network-extension
{activate | ip-pool
address_object | 1st-dns
{address_object | ip } | 2nddns {address_object | ip } |
1st-wins {address_object | ip
} | 2nd-wins {address_object
| ip } | network
address_object}
Use this to configure for a VPN tunnel between the authenticated
users and the internal network. This allows the users to access the
resources on the network as if they were on the same local network.
ip-pool: specify the name of the pool of IP addresses to assign to
the user computers for the VPN connection.
Specify the names of the DNS or WINS servers to assign to the
remote users. This allows them to access devices on the local
network using domain names instead of IP addresses.
network: specify a network users can access.
[no] user user_name
Specifies the user or user group that can use the SSL VPN access
policy.
sslvpn policy move <1..16> to
<1..16>
Moves the specified SSL VPN access policy to the number that you
specified.
sslvpn no connection username
user_name
Terminates the user’s SSL VPN connection and deletes
corresponding session information from the ZyWALL.
no sslvpn policy profile_name
Deletes the specified SSL VPN access policy.
sslvpn policy rename profile_name
profile_name
Renames the specified SSL VPN access policy.
show workspace application
Displays the SSLVPN resources available to each user when logged
into SSLVPN.
show workspace cifs
Displays the shared folders available to each user when logged into
SSLVPN.
17.2.2 Setting an SSL VPN Rule Tutorial
Here is an example SSL VPN configuration. The SSL VPN rule defines:
• Only users using the “tester”account can use the SSL VPN.
• The ZyWALL will assign an IP address from 192.168.100.1 to 192.168.100.10 (defined in
object “IP-POOL”) to the computers which match the rule’s criteria.
• The ZyWALL will assign two DNS server settings (172.16.1.1 and 172.16.1.2 defined in
objects DNS1 and DNS2) to the computers which match the rule’s criteria.
• The SSL VPN users are allowed to access the ZyWALL’s local network, 172.16.10.0/24
(defined in object “Network1”).
• Users have to access the SSL VPN using a computer that complies with all the following
criteria (defined in object “EPS-1”):
• Windows XP is installed.
• TrendMicro PC-Cillin Internet Security 2007 is installed and activated.
ZyWALL (ZLD) CLI Reference Guide
149
Chapter 17 SSL VPN
1 First of all, configure 10.1.1.254/24 for the IP address of interface ge2 which is an
external interface for public SSL VPN to access. Configure 172.16.10.254/24 for the IP
address of interface ge3 which is an internal network.
Router(config)# interface ge2
Router(config-if-ge)# ip address 10.1.1.254 255.255.255.0
Router(config-if-ge)# exit
Router(config)# interface ge3
Router(config-if-ge)# ip address 172.16.10.254 255.255.255.0
Router(config-if-ge)# exit
2 Create four address objects for the SSL VPN DHCP pool, DNS servers and the local
network for SSL VPN authenticated users to access.
Router(config)#
Router(config)#
Router(config)#
Router(config)#
address-object
address-object
address-object
address-object
IP-POOL 192.168.100.1-192.168.100.10
DNS1 172.16.5.1
DNS2 172.16.5.2
NETWORK1 172.16.10.0/24
3 Create an endpoint security profile named EPS-1. SSL VPN users’ computers must
install Windows XP and TrendMicro PC-Cillin Internet Security 2007. Besides, the PCCillin anti-virus must be activated.
Router(config)# eps profile EPS-1
Router(eps EPS-1)# matching-criteria all
Router(eps EPS-1)# os-type windows
Router(eps EPS-1)# windows-version windows-xp
Router(eps EPS-1)# anti-virus activate
Router(eps EPS-1)# anti-virus TrendMicro_PC-Cillin_Internet_Security_2007
detect-auto-protection enable
Router(eps EPS-1)# exit
4 Create the SSL VPN user account named tester with password 1234,
Router(config)# username tester password 1234 user-type user
150
ZyWALL (ZLD) CLI Reference Guide
Chapter 17 SSL VPN
5 Create an SSL VPN rule named SSL_VPN_TEST. Enable it and apply objects you just
created.
Router(config)# sslvpn policy SSL_VPN_TEST
Router(policy SSL_VPN_TEST)# activate
Router(policy SSL_VPN_TEST)# user tester
Router(policy SSL_VPN_TEST)# network-extension
Router(policy SSL_VPN_TEST)# network-extension
Router(policy SSL_VPN_TEST)# network-extension
Router(policy SSL_VPN_TEST)# network-extension
Router(policy SSL_VPN_TEST)# network-extension
Router(policy SSL_VPN_TEST)# eps activate
Router(policy SSL_VPN_TEST)# eps 1 EPS-1
Router(policy SSL_VPN_TEST)# exit
activate
ip-pool IP-POOL
1st-dns DNS1
2nd-dns DNS2
network NETWORK1
6 Displays the SSL VPN rule settings.
Router(config)# show sslvpn policy SSL_VPN_TEST
index: 1
active: yes
name: SSL_VPN_TEST
description:
user: tester
ssl applicaiton: none
network extension: yes
ip pool: IP-POOL
dns server 1: DNS1
dns server 2: DNS2
wins server 1: none
wins server 2: none
network: NETWORK1
cache clean: no
eps periodical check activation: no
eps periodical check: 1
eps activation: yes
eps: EPS-1
reference count: 0
ZyWALL (ZLD) CLI Reference Guide
151
Chapter 17 SSL VPN
152
ZyWALL (ZLD) CLI Reference Guide
CHAPTER
18
L2TP VPN
This chapter explains how to set up and maintain L2TP VPNs in the ZyWALL.
18.1 L2TP VPN Overview
L2TP VPN lets remote users use the L2TP and IPSec client software included with their
computers’ operating systems to securely connect to the network behind the ZyWALL. The
remote users do not need their own IPSec gateways or VPN client software.
Figure 21 L2TP VPN Overview
IPSec VPN Tunnel
L2TP Tunnel
The Layer 2 Tunneling Protocol (L2TP) works at layer 2 (the data link layer) to tunnel
network traffic between two peers over another network (like the Internet). In L2TP VPN, an
IPSec VPN tunnel is established first (see Chapter 16 on page 137 for information on IPSec)
and then an L2TP tunnel is built inside it.
"
At the time of writing the L2TP remote user must have a public IP address in
order for L2TP VPN to work (the remote user cannot be behind a NAT router
or a firewall).
18.2 IPSec Configuration
You must configure an IPSec VPN connection for L2TP VPN to use (see Chapter 16 on page
137 for details). The IPSec VPN connection must:
• Be enabled.
• Use transport mode.
ZyWALL (ZLD) CLI Reference Guide
153
Chapter 18 L2TP VPN
• Not be a manual key VPN connection.
• Use Pre-Shared Key authentication.
• Use a VPN gateway with the Secure Gateway set to 0.0.0.0 if you need to allow L2TP
VPN clients to connect from more than one IP address.
18.2.1 Using the Default L2TP VPN Connection
Default_L2TP_VPN_Connection is pre-configured to be convenient to use for L2TP VPN.
If you use it, edit the following.
Configure the local and remote policies as follows.
• For the Local Policy, create an address object that uses host type and contains the My
Address IP address that you configured in the Default_L2TP_VPN_GW. Use this
address object in the local policy.
• For the Remote Policy, create an address object that uses host type and an IP address of
0.0.0.0. Use this address object in the remote policy.
You must also edit the Default_L2TP_VPN_GW gateway entry.
• Configure the My Address setting according to your requirements.
• Replace the default Pre-Shared Key.
18.3 Policy Route
You must configure a policy route to let remote users access resources on a network behind the
ZyWALL.
• Set the policy route’s Source Address to the address object that you want to allow the
remote users to access (LAN_SUBNET in the following figure).
• Set the Destination Address to the IP address pool that the ZyWALL assigns to the
remote users (L2TP_POOL in the following figure).
Figure 22 Policy Route for L2TP VPN
L2TP_POOL
LAN_SUBNET
154
ZyWALL (ZLD) CLI Reference Guide
Chapter 18 L2TP VPN
18.4 L2TP VPN Commands
The following table describes the values required for some L2TP VPN commands. Other
values are discussed with the corresponding commands.
Table 76 Input Values for L2TP VPN Commands
LABEL
DESCRIPTION
address_object
The name of an IP address (group) object. You may use 1-31 alphanumeric
characters, underscores(_), or dashes (-), but the first character cannot be a
number. This value is case-sensitive.
interface_name
The name of the interface.
Ethernet interface: For the ZyWALL USG 300 and above, use gex, x = 1 - N,
where N equals the highest numbered Ethernet interface for your ZyWALL
model.
The ZyWALLUSG 100 and 200 models use a name such as wan1, wan2,
opt, lan1, ext-wlan, or dmz.
VLAN interface: vlanx, x = 0 - 4094
bridge interface: brx, x = 0 - N, where N depends on the number of bridge
interfaces your ZyWALL model supports.
ppp_interface
PPPoE/PPTP interface: pppx, x = 0 - N, where N depends on the number of
PPPoE/PPTP interfaces your ZyWALL model supports.
map_name
The name of an IPSec SA. You may use 1-31 alphanumeric characters,
underscores(_), or dashes (-), but the first character cannot be a number. This
value is case-sensitive.
user_name
The name of a user (group). You may use 1-31 alphanumeric characters,
underscores(_), or dashes (-), but the first character cannot be a number. This
value is case-sensitive.
The following sections list the L2TP VPN commands.
18.4.1 L2TP VPN Commands
This table lists the commands for L2TP VPN. You must use the configure terminal
command to enter the configuration mode before you can use these commands.
Table 77 L2TP VPN Commands
COMMAND
DESCRIPTION
l2tp-over-ipsec recover
default-ipsec-policy
If the default L2TP IPSec policy has been deleted, use this command to
recreate it (with the default settings).
[no] l2tp-over-ipsec
activate;
Turns L2TP VPN on. The no command turns it off.
l2tp-over-ipsec crypto
map_name
Specifies the IPSec VPN connection the ZyWALL uses for L2TP VPN. It
must meet the requirements listed in Section 18.2 on page 153.
Note: Modifying this VPN connection (or the VPN gateway
that it uses) disconnects any existing L2TP VPN
sessions.
l2tp-over-ipsec pool
address-object
ZyWALL (ZLD) CLI Reference Guide
Specifies the address object that defines the pool of IP addresses that the
ZyWALL uses to assign to the L2TP VPN clients.
155
Chapter 18 L2TP VPN
Table 77 L2TP VPN Commands
COMMAND
DESCRIPTION
l2tp-over-ipsec
authentication aaa
authentication profile_name
Specifies how the ZyWALL authenticates a remote user before allowing
access to the L2TP VPN tunnel.
The authentication method has the ZyWALL check a user’s user name and
password against the ZyWALL’s local database, a remote LDAP, RADIUS, a
Active Directory server, or more than one of these.
[no] l2tp-over-ipsec user
user_name
Specifies the user or user group that can use the L2TP VPN tunnel. If you
do not configure this, any user with a valid account and password on the
ZyWALL to log in. The no command removes the user name setting.
[no] l2tp-over-ipsec
keepalive-timer <1..180>
The ZyWALL sends a Hello message after waiting this long without
receiving any traffic from the remote user. The ZyWALL disconnects the
VPN tunnel if the remote user does not respond. The no command returns
the default setting.
[no] l2tp-over-ipsec firstdns-server {ip |
interface_name} {1stdns|2nd-dns|3rd-dns}|
{ppp_interface|aux}{1stdns|2nd-dns}}
Specifies the first DNS server IP address to assign to the remote users. You
can specify a static IP address, or a DNS server that an interface received
from its DHCP server. The no command removes the setting.
[no] l2tp-over-ipsec seconddns-server {ip |
interface_name} {1stdns|2nd-dns|3rd-dns}|
{ppp_interface|aux}{1stdns|2nd-dns}}
Specifies the second DNS server IP address to assign to the remote users.
You can specify a static IP address, or a DNS server that an interface
received from its DHCP server. The no command removes the setting.
[no] l2tp-over-ipsec firstwins-server ip
Specifies the first WINS server IP address to assign to the remote users.
The no command removes the setting.
[no] l2tp-over-ipsec secondwins-server ip
Specifies the second WINS server IP address to assign to the remote users.
The no command removes the setting.
no l2tp-over-ipsec session
tunnel-id <0..65535>
Deletes the specified L2TP VPN tunnel.
show l2tp-over-ipsec
Displays the L2TP VPN settings.
show l2tp-over-ipsec session
Displays current L2TP VPN sessions.
18.5 L2TP VPN Example
This example uses the following settings in creating a basic L2TP VPN tunnel. See the Web
Configurator User’s Guide for how to configure L2TP in remote user computers using
Windows XP and Windows 2000.
156
ZyWALL (ZLD) CLI Reference Guide
Chapter 18 L2TP VPN
Figure 23 L2TP VPN Example
172.23.37.205
L2TP_POOL:
192.168.10.10~192.168.10.20
LAN_SUBNET: 192.168.1.1/24
• The ZyWALL has a static IP address of 172.23.37.205 for the ge3 interface.
• The remote user has a dynamic public IP address and connects through the Internet.
• You configure an IP address pool object named L2TP_POOL to assign the remote users
IP addresses from 192.168.10.10 to 192.168.10.20 for use in the L2TP VPN tunnel.
• The VPN rule allows the remote user to access the LAN_SUBNET which covers the
192.168.1.1/24 subnet.
18.5.1 Configuring the Default L2TP VPN Gateway Example
The following commands configure the Default_L2TP_VPN_GW entry.
• Configure the My Address setting. This example uses interface ge3 with static IP address
172.23.37.205.
• Configure the Pre-Shared Key. This example uses “top-secret”.
Router(config)# isakmp policy Default_L2TP_VPN_GW
Router(config-isakmp Default_L2TP_VPN_GW)# local-ip interface ge3
Router(config-isakmp Default_L2TP_VPN_GW)# authentication pre-share
Router(config-isakmp Default_L2TP_VPN_GW)# keystring top-secret
Router(config-isakmp Default_L2TP_VPN_GW)# activate
Router(config-isakmp Default_L2TP_VPN_GW)# exit
Router(config)#
18.5.2 Configuring the Default L2TP VPN Connection Example
The following commands configure the Default_L2TP_VPN_Connection entry.
Enforce and configure the local and remote policies.
• For the Local Policy, create an address object that uses host type and contains the My
Address IP address that you configured in the Default_L2TP_VPN_GW. The address
object in this example uses IP address 172.23.37.205 and is named L2TP_IFACE.
ZyWALL (ZLD) CLI Reference Guide
157
Chapter 18 L2TP VPN
• For the Remote Policy, create an address object that uses host type and an IP address of
0.0.0.0. It is named L2TP_HOST in this example.
Router(config)# crypto map Default_L2TP_VPN_Connection
Router(config-crypto Default_L2TP_VPN_Connection)# policy-enforcement
Router(config-crypto Default_L2TP_VPN_Connection)# local-policy L2TP_IFACE
Router(config-crypto Default_L2TP_VPN_Connection)# remote-policy L2TP_HOST
Router(config-crypto Default_L2TP_VPN_Connection)# activate
Router(config-crypto Default_L2TP_VPN_Connection)# exit
Router(config)#
18.5.3 Configuring the L2TP VPN Settings Example
The following commands configure and display the L2TP VPN settings.
• Set it to use the Default_L2TP_VPN_Connection VPN connection.
• Configure an IP address pool for the range of 192.168.10.10 to 192.168.10.20. In this
example it is already created and called L2TP_POOL.
• This example uses the default authentication method (the ZyWALL’s local user data base).
• Select a user or group of users that can use the tunnel. Here a user account named L2TPtest has been created.
• The other settings are left to the defaults in this example.
• Enable the connection.
Router(config)# l2tp-over-ipsec crypto Default_L2TP_VPN_Connection
Router(config)# l2tp-over-ipsec pool L2TP_POOL
Router(config)# l2tp-over-ipsec authentication default
Router(config)# l2tp-over-ipsec user L2TP-test
Router(config)# l2tp-over-ipsec activate
Router(config)# show l2tp-over-ipsec
L2TP over IPSec:
activate
: yes
crypto
: Default_L2TP_VPN_Connection
address pool
: L2TP_POOL
authentication
: default
user
: L2TP-test
keepalive timer
: 60
first dns server : aux 1st-dns
second dns server : aux 1st-dns
first wins server :
second wins server:
18.5.4 Configuring the Policy Route for L2TP Example
The following commands configure and display the policy route for the L2TP VPN
connection entry.
• Set the policy route’s Source Address to the address object that you want to allow the
remote users to access (LAN_SUBNET in this example).
• Set the Destination Address to the IP address pool that the ZyWALL assigns to the
remote users (L2TP_POOL in this example).
• Set the next hop to be the Default_L2TP_VPN_Connection tunnel.
158
ZyWALL (ZLD) CLI Reference Guide
Chapter 18 L2TP VPN
• Enable the policy route.
Router(config)# policy 3
Router(policy-route)# source LAN_SUBNET
Router(policy-route)# destination L2TP_POOL
Router(policy-route)# service any
Router(policy-route)# next-hop tunnel
Default_L2TP_VPN_ConnectionRouter(policy-route)# no deactivate
Router(policy-route)# exit
Router(config)# show policy-route 3
index: 3
active: yes
description: WIZ_VPN
user: any
schedule: none
interface: ge1
tunnel: none
sslvpn: none
source: PC_SUBNET
destination: L2TP_POOL
service: any
nexthop type: Tunnel
nexthop: Default_L2TP_VPN_Connection
bandwidth: 0
bandwidth priority: 0
maximize bandwidth usage: no
SNAT: none
amount of port trigger: 0
ZyWALL (ZLD) CLI Reference Guide
159
Chapter 18 L2TP VPN
160
ZyWALL (ZLD) CLI Reference Guide
P ART V
Application Patrol
Application Patrol (163)
161
162
CHAPTER
19
Application Patrol
This chapter describes how to set up application patrol for the ZyWALL.
19.1 Application Patrol Overview
Application patrol provides a convenient way to manage the use of various applications on the
network. It manages general protocols (for example, http and ftp) and instant messenger (IM),
peer-to-peer (P2P), Voice over IP (VoIP), and streaming (RSTP) applications. You can even
control the use of a particular application’s individual features (like text messaging, voice,
video conferencing, and file transfers). Application patrol also has powerful bandwidth
management including traffic prioritization to enhance the performance of delay-sensitive
applications like voice and video.
"
The ZyWALL checks firewall rules before application patrol rules for traffic
going through the ZyWALL. To use a service, make sure both the firewall and
application patrol allow the service’s packets to go through the ZyWALL.
Application patrol examines every TCP and UDP connection passing through the ZyWALL
and identifies what application is using the connection. Then, you can specify, by application,
whether or not the ZyWALL continues to route the connection.
ZyWALL (ZLD) CLI Reference Guide
163
Chapter 19 Application Patrol
19.2 Application Patrol Commands Summary
The following table describes the values required for many application patrol commands.
Other values are discussed with the corresponding commands.
Table 78 Input Values for Application Patrol Commands
LABEL
DESCRIPTION
protocol_name
The name of a pre-defined application. These are listed by category.
general: ftp | smtp | pop3 | irc | http
im: msn | aol-icq | yahoo | qq
p2p: bittorrent | eDonkey | fasttrack | gnutella | napster |
h323 | sip | soulseek
stream: rtsp
rule_number
The number of an application patrol rule. 1 - X where X is the highest number of
rules the ZyWALL model supports. See the ZyWALL’s User’s Guide for details.
zone_name
The name of a zone. You may use 1-31 alphanumeric characters,
underscores(_), or dashes (-), but the first character cannot be a number. This
value is case-sensitive.
schedule_name
The name of a schedule. You may use 1-31 alphanumeric characters,
underscores(_), or dashes (-), but the first character cannot be a number. This
value is case-sensitive.
The following sections list the application patrol commands.
19.2.1 Pre-defined Application Commands
This table lists the commands for each pre-defined application.
Table 79 app Commands: Pre-Defined Applications
COMMAND
DESCRIPTION
[no] app protocol_name activate
Enables application patrol for the specified
application. The no command disables application
patrol for the specified application.
[no] app protocol_name allowport <1..65535>
If the default action is drop or reject. Adds the
specified port to the list of ports that are forwarded
in spite of the default action. The no command
removes the specified port from the list.
app protocol_name bandwidth <0..102400>
Specifies the bandwidth limit (in kilobits per
second) for the specified application.
bandwidth-graph
[no] app protocol_name bwm
Turns on bandwidth management for the specified
application. The no command turns off bandwidth
management for the specified application.
[no] app protocol_name defaultport <1..65535>
For port-base applications. Adds the specified port
to the list of ports used to identify the specified
application. This port number can only be included
in one application’s list. The no command removes
the specified port from the list.
app protocol_name {forward | drop | reject}
Specifies what action the ZyWALL should take
when it identifies this application.
164
ZyWALL (ZLD) CLI Reference Guide
Chapter 19 Application Patrol
Table 79 app Commands: Pre-Defined Applications (continued)
COMMAND
DESCRIPTION
app protocol_name mode {portless | portbase}
Specifies how the ZyWALL identifies this
application.
[no] app protocol_name log [alert]
Creates log entries (and alerts) for the specified
application. The no command does not create any
log entries.
19.2.2 Rule Commands for Pre-defined Applications
This table lists the commands for rules in each pre-defined application.
Table 80 app Commands: Rules in Pre-Defined Applications
COMMAND
DESCRIPTION
app protocol_name rule insert rule_number
Creates a new rule at the specified row and enters
sub-command mode. See Table 81 on page 165 for
the sub-commands.
app protocol_name rule append
Creates a new rule, appends it to the end of the list,
and enters sub-command mode. See Table 81 on
page 165 for the sub-commands.
app protocol_name rule rule_number
or
app protocol_name rule modify rule_number
Enters sub-command mode for editing the rule at
the specified row. See Table 81 on page 165 for the
sub-commands.
app protocol_name rule default
or
app protocol_name rule modify default
Enters sub-command mode for editing the default
rule for the application. See Table 81 on page 165
for the sub-commands.
no app protocol_name rule rule_number
Deletes the specified rule.
19.2.2.1 Rule Sub-commands
The following table describes the sub-commands for several application patrol rule
commands. Note that not all rule commands use all the sub-commands listed here.
Table 81 app protocol rule Sub-commands
COMMAND
DESCRIPTION
access {forward | drop | reject}
Specifies the action when traffic matches the rule.
[no] action-block
{login|message|audio|video|file-transfer}
Blocks use of a specific feature.
[no] activate
Turns on this rule. The no command turns off this
rule.
bandwidth {inbound|outbound} <0..1048576>
Limits inbound or outbound bandwidth, in kilobits
per second. 0 disables bandwidth management for
traffic matching this rule.
[no] bandwidth excess-usage
Enables maximize bandwidth usage to let the traffic
matching this policy “borrow” any unused
bandwidth on the out-going interface.
bandwidth priority <1..7>
Set the priority for traffic that matches this rule. The
smaller the number, the higher the priority.
[no] destination profile_name
Adds the specified destination address to the rule.
[no] from zone_name
Specifies the source zone.
ZyWALL (ZLD) CLI Reference Guide
165
Chapter 19 Application Patrol
Table 81 app protocol rule Sub-commands (continued)
COMMAND
DESCRIPTION
[no] inbound-dscp-mark {<0..63> | class
{default | dscp_class}}
This is how the ZyWALL handles the DSCP value
of the outgoing packets to a connection’s initiator
that match this policy.
Enter a DSCP value to have the ZyWALL apply
that DSCP value. Set this to the class default to
have the ZyWALL set the DSCP value to 0.
[no] log [alert]
Creates log entries (and alerts) for traffic that
matches the rule. The no command does not
create any log entries.
[no] outbound-dscp-mark {<0..63> | class
{default | dscp_class}}
This is how the ZyWALL handles the DSCP value
of the outgoing packets from a connection’s initiator
that match this policy.
Enter a DSCP value to have the ZyWALL apply
that DSCP value. Set this to the class default to
have the ZyWALL set the DSCP value to 0.
port <0..65535>
Specifies the destination port. 0 means any.
[no] schedule profile_name
Adds the specified schedule to the rule.
show
Displays the rule’s configuration
[no] source profile_name
Adds the specified source address to the rule.
[no] to zone_name
Specifies the destination zone.
[no] user username
Adds the specified user to the rule.
19.2.3 Exception Commands for Pre-defined Applications
This table lists the commands for exception rules for application access controls. These
commands are used for backward compatible only.
Table 82 app Commands: Exception Rules in Pre-Defined Applications
COMMAND
DESCRIPTION
app protocol_name exception insert rule_number
Creates a new rule at the specified row and enters
sub-command mode. See Table 83 on page 167 for
the sub-commands.
app protocol_name exception append
Creates a new rule, appends it to the end of the list,
and enters sub-command mode. See Table 83 on
page 167 for the sub-commands.
app protocol_name exception rule_number
Enters sub-command mode for editing the rule at
the specified row. See Table 83 on page 167 for the
sub-commands.
app protocol_name exception rule_number
or
app protocol_name exception modify rule_number
Enters sub-command mode for editing the rule at
the specified row. See Table 83 on page 167 for the
sub-commands.
app protocol_name exception default
or
app protocol_name exception modify default
Enters sub-command mode for editing the default
rule for the application. See Table 83 on page 167
for the sub-commands.
app protocol_name exception move rule_number
to rule_number
Moves the specified rule (first index) to the
specified location. The process is (1) remove the
specified rule from the table; (2) re-number; (3)
insert the rule at the specified location.
166
ZyWALL (ZLD) CLI Reference Guide
Chapter 19 Application Patrol
19.2.3.1 Exception Rule Sub-commands
The following table describes the sub-commands for several application patrol exception rule
commands. Note that not all rule commands use all the sub-commands listed here.
Table 83 app patrol exception rule Sub-commands
COMMAND
DESCRIPTION
access {forward | drop | reject}
Specifies the action when traffic matches the rule.
[no] action-block
{login|message|audio|video|file-transfer}
Blocks use of a specific feature.
[no] activate
Turns on this rule. The no command turns off this
rule.
bandwidth {inbound | outbound}
<0..1048576>
Limits inbound or outbound bandwidth, in kilobits
per second. 0 disables bandwidth management for
traffic matching this rule.
[no] bandwidth excess-usage
Enables maximize bandwidth usage to let the traffic
matching this policy “borrow” any unused
bandwidth on the out-going interface.
bandwidth priority <1..7>
Set the priority for traffic that matches this rule. The
smaller the number, the higher the priority.
[no] destination profile_name
Adds the specified destination address to the rule.
[no] from zone_name
Specifies the source zone.
[no] inbound-dscp-mark {<0..63> | class
{default | dscp_class}}
This is how the ZyWALL handles the DSCP value
of the outgoing packets to a connection’s initiator
that match this policy.
Enter a DSCP value to have the ZyWALL apply
that DSCP value. Set this to the class default to
have the ZyWALL set the DSCP value to 0.
[no] log [alert]
Creates log entries (and alerts) for traffic that
matches the rule. The no command does not
create any log entries.
[no] outbound-dscp-mark {<0..63> | class
{default | dscp_class}}
This is how the ZyWALL handles the DSCP value
of the outgoing packets from a connection’s initiator
that match this policy.
Enter a DSCP value to have the ZyWALL apply
that DSCP value. Set this to the class default to
have the ZyWALL set the DSCP value to 0.
port <0..65535>
Specifies the destination port. 0 means any.
[no] schedule profile_name
Adds the specified schedule to the rule.
show
Displays the rule’s configuration
[no] source profile_name
Adds the specified source address to the rule.
[no] to zone_name
Specifies the destination zone.
[no] user username
Adds the specified user to the rule.
ZyWALL (ZLD) CLI Reference Guide
167
Chapter 19 Application Patrol
19.2.4 Other Application Commands
This table lists the commands for other applications in application patrol.
Table 84 app Commands: Other Applications
COMMAND
DESCRIPTION
app other {del | forward | drop | reject}
Specifies the default action for other applications.
[no] app other log [alert]
Creates log entries (and alerts) for other
applications. The no command does not create
any log entries.
19.2.5 Rule Commands for Other Applications
This table lists the commands for rules in other applications.
Table 85 app Commands: Rules in Other Applications
COMMAND
DESCRIPTION
app other insert rule_number
Creates a new rule at the specified row and enters
sub-command mode.
app other append
Creates a new rule, appends it to the end of the list,
and enters sub-command mode.
app other <1..64>
Enters sub-command mode for editing the rule at
the specified row.
app other default
Enters sub-command mode for editing the default
rule for traffic of an unidentified application.
app other move rule_number to rule_number
Moves the specified rule (first index) to the
specified location. The process is (1) remove the
specified rule from the table; (2) re-number; (3)
insert the rule at the specified location.
no app other rule_number
Deletes the specified rule.
19.2.5.1 Other Rule Sub-commands
The following table describes the sub-commands for several application patrol other rule
commands. Note that not all rule commands use all the sub-commands listed here.
Table 86 app patrol other rule Sub-commands
COMMAND
168
DESCRIPTION
[no] activate
Turns on this rule. The no command turns off this
rule.
[no] port <0..65535>
Specifies the destination port. 0 means any.
[no] schedule profile_name
Adds the specified schedule to the rule.
[no] user username
Adds the specified user to the rule.
[no] from zone_name
Specifies the source zone.
[no] to zone_name
Specifies the destination zone.
[no] source profile_name
Adds the specified source address to the rule.
[no] destination profile_name
Adds the specified destination address to the rule.
[no] protocol {tcp | udp}
Adds the specified protocol to the rule.
access {forward | drop | reject}
Specifies the action when traffic matches the rule.
ZyWALL (ZLD) CLI Reference Guide
Chapter 19 Application Patrol
Table 86 app patrol other rule Sub-commands (continued)
COMMAND
DESCRIPTION
[no] action-block
{login|message|audio|video|file-transfer}
Blocks use of a specific feature.
bandwidth {inbound|outbound} <0..1048576>
Limits inbound or outbound bandwidth, in kilobits
per second. 0 disables bandwidth management for
traffic matching this rule.
[no] bandwidth excess-usage
Enables maximize bandwidth usage to let the traffic
matching this policy “borrow” any unused
bandwidth on the out-going interface.
bandwidth priority <1..7>
Set the priority for traffic that matches this rule. The
smaller the number, the higher the priority.
[no] inbound-dscp-mark {<0..63> | class
{default | dscp_class}}
This is how the ZyWALL handles the DSCP value
of the outgoing packets to a connection’s initiator
that match this policy.
Enter a DSCP value to have the ZyWALL apply
that DSCP value. Set this to the class default to
have the ZyWALL set the DSCP value to 0.
[no] log [alert]
Creates log entries (and alerts) for traffic that
matches the rule. The no command does not
create any log entries.
[no] outbound-dscp-mark {<0..63> | class
{default | dscp_class}}
This is how the ZyWALL handles the DSCP value
of the outgoing packets from a connection’s initiator
that match this policy.
Enter a DSCP value to have the ZyWALL apply
that DSCP value. Set this to the class default to
have the ZyWALL set the DSCP value to 0.
show
Displays the rule’s configuration
19.2.6 General Commands for Application Patrol
"
You must register for the IDP/AppPatrol signature service (at least the trial)
before you can use it. See Chapter 5 on page 37.
This table lists the general commands for application patrol.
Table 87 app Commands: Pre-Defined Applications
COMMAND
DESCRIPTION
[no] app activate
Turns on application patrol. The no command
turns off application patrol.
[no] app highest sip bandwidth priority
Turns the option to maximize the throughput of SIP
traffic on or off.
[no] app protocol_name bandwidth-graph
Sets the specified protocol to display on the
bandwidth statistics graph. The no command has it
not display on the bandwidth statistics graph.
ZyWALL (ZLD) CLI Reference Guide
169
Chapter 19 Application Patrol
Table 87 app Commands: Pre-Defined Applications (continued)
COMMAND
DESCRIPTION
[no] app other protocol_name bandwidth-graph
Sets traffic for unidentified applications to display
on the bandwidth statistics graph. The no
command it not display on the bandwidth statistics
graph.
[no] bwm activate
Globally enables bandwidth management. You
must globally activate bandwidth management to
have individual policy routes or application patrol
policies apply bandwidth management. The no
command globally disables bandwidth
management.
show app config
Displays whether or not application patrol is active.
show app all
Displays the settings for all applications.
show app all defaultport
Displays the default port settings for all
applications.
show app all statistics
Displays statistics for all applications.
show app {general|im|p2p|stream}
Displays protocols by category.
show app im support action
Displays the supported actions of each Instant
Messenger application.
show app protocol_name config
Displays the basic configuration of this application.
show app protocol_name defaultport
Displays the default ports of this application.
show app protocol_name statistics
Display the statistics of this application.
show app protocol_name rule rule_number
Displays the rule configuration of this application.
show app protocol_name rule rule_number
statistics
Displays the rule statistics of this application.
show app protocol_name rule default
Displays the default rule configuration of this
application.
show app protocol_name rule default statistics
Displays the default rule statistics of this
application.
show app protocol_name rule all
Displays the configurations of all the rules for this
application.
show app protocol_name rule all statistics
Displays all the rule statistics for this application.
show app other config
Displays the basic configuration for other
applications,
show app other statistics
Displays statistics for other applications.
show app other rule rule_number
Displays the rule’s configuration.
show app other rule rule_number statistics
Displays the rule’s statistics.
show app other rule default
Displays the default rule’s configuration.
show app other rule default statistics
Displays the default rule’s statistics.
show app other rule all
Displays the configurations of all the rules for other
applications.
show app other rule all statistics
Displays all the rule statistics for other applications.
170
ZyWALL (ZLD) CLI Reference Guide
Chapter 19 Application Patrol
Table 87 app Commands: Pre-Defined Applications (continued)
COMMAND
DESCRIPTION
show app highest sip bandwidth priority
Displays whether or not the option to maximize the
throughput of SIP traffic is enabled.
show bwm activation
Displays whether or not the global setting for
bandwidth management on the ZyWALL is
enabled.
19.2.6.1 General Command Examples
The following examples show the information that is displayed by some of the show
commands.
Router> configure terminal
Router(config)# show bwm activation
bwm activation: yes
Router# configure terminal
Router(config)# show app http config
application: http
active: yes
mode: portless
default access: forward
bandwidth graph: yes
Router# configure terminal
Router(config)# show app http defaultport
No.
Port
===========================================================================
1
80
ZyWALL (ZLD) CLI Reference Guide
171
Chapter 19 Application Patrol
Router# configure terminal
Router(config)# show app http rule all
index: default
activate: yes
port: 0
schedule: none
user: any
from zone: any
to zone: any
source address: any
destination address: any
access: forward
action login: na
action message: na
action audio: na
action video: na
action file-transfer: na
DSCP inbound marking: preserve
DSCP outbound marking: preserve
bandwidth excess-usage: no
bandwidth priority: 1
bandwidth inbound: 0
bandwidth outbound: 0
log: no
Router# configure terminal
Router(config)# show app other config
bandwidth-graph: yes
172
ZyWALL (ZLD) CLI Reference Guide
Chapter 19 Application Patrol
Router# configure terminal
Router(config)# show app other rule all
index: 1
activate: yes
port: 5963
schedule: none
user: any
from zone: any
to zone: any
source address: any
destination address: any
protocol: tcp
access: forward
DSCP inbound marking: preserve
DSCP outbound marking: preserve
bandwidth excess-usage: no
bandwidth priority: 1
bandwidth inbound: 0
bandwidth outbound: 0
log: no
index: default
activate: yes
port: 0
schedule: none
user: any
from zone: any
to zone: any
source address: any
destination address: any
protocol: any
access: forward
DSCP inbound marking: preserve
DSCP outbound marking: preserve
bandwidth excess-usage: no
bandwidth priority: 1
bandwidth inbound: 0
bandwidth outbound: 0
log: no
ZyWALL (ZLD) CLI Reference Guide
173
Chapter 19 Application Patrol
174
ZyWALL (ZLD) CLI Reference Guide
P ART VI
Anti-X
Anti-Virus (177)
IDP Commands (185)
Content Filtering (203)
Anti-Spam (215)
175
176
CHAPTER
20
Anti-Virus
This chapter introduces and shows you how to configure the anti-virus scanner.
20.1 Anti-Virus Overview
A computer virus is a small program designed to corrupt and/or alter the operation of other
legitimate programs. A worm is a self-replicating virus that resides in active memory and
duplicates itself. The effect of a virus attack varies from doing so little damage that you are
unaware your computer is infected to wiping out the entire contents of a hard drive to
rendering your computer inoperable.
20.2 Anti-virus Commands
The following table identifies the values required for many of these commands. Other input
values are discussed with the corresponding commands.
Table 88 Input Values for General Anti-Virus Commands
LABEL
DESCRIPTION
zone_object
The name of the zone. For the ZyWALL USG 300 and above, use up to 31
characters (a-zA-Z0-9_-). The name cannot start with a number. This value is
case-sensitive.
The ZyWALL USG 100 and 200 models use pre-defined zone names like DMZ,
LAN1, SSL VPN, WLAN, IPSec VPN, OPT, and WAN.
av_file_pattern Use up to 80 characters to specify a file pattern. Alphanumeric characters,
underscores (_), dashes (-), question marks (?) and asterisks (*) are allowed.
A question mark (?) lets a single character in the file name vary. For example,
use “a?.zip” (without the quotation marks) to specify aa.zip, ab.zip and so on.
Wildcards (*) let multiple files match the pattern. For example, use “*a.zip”
(without the quotation marks) to specify any file that ends with “a.zip”. A file
named “testa.zip” would match. There could be any number (of any type) of
characters in front of the “a.zip” at the end and the file name would still match. A
file named “test.zipa” for example would not match.
A * in the middle of a pattern has the ZyWALL check the beginning and end of
the file name and ignore the middle. For example, with “abc*.zip”, any file
starting with “abc” and ending in “.zip” matches, no matter how many characters
are in between.
The whole file name has to match if you do not use a question mark or asterisk.
If you do not use a wildcard, the ZyWALL checks up to the first 80 characters of
a file name.
ZyWALL (ZLD) CLI Reference Guide
177
Chapter 20 Anti-Virus
20.2.1 General Anti-virus Commands
The following table describes general anti-virus commands. You must use the configure
terminal command to enter the configuration mode before you can use these commands.
"
You must register for the ant-virus service before you can use it (see Chapter 5
on page 37).
Table 89 General Anti-virus Commands
COMMAND
DESCRIPTION
[no] anti-virus activate
Enables anti-virus service. Anti-virus service also depends on antivirus service registration.
show anti-virus activation
Displays anti-virus service status.
[no] anti-virus eicar activate
Turns detection of the EICAR test file on or off.
show anti-virus eicar activation
Displays whether or not detection of the EICAR test file is turned on.
anti-virus reload signatures
Recovers the anti-virus signatures. You should only need to do this if
instructed to do so by a support technician.
[no] anti-virus skip-unknownfile-type activate
Sets whether or not anti-virus checks files for which the ZyWALL
cannot identify a type.
show anti-virus skip-unknownfile-type activation
Displays whether or not anti-virus checks files for which the ZyWALL
cannot identify a type.
20.2.1.1 Activate/Deactivate Anti-Virus Example
This example shows how to activate and deactivate anti-virus on the ZyWALL.
Router# configure terminal
Router(config)# anti-virus activate
Router(config)# show anti-virus activation
anti-virus activation: yes
Router(config)# no anti-virus activate
Router(config)# show anti-virus activation
anti-virus activation: no
Router(config)#
20.2.2 Zone to Zone Anti-virus Rules
The following table describes the commands for configuring the zone to zone rules. You must
use the configure terminal command to enter the configuration mode before you can use
these commands.
Table 90 Commands for Zone to Zone Anti-Virus Rules
COMMAND
DESCRIPTION
anti-virus rule append
Enters the anti-virus sub-command mode to add a direction
specific rule.
anti-virus rule insert <1..32>
Enters the anti-virus sub-command mode to add a direction
specific rule.
178
ZyWALL (ZLD) CLI Reference Guide
Chapter 20 Anti-Virus
Table 90 Commands for Zone to Zone Anti-Virus Rules (continued)
COMMAND
DESCRIPTION
anti-virus rule <1..32>
Enters the anti-virus sub-command mode to edit the
specified direction specific rule.
[no] activate
Turns a direction specific anti-virus rule on or off.
[no] log [alert]
Sets the ZyWALL to create a log (and optionally an alert)
when packets match this rule and are found to be virusinfected. The no command sets the ZyWALL not to create
a log or alert when packets match this rule.
[no] from zone_object
Sets the zone on which the packets are received. The no
command removes the zone on which the packets are
received and resets it to the default (any). any means all
interfaces or VPN tunnels.
[no] to zone_object
Sets the zone to which the packets are sent. The no
command removes the zone to which the packets are sent
and resets it to the default (any). any means all interfaces
or VPN tunnels.
[no] scan {http | ftp | imap4 | smtp
| pop3}
Sets the protocols of traffic to scan for viruses.
[no] infected-action {destroy |
send-win-msg}
Sets the action to take when the ZyWALL detects a virus in
a file. The file can be destroyed (filled with zeros from the
point where the virus was found). The ZyWALL can also
send a message alert to the file’s intended user using a
Microsoft Windows computer connected to the to interface.
[no] bypass {white-list | blacklist}
Have the ZyWALL not check files against a pattern list.
[no] file-decompression [unsupported
destroy]
Enable file decompression to have the ZyWALL attempt to
to decompress zipped files for further scanning. You can
also have it destroy the zipped files it cannot decompress
due to encryption or system resource limitations.
show [all]
Displays the details of the anti-virus rule you are
configuring or all the rules.
anti-virus rule move <1..32> to <1..32>
Moves a direction specific anti-virus rule to the number that
you specified.
anti-virus rule delete <1..32>
Removes a direction specific anti-virus rule.
ZyWALL (ZLD) CLI Reference Guide
179
Chapter 20 Anti-Virus
20.2.2.1 Zone to Zone Anti-virus Rule Example
This example shows how to configure (and display) a WAN to LAN antivirus rule to scan
HTTP traffic and destroy infected files. The white and black lists are ignored and zipped files
are decompressed. Any zipped files that cannot be decompressed are destroyed.
Router(config)# anti-virus rule 1
Router(config-av-rule-1)# activate
Router(config-av-rule-1)# from-zone WAN
Router(config-av-rule-1)# to-zone LAN
Router(config-av-rule-1)# scan http
Router(config-av-rule-1)# infected-action destroy
Router(config-av-rule-1)# bypass white-list
Router(config-av-rule-1)# no bypass black-list
Router(config-av-rule-1)# file-decompression
Router(config-av-rule-1)# no file-decompression unsupported
destroy
Router(config-av-rule-1)#exit
Router(config)# show anti-virus rule 1
Anti-Virus Rule: 1
active: yes
log: log
from zone: WAN
to zone: LAN
scan protocols:
http: yes
ftp : yes
smtp: yes
pop3: yes
imap4: yes
infected action:
destroy: yes
send windows message: yes
bypass white list: yes
bypass black list: no
file decompression: yes
destroy unsupported compressed file: no
20.2.3 White and Black Lists
The following table describes the commands for configuring the white list and black list. You
must use the configure terminal command to enter the configuration mode before you
can use these commands.
Table 91 Commands for Anti-virus White and Black Lists
COMMAND
DESCRIPTION
[no] anti-virus white-list activate
Turn on the white list to have the ZyWALL not perform the
anti-virus check on files with names that match the white
list patterns.
[no] anti-virus white-list file-pattern
av_file_pattern {activate|deactivate}
Adds or removes a white list file pattern. Turns a file pattern
on or off.
anti-virus white-list replace
old_av_file_pattern new_av_file_pattern
{activate|deactivate}
Replaces the specified white list file pattern with a new file
pattern.
180
ZyWALL (ZLD) CLI Reference Guide
Chapter 20 Anti-Virus
Table 91 Commands for Anti-virus White and Black Lists (continued)
COMMAND
DESCRIPTION
[no] anti-virus black-list activate
Turn on the black list to log and delete files with names that
match the black list patterns.
[no] anti-virus black-list file-pattern
av_file_pattern {activate|deactivate}
Adds or removes a black list file pattern. Turns a file pattern
on or off.
anti-virus black-list replace
old_av_file_pattern new_av_file_pattern
{activate|deactivate}
Replaces the specified black list file pattern with a new file
pattern.
20.2.3.1 White and Black Lists Example
This example shows how to enable the white list and configure an active white list entry for
files with a .exe extension. It also enables the black list and configure an inactive black list
entry for files with a .exe extension.
Router(config)# anti-virus white-list activate
Router(config)# anti-virus white-list file-pattern
Router(config)# anti-virus white-list file-pattern *.exe activate
Router(config)# anti-virus black-list activate
Router(config)# anti-virus black-list file-pattern *.exe deactivate
Router(config)# show anti-virus white-list status
anti-virus white-list status: yes
Router(config)# show anti-virus white-list
No. Status
File-Pattern
===========================================================================
1
yes
*.exe
Router(config)# show anti-virus black-list status
anti-virus black-list status: yes
Router(config)# show anti-virus black-list
No. Status
File-Pattern
===========================================================================
1
no
*.exe
ZyWALL (ZLD) CLI Reference Guide
181
Chapter 20 Anti-Virus
20.2.4 Signature Search Anti-virus Command
The following table describes the command for searching for signatures. You must use the
configure terminal command to enter the configuration mode before you can use this
command.
Table 92 Command for Anti-virus Signature Search
COMMAND
DESCRIPTION
anti-virus search signature {all |
category category | id id | name name |
severity severity [{from id to id}]
Search for signatures by their ID, name, severity, or
category.
all: displays all signatures.
category: select whether you want to see virus
signatures or spyware signatures.
id: type the ID or part of the ID of the signature you want to
find.
name: type the name or part of the name of the signature(s)
you want to find. This search is not case-sensitive.
severity: type the severity level of the signatures you
want to find (high, medium, or low).
20.2.4.1 Signature Search Example
This example shows how to search for anti-virus signatures with MSN in the name.
Router(config)# anti-virus search signature name MSN
signature: 1
virus id: 41212
virus name: MSN
category: virus
severity: Low
20.3 Update Anti-virus Signatures
Use these commands to update new signatures.You should have already registered for antivirus service.
Table 93 Update Signatures
COMMAND
DESCRIPTION
anti-virus update signatures
Immediately downloads signatures from an update
server.
[no] anti-virus update auto
Enables (disables) automatic signature downloads
at regular times and days.
anti-virus update hourly
Enables automatic signature download every hour.
anti-virus update daily <0..23>
Enables automatic signature download every day at
the time specified.
anti-virus update weekly {sun | mon | tue |
wed | thu | fri | sat} <0..23>
Enables automatic signature download once-a-week
at the time and day specified.
show anti-virus update
Displays signature update schedule.
show anti-virus update status
Displays signature update status.
show anti-virus signatures status
Displays details about the current signature set.
182
ZyWALL (ZLD) CLI Reference Guide
Chapter 20 Anti-Virus
20.3.1 Update Signature Examples
These examples show how to enable/disable automatic anti-virus downloading, schedule
updates, display the schedule, display the update status, show the (new) updated signature
version number, show the total number of signatures and show the date/time the signatures
were created.
Router# configure terminal
Router(config)# anti-virus update signatures
ANTI-VIRUS signature update in progress.
Please check system log for future information.
Router(config)# anti-virus update auto
Router(config)# no anti-virus update auto
Router(config)# anti-virus update hourly
Router(config)# anti-virus update daily 10
Router(config)# anti-virus update weekly fri 13
Router(config)# show anti-virus update
auto: yes
schedule: weekly at Friday 13 o'clock
Router(config)# show anti-virus update status
current status: Anti-Virus Current signature version 1.046 on device is
latest at Tue Apr 17 10:18:00 2007
last update time: 2007/04/07 10:41:01
Router(config)# show anti-virus signatures status
current version : 1.046
release date
: 2007/04/06 10:41:29
signature number: 4124
20.4 Anti-virus Statistics
The following table describes the commands for collecting and displaying anti-virus statistics.
You must use the configure terminal command to enter the configuration mode before
you can use these commands.
Table 94 Commands for Anti-virus Statistics
COMMAND
DESCRIPTION
[no] anti-virus statistics collect
Turn the collection of anti-virus statistics on or off.
anti-virus statistics flush
Clears the collected statistics.
show anti-virus statistics summary
Displays the collected statistics.
show anti-virus statistics collect
Displays whether the collection of anti-virus statistics is
turned on or off.
show anti-virus statistics ranking
{destination | source | virus-name}
Query and sort the anti-virus statistics entries by
destination IP address, source IP address, or virus name.
virus-name: lists the most common viruses detected.
source: lists the source IP addresses of the most virusinfected files.
destination: lists the most common destination IP
addresses for virus-infected files.
ZyWALL (ZLD) CLI Reference Guide
183
Chapter 20 Anti-Virus
20.4.1 Anti-virus Statistics Example
This example shows how to collect and display anti-virus statistics. It also shows how to sort
the display by the most common destination IP addresses.
Router(config)# anti-virus statistics collect
Router(config)# show anti-virus statistics collect
collect statistics: yes
Router(config)# show anti-virus statistics summary
file scanned : 0
virus detected: 0
Router(config)# show anti-virus statistics ranking destination
184
ZyWALL (ZLD) CLI Reference Guide
CHAPTER
21
IDP Commands
This chapter introduces IDP-related commands.
21.1 Overview
Commands mostly mirror web configurator features. It is recommended you use the web
configurator for IDP features such as searching for web signatures, creating/editing an IDP
profile or creating/editing a custom signature. Some web configurator terms may differ from
the command-line equivalent.
"
The “no” command negates the action or returns it to the default value.
The following table lists valid input for IDP commands.
Table 95 Input Values for IDP Commands
LABEL
DESCRIPTION
zone_profile
The name of a zone. For the ZyWALL USG 300 and above, use up to 31
characters (a-zA-Z0-9_-). The name cannot start with a number. This value is
case-sensitive.
The ZyWALL USG 100 and 200 models use pre-defined zone names like DMZ,
LAN1, SSL VPN, WLAN, IPSec VPN, OPT, and WAN.
idp_profile
The name of an IDP profile. It can consist of alphanumeric characters, the
underscore, and the dash, and it is 1-31 characters long. Spaces are not allowed.
21.2 General IDP Commands
21.2.1 IDP Activation
"
You must register for the IDP/AppPatrol signature service (at least the trial)
before you can use it. See Chapter 5 on page 37.
ZyWALL (ZLD) CLI Reference Guide
185
Chapter 21 IDP Commands
This table shows the IDP signature, anomaly, and system-protect activation commands.
Table 96 IDP Activation
COMMAND
DESCRIPTION
[no] idp
{signature | anomaly |
system-protect}
activate
Enables IDP signatures, anomaly detection, and/or system-protect. IDP signatures
use requires IDP service registration. If you don’t have a standard license, you can
register for a once-off trial one. Anomaly detection and the self-protect feature do
not require registration. The no command disables the specified service.
idp system-protect
deactivate
Disables system-protect.
show idp
{signature | anomaly |
system-protect}
activation
Displays IDP signature, anomaly detection, or system protect service status.
idp reload
Recovers the IDP signatures. You should only need to do this if instructed to do so
by a support technician.
21.2.1.1 Activate/Deactivate IDP Example
This example shows how to activate and deactivate signature-based IDP on the ZyWALL.
Router# configure terminal
Router(config)# idp signature activate
Router(config)# show idp signature activation
idp signature activation: yes
Router(config)# no idp signature activate
Router(config)# show idp signature activation
idp signature activation: no
21.3 IDP Profile Commands
21.3.1 Global Profile Commands
Use these commands to rename or delete existing profiles and show IDP base profiles.
Table 97 Global Profile Commands
COMMAND
DESCRIPTION
idp rename {signature |
anomaly} profile1 profile2
Rename an IDP signature or anomaly profile originally named profile1
to profile2.
no idp {signature | anomaly}
profile3
Delete an IDP signature or system protect profile named profile3.
show idp signature profile
signature all details
Lists the settings for all of the specified profile’s signatures. Use |more to
display the settings page by page.
show idp signature all
details
Lists the settings for all of the signatures. Use |more to display the
settings page by page.
show idp {signature |
anomaly} base profile
Displays all IDP signature or system protect base profiles.
186
ZyWALL (ZLD) CLI Reference Guide
Chapter 21 IDP Commands
Table 97 Global Profile Commands
COMMAND
DESCRIPTION
show idp signature base
profile
{all|none|wan|lan|dmz}
settings
Lists the specified signature base profile’s settings. Use |more to display
the settings page by page.
show idp profiles
Displays all IDP signature profiles.
21.3.1.1 Example of Global Profile Commands
In this example we rename an IDP signature profile from “old_profile” to “new_profile”,
delete the “bye_profile” and show all base profiles available.
Router# configure terminal
Router(config)# idp rename signature old_profile new_profile
Router(config)# no idp signature bye_profile
Router(config)# show idp signature base profile
No. Base Profile Name
==============================================================
1
none
2
all
3
wan
4
lan
5
dmz
Router(config)#
21.3.2 IDP Zone to Zone Rules
Use the following rules to apply IDP profiles to specific directions of packet travel.
Table 98 IDP Zone to Zone Rule Commands
COMMAND
DESCRIPTION
idp {signature| anomaly } rule { append
| <1..32> | insert <1..32> }
Create an IDP signature or anomaly rule and enter the subcommand mode.
bind profile
Binds the IDP profile to the entry’s traffic direction.
no bind
Removes the IDP profile’s binding.
[no] from-zone zone_profile
Specifies the zone the traffic is coming from. The no
command removes the zone specification.
[no] to-zone zone_profile
Specifies the zone the traffic is going to. The no command
removes the zone specification.
[no] activate
Turns on the IDP profile to traffic direction binding. The no
command turns it off.
idp {signature| anomaly } rule { delete
<1..32> | move <1..32> to <1..32> }
Remove or move an IDP profile to traffic direction entry.
no idp {signature| anomaly } rule
<1..32>
Removes an IDP profile to traffic direction entry.
show idp {signature| anomaly } rules
Displays the IDP zone to zone rules.
ZyWALL (ZLD) CLI Reference Guide
187
Chapter 21 IDP Commands
21.3.2.1 Example of IDP Zone to Zone Rule Commands
The following example creates IDP zone to zone rule one. The rule applies the LAN_IDP
profile to all traffic going to the LAN zone.
Router# configure terminal
Router(config)# idp signature rule 1
Router(config-idp-signature-1)#
Router(config-idp-signature-1)# exit
Router(config)#
Router(config-idp-signature-1)# from-zone any
Router(config-idp-signature-1)# to-zone LAN
Router(config-idp-signature-1)# bind LAN_IDP
Router(config-idp-signature-1)# activate
Router(config)#show idp signature rules
Signature rules
idp rule: 1
from zone: any
to zone: LAN
profile: LAN_IDP
activate: yes
21.3.3 Editing/Creating IDP Signature Profiles
Use these commands to create a new IDP signature profile or edit an existing one. It is
recommended you use the web configurator to create/edit profiles. If you do not specify a base
profile, the default base profile is none.
"
You CANNOT change the base profile later!
Table 99 Editing/Creating IDP Signature Profiles
COMMAND
DESCRIPTION
idp signature newpro [base {all | lan | wan | dmz
| none}]
Creates a new IDP signature profile called
newpro. newpro uses the base profile you
specify. Enters sub-command mode. All the
following commands relate to the new profile.
Use exit to quit sub-command mode.
[no] signature sid activate
Activates or deactivates an IDP signature.
signature sid log [alert]
Sets log or alert options for an IDP signature
no signature sid log
Deactivates log options for an IDP signature
signature sid action {drop | reject-sender |
reject-receiver | reject-both}
Sets an action for an IDP signature
no signature sid action
Deactivates an action for an IDP signature.
show idp profile signature sid details
Shows signature ID details of the specified
profile.
show idp profile signature {all | customsignature} details
Shows the signature details of the specified
profile.
188
ZyWALL (ZLD) CLI Reference Guide
Chapter 21 IDP Commands
21.3.4 Editing/Creating Anomaly Profiles
Use these commands to create a new anomaly profile or edit an existing one. It is
recommended you use the web configurator to create/edit profiles. If you do not specify a base
profile, the default base profile is none.
"
You CANNOT change the base profile later!
Table 100 Editing/Creating Anomaly Profiles
COMMAND
DESCRIPTION
idp anomaly newpro [base {all | none}]
Creates a new IDP anomaly profile called
newpro. newpro uses the base profile you
specify. Enters sub-command mode. All the
following commands relate to the new profile.
Use exit to quit sub-command mode.
scan-detection sensitivity {low | medium |
high}
Sets scan-detection sensitivity.
no scan-detection sensitivity
Clears scan-detection sensitivity. The default
sensitivity is medium.
scan-detection block-period <1..3600>
Sets for how many seconds the ZyWALL
blocks all packets from being sent to the victim
(destination) of a detected anomaly attack.
[no] scan-detection {tcp-xxx} {activate | log
[alert] | block}
Activates TCP scan detection options where
{tcp-xxx} = {tcp-portscan | tcp-decoy-portscan |
tcp-portsweep | tcp-distributed-portscan | tcpfiltered-portscan | tcp-filtered-decoy-portscan |
tcp-filtered-distributed-portscan | tcp-filteredportsweep}. Also sets TCP scan-detection logs
or alerts and blocking. no deactivates TCP
scan detection, its logs, alerts or blocking.
[no] scan-detection {udp-xxx} {activate | log
[alert] | block}
Activates or deactivates UDP scan detection
options where {udp-xxx} = {udp-portscan | udpdecoy-portscan | udp-portsweep | udpdistributed-portscan | udp-filtered-portscan |
udp-filtered-decoy-portscan | udp-filtereddistributed-portscan | udp-filtered-portsweep}.
Also sets UDP scan-detection logs or alerts
and blocking. no deactivates UDP scan
detection, its logs, alerts or blocking.
[no] scan-detection {ip-xxx} {activate | log
[alert] | block}
Activates or deactivates IP scan detection
options where {ip-xxx} = {ip-protocol-scan | ipdecoy-protocol-scan | ip-protocol-sweep | ipdistributed-protocol-scan | ip-filtered-protocolscan | ip-filtered-decoy-protocol-scan | ipfiltered-distributed-protocol-scan | ip-filteredprotocol-sweep}. Also sets IP scan-detection
logs or alerts and blocking. no deactivates IP
scan detection, its logs, alerts or blocking.
[no] scan-detection {icmp-sweep | icmpfiltered-sweep} {activate | log [alert] |
block}
Activates or deactivates ICMP scan detection
options. Also sets ICMP scan-detection logs or
alerts and blocking. no deactivates ICMP scan
detection, its logs, alerts or blocking.
ZyWALL (ZLD) CLI Reference Guide
189
Chapter 21 IDP Commands
Table 100 Editing/Creating Anomaly Profiles (continued)
COMMAND
DESCRIPTION
[no] scan-detection open-port {activate | log
[alert] | block}
Activates or deactivates open port scan
detection options. Also sets open port scandetection logs or alerts and blocking. no
deactivates open port scan detection, its logs,
alerts or blocking.
flood-detection block-period <1..3600>
Sets for how many seconds the ZyWALL
blocks all packets from being sent to the victim
(destination) of a detected anomaly attack.
[no] flood-detection {tcp-flood | udp-flood |
ip-flood | icmp-flood} {activate | log
[alert] | block}
Activates or deactivates TCP, UDP, IP or ICMP
flood detection. Also sets flood detection logs
or alerts and blocking. no deactivates flood
detection, its logs, alerts or blocking.
[no] http-inspection {http-xxx} activate
Activates or deactivates http-inspection options
where http-xxx = {ascii-encoding | u-encoding |
bare-byte-unicode-encoding | base36-encoding
| utf-8-encoding | iis-unicode-codepointencoding | multi-slash-encoding | iis-backslashevasion | self-directory-traversal | directorytraversal | apache-whitespace | non-rfc-httpdelimiter | non-rfc-defined-char | oversizerequest-uri-directory | oversize-chunk-encoding
| webroot-directory-traversal}
http-inspection {http-xxx} log [alert]
Sets http-inspection log or alert.
no http-inspection {http-xxx} log
Deactivates http-inspection logs.
[no] http-inspection {http-xxx} action {drop
| reject-sender | reject-receiver | rejectboth}}
Sets http-inspection action
[no] tcp-decoder {tcp-xxx} activate
Activates or deactivates tcp decoder options
where {tcp-xxx} = {undersize-len | undersizeoffset | oversize-offset | bad-length-options |
truncated-options | ttcp-detected | obsoleteoptions | experimental-options}
tcp-decoder {tcp-xxx} log [alert]
Sets tcp decoder log or alert options.
no tcp-decoder {tcp-xxx} log
Deactivates tcp decoder log or alert options.
[no] tcp-decoder {tcp-xxx} action {drop |
reject-sender | reject-receiver | rejectboth}}
Sets tcp decoder action
[no] udp-decoder {truncated-header |
undersize-len | oversize-len} activate
Activates or deactivates udp decoder options
udp-decoder {truncated-header | undersize-len
| oversize-len} log [alert]
Sets udp decoder log or alert options.
no udp-decoder {truncated-header | undersize- Deactivates udp decoder log options.
len | oversize-len} log
udp-decoder {truncated-header | undersize-len
| oversize-len} action {drop | reject-sender
| reject-receiver | reject-both}
Sets udp decoder action
no udp-decoder {truncated-header | undersize- Deactivates udp decoder actions.
len | oversize-len} action
190
ZyWALL (ZLD) CLI Reference Guide
Chapter 21 IDP Commands
Table 100 Editing/Creating Anomaly Profiles (continued)
COMMAND
DESCRIPTION
[no] icmp-decoder {truncated-header |
truncated-timestamp-header | truncatedaddress-header} activate
Activates or deactivates icmp decoder options
icmp-decoder {truncated-header | truncatedtimestamp-header | truncated-address-header}
log [alert]
Sets icmp decoder log or alert options.
no icmp-decoder {truncated-header |
truncated-timestamp-header | truncatedaddress-header} log
Deactivates icmp decoder log options.
icmp-decoder {truncated-header | truncatedtimestamp-header | truncated-address-header}
action {drop | reject-sender | rejectreceiver | reject-both}}
Sets icmp decoder action
no icmp-decoder {truncated-header |
truncated-timestamp-header | truncatedaddress-header} action
Deactivates icmp decoder actions.
show idp anomaly profile scan-detection [all
details]
Shows all scan-detection settings of the
specified IDP profile.
show idp anomaly profile scan-detection {tcpportscan | tcp-decoy-portscan | tcp-portsweep |
tcp-distributed-portscan | tcp-filtered-portscan
| tcp-filtered-decoy-portscan | tcp-filtereddistributed-portscan | tcp-filtered-portsweep}
details
Shows selected TCP scan-detection settings
for the specified IDP profile.
show idp anomaly profile scan-detection {udpportscan | udp-decoy-portscan | udp-portsweep |
udp-distributed-portscan | udp-filtered-portscan
| udp-filtered-decoy-portscan |
udp-filtered-distributed-portscan | udpfiltered-portsweep} details
Shows UDP scan-detection settings for the
specified IDP profile.
show idp anomaly profile scan-detection {ipprotocol-scan | ip-decoy-protocol-scan | ipprotocol-sweep | ip-distributed-protocol-scan |
ip-filtered-protocol-scan | ip-filtered-decoyprotocol-scan | ip-filtered-distributedprotocol-scan | ip-filtered-protocol-sweep}
details
Shows IP scan-detection settings for the
specified IDP profile.
show idp anomaly profile scan-detection {icmpsweep | icmp-filtered-sweep | open-port} details
Shows ICMP scan-detection settings for the
specified IDP profile.
show idp anomaly profile flood-detection [all
details]
Shows all flood-detection settings for the
specified IDP profile.
show idp anomaly profile flood-detection {tcpflood | udp-flood | ip-flood | icmp-flood}
details
Shows flood-detection settings for the specified
IDP profile.
show idp anomaly profile http-inspection all
details
Shows http-inspection settings for the specified
IDP profile.
ZyWALL (ZLD) CLI Reference Guide
191
Chapter 21 IDP Commands
Table 100 Editing/Creating Anomaly Profiles (continued)
COMMAND
DESCRIPTION
show idp anomaly profile http-inspection {ascii- Shows http-inspection settings for the specified
IDP profile.
encoding | u-encoding | bare-byte-unicodeencoding | base36-encoding | utf-8-encoding |
iis-unicode-codepoint-encoding | multi-slashencoding | iis-backslash-evasion | selfdirectory-traversal | directory-traversal |
apache-whitespace | non-rfc-http-delimiter | nonrfc-defined-char | oversize-request-uridirectory | oversize-chunk-encoding | webrootdirectory-traversal} details
show idp anomaly profile tcp-decoder all details
Shows tcp-decoder settings for the specified
IDP profile.
show idp anomaly profile tcp-decoder {undersizelen | undersize-offset | oversize-offset | badlength-options | truncated-options | ttcpdetected | obsolete-options | experimentaloptions} details
Shows tcp-decoder settings for the specified
IDP profile.
show idp anomaly profile udp-decoder all details
Shows udp-decoder settings for the specified
IDP profile.
show idp anomaly profile udp-decoder {truncatedheader | undersize-len | oversize-len} details
Shows specified udp-decoder settings for the
specified IDP profile.
show idp anomaly profile icmp-decoder all details Shows all icmp-decoder settings for the
specified IDP profile.
show idp anomaly profile icmp-decoder {truncated- Shows specified icmp-decoder settings for the
header | truncated-timestamp-header | truncated- specified IDP profile.
address-header} details
21.3.4.1 Creating an Anomaly Profile Example
In this example we create a profile named “test”, configure some settings, display them, and
then return to global command mode.
Router# configure terminal
Router(config)# idp anomaly test
Router(config-idp-anomaly-profile-test)# tcp-decoder oversize-offset
action drop
Router(config-idp-anomaly-profile-test)# tcp-decoder oversize-offset log
alert
Router(config-idp-anomaly-profile-test)# tcp-decoder oversize-offset
activate
Router(config-idp-anomaly-profile-test)# no tcp-decoder oversize-offset
activate
Router(config-idp-anomaly-profile-test)# exit
Router(config)# show idp anomaly test tcp-decoder oversize-offset
details
message: (tcp_decoder) OVERSIZE-OFFSET ATTACK
keyword: tcp-decoder oversize-offset
activate: no
action: drop
log: log alert
Router(config)#
192
ZyWALL (ZLD) CLI Reference Guide
Chapter 21 IDP Commands
21.3.5 Editing System Protect
Use these commands to edit the system protect profiles.
Table 101 Editing System Protect Profiles
COMMAND
DESCRIPTION
idp system-protect
Configure the system protect profile. Enters
sub-command mode. All the following
commands relate to the new profile. Use exit
to quit sub-command mode.
[no] signature sid activate
Activates or deactivates an IDP signature.
signature sid log [alert]
Sets log or alert options for an IDP signature
no signature sid log
Deactivates log options for an IDP signature
signature sid action {drop | reject-sender |
reject-receiver | reject-both}
Sets an action for an IDP signature
no signature SID action
Deactivates an action for an IDP signature.
show idp system-protect all details
Displays the system protect profile details.
21.3.6 Signature Search
Use this command to search for signatures in the named profile.
"
It is recommended you use the web configurator to search for signatures.
Table 102 Signature Search Command
COMMAND
DESCRIPTION
idp search signature my_profile name
quoted_string sid SID severity severity_mask
platform platform_mask policytype policytype_mask
service service_mask activate {any | yes | no}
log {any | no | log | log-alert} action
action_mask
Searches for signature(s) in a profile by the
parameters specified. The quoted string is any
text within the signature name in quotes, for
example, [idp search LAN_IDP name "WORM"
sid 0 severity 0 platform 0 policytype 0 service
0 activate any log any action] searches for all
signatures in the LAN_IDP profile containing
the text “worm” within the signature name.
idp search system-protect my_profile name
quoted_string sid SID severity severity_mask
platform platform_mask policytype policytype_mask
service service_mask activate {any | yes | no}
log {any | no | log | log-alert} action
action_mask
Searches for signature(s) in a system-protect
profile by the parameters specified. The quoted
string is any text within the signature name in
quotes, for example, [idp search LAN_IDP
name "WORM" sid 0 severity 0 platform 0
policytype 0 service 0 activate any log any
action] searches for all signatures in the
LAN_IDP profile containing the text “worm”
within the signature name.
ZyWALL (ZLD) CLI Reference Guide
193
Chapter 21 IDP Commands
Table 102 Signature Search Command
COMMAND
DESCRIPTION
show idp search signature my_profile name
quoted_string sid SID severity severity_mask
platform platform_mask policytype policytype_mask
service service_mask activate {any | yes | no}
log {any | no | log | log-alert} action
action_mask
Searches for signature(s) in a profile by the
parameters specified. The quoted string is any
text within the signature name in quotes, for
example, [idp search LAN_IDP name "WORM"
sid 0 severity 0 platform 0 policytype 0 service
0 activate any log any action] searches for all
signatures in the LAN_IDP profile containing
the text “worm” within the signature name.
show idp search system-protect my_profile name
quoted_string sid SID severity severity_mask
platform platform_mask policytype policytype_mask
service service_mask activate {any | yes | no}
log {any | no | log | log-alert} action
action_mask
Searches for signature(s) in a system-protect
profile by the parameters specified. The quoted
string is any text within the signature name in
quotes, for example, [idp search LAN_IDP
name "WORM" sid 0 severity 0 platform 0
policytype 0 service 0 activate any log any
action] searches for all signatures in the
LAN_IDP profile containing the text “worm”
within the signature name.
21.3.6.1 Search Parameter Tables
The following table displays the command line severity, platform and policy type equivalent
values. If you want to combine platforms in a search, then add their respective numbers
together. For example, to search for signatures for Windows NT, Windows XP and Windows
2000 computers, then type “12” as the platform parameter.
Table 103 Severity, Platform and Policy Type Command Values
194
SEVERITY
PLATFORM
POLICY TYPE
1 = Very Low
2 = Low
3 = Medium
4 = High
5 = Severe
1 = All
2 = Win95/98
4 = WinNT
8 = WinXP/2000
16 = Linux
32 = FreeBSD
64 = Solaris
128 = SGI
256 = Other-Unix
512 = Network-Device
1 = DoS
2 = Buffer-Overflow
3 = Access-Control
4 = Scan
5 = Backdoor/Trojan
6 = Others
7 = P2P
8 = IM
9 = Virtus/Worm
10 = Porn
11 = Web-Attack
12 = Spam
ZyWALL (ZLD) CLI Reference Guide
Chapter 21 IDP Commands
The following table displays the command line service and action equivalent values. If you
want to combine services in a search, then add their respective numbers together. For example,
to search for signatures for DNS, Finger and FTP services, then type “7” as the service
parameter.
Table 104 Service and Action Command Values
SERVICE
SERVICE
ACTION
1 = DNS
2 = FINGER
4 = FTP
8 = MYSQL
16 = ICMP
32 = IM
64 = IMAP
128 = MISC
256 = NETBIOS
512 = NNTP
1024 = ORACLE
2048 = P2P
4096 = POP2
8192 = POP3
16384 = RPC
32768 = RSERVICES
65536 = SMTP
131072 = SNMP
262144 = SQL
524288 = TELNET
1048576 = TFTP
2097152 = n/a
4194304 = WEB_ATTACKS
8388608 = WEB_CGI
16777216 = WEB_FRONTPAGE
33554432 = WEB_IIS
67108864 = WEB_MISC
134217728 = WEB_PHP
268435456 = MISC_BACKDOOR
536870912 = MISC_DDOS
1073741824 = MISC_EXPLOIT
1 = None
2 = Drop
4 = Reject-sender
8 = Reject-receiver
16 = Reject-both
21.3.6.2 Signature Search Example
This example command searches for all signatures in the LAN_IDP profile:
•
•
•
•
•
•
•
Containing the text “worm” within the signature name
With an ID of 12345
Has a very low severity level
Operates on the Windows NT platform
Is a scan policy type, DNS service
Is enabled
Generates logs.
Router# configure terminal
Router(config)#
Router(config)# idp search signature LAN_IDP name “worm” sid 12345 severity
-> 1 platform 4 policytype 4 service 1 activate yes log log action 2
21.4 IDP Custom Signatures
Use these commands to create a new signature or edit an existing one.
"
It is recommended you use the web configurator to create/edit signatures
using the web configurator Anti-X > IDP > Custom Signatures screen.
ZyWALL (ZLD) CLI Reference Guide
195
Chapter 21 IDP Commands
"
You must use the web configurator to import a custom signature file.
Table 105 Custom Signatures
COMMAND
DESCRIPTION
idp customize signature quoted_string
Create a new custom signature. The quoted
string is the signature command string enclosed
in quotes. for example. "alert tcp any any <> any
any (msg: \"test\"; sid: 9000000 ; )".
idp customize signature edit quoted_string
Edits an existing custom signature.
no idp customize signature custom_sid
Deletes a custom signature.
show idp signatures custom-signature custom_sid
{details | contents | non-contents}
Displays custom signature information.
show idp signatures custom-signature all details Displays all custom signatures’ information.
show idp signatures custom-signature number
Displays the total number of custom signatures.
21.4.1 Custom Signature Examples
These examples show how to create a custom signature, edit one, display details of one, all and
show the total number of custom signatures.
Router# configure terminal
Router(config)# idp customize signature "alert tcp any any <> any any
(msg: \"test\"; sid: 9000000 ; )"
sid: 9000000
message: test
policy type:
severity:
platform:
all: no
Win95/98: no
WinNT: no
WinXP/2000: no
Linux: no
FreeBSD: no
Solaris: no
SGI: no
other-Unix: no
network-device: no
service:
outbreak: no
196
ZyWALL (ZLD) CLI Reference Guide
Chapter 21 IDP Commands
This example shows you how to edit a custom signature.
Router(config)# idp customize signature edit "alert tcp any any <> any any
(msg : \"test edit\"; sid: 9000000 ; )"
sid: 9000000
message: test edit
policy type:
severity:
platform:
all: no
Win95/98: no
WinNT: no
WinXP/2000: no
Linux: no
FreeBSD: no
Solaris: no
SGI: no
other-Unix: no
network-device: no
service:
outbreak: no
This example shows you how to display custom signature details.
Router(config)# show idp signatures custom-signature 9000000 details
sid: 9000000
message: test edit
policy type:
severity:
platform:
all: no
Win95/98: no
WinNT: no
WinXP/2000: no
Linux: no
FreeBSD: no
Solaris: no
SGI: no
other-Unix: no
network-device: no
service:
outbreak: no
ZyWALL (ZLD) CLI Reference Guide
197
Chapter 21 IDP Commands
This example shows you how to display custom signature contents.
Router(config)# show idp signatures custom-signature 9000000 contents
sid: 9000000
Router(config)# show idp signatures custom-signature 9000000 non-contents
sid: 9000000
ack:
dport: 0
dsize:
dsize_rel:
flow_direction:
flow_state:
flow_stream:
fragbits_reserve:
fragbits_dontfrag:
fragbits_morefrag:
fragoffset:
fragoffset_rel:
icmp_id:
icmp_seq:
icode:
icode_rel:
id:
ipopt:
itype:
itype_rel:
sameip:
seq:
sport: 0
tcp_flag_ack:
tcp_flag_fin:
tcp_flag_push:
tcp_flag_r1:
tcp_flag_r2:
tcp_flag_rst:
tcp_flag_syn:
tcp_flag_urg:
threshold_type:
threshold_track:
threshold_count:
threshold_second:
tos:
tos_rel:
transport: tcp
ttl:
ttl_rel:
window:
window_rel:
198
ZyWALL (ZLD) CLI Reference Guide
Chapter 21 IDP Commands
This example shows you how to display all details of a custom signature.
Router(config)# show idp signatures custom-signature all details
sid: 9000000
message: test edit
policy type:
severity:
platform:
all: no
Win95/98: no
WinNT: no
WinXP/2000: no
Linux: no
FreeBSD: no
Solaris: no
SGI: no
other-Unix: no
network-device: no
service:
outbreak: no
This example shows you how to display the number of custom signatures on the ZyWALL.
Router(config)# show idp signatures custom-signature number
signatures: 1
21.5 Update IDP Signatures
Use these commands to update new signatures.You register for IDP service before you can
update IDP signatures, although you do not have to register in order to update system-protect
signatures.
"
You must use the web configurator to import a custom signature file.
Table 106 Update Signatures
COMMAND
DESCRIPTION
idp {signature | system-protect} update
signatures
Immediately downloads IDP or system protect
signatures from an update server.
[no] idp {signature | system-protect} update
auto
Enables (disables) automatic signature downloads
at regular times and days.
idp {signature | system-protect} update hourly Enables automatic signature download every hour.
idp {signature | system-protect} update daily
<0..23>
Enables automatic signature download every day at
the time specified.
idp {signature | system-protect} update weekly
{sun | mon | tue | wed | thu | fri | sat}
<0..23>
Enables automatic signature download once-a-week
at the time and day specified.
ZyWALL (ZLD) CLI Reference Guide
199
Chapter 21 IDP Commands
Table 106 Update Signatures
COMMAND
DESCRIPTION
show idp {signature | system-protect} update
Displays signature update schedule.
show idp {signature | system-protect} update
status
Displays signature update status.
show idp {signature | system-protect}
signatures {version | date | number}
Displays signature information
21.5.1 Update Signature Examples
These examples show how to enable/disable automatic IDP downloading, schedule updates,
display the schedule, display the update status, show the (new) updated signature version
number, show the total number of signatures and show the date/time the signatures were
created.
Router# configure terminal
Router(config)# idp signature update signatures
IDP signature update in progress.
Please check system log for future information.
Router(config)# idp update auto
Router(config)# no idp update auto
Router(config)# idp update hourly
Router(config)# idp update daily 10
Router(config)# idp update weekly fri 13
Router(config)# show idp update
auto: yes
schedule: weekly at Friday 13 o'clock
Router(config)# show idp signature update status
current status: IDP signature download failed, do 1 retry at Sat Jan
22:47:47 2003
last update time: 2003-01-01 01:34:39
Router(config)# show idp signature signatures version
version: 1.2000
Router(config)# show idp signature signatures number
signatures: 2000
Router(config)# show idp signature signatures date
date: 2005/11/13 13:56:03
4
21.6 IDP Statistics
The following table describes the commands for collecting and displaying IDP statistics. You
must use the configure terminal command to enter the configuration mode before you
can use these commands.
Table 107 Commands for IDP Statistics
COMMAND
DESCRIPTION
[no] idp statistics collect
Turn the collection of IDP statistics on or off.
idp statistics flush
Clears the collected statistics.
show idp statistics summary
Displays the collected statistics.
200
ZyWALL (ZLD) CLI Reference Guide
Chapter 21 IDP Commands
Table 107 Commands for IDP Statistics (continued)
COMMAND
DESCRIPTION
show idp statistics collect
Displays whether the collection of IDP statistics is turned
on or off.
show idp statistics ranking {signaturename | source | destination}
Query and sort the IDP statistics entries by signature
name, source IP address, or destination IP address.
signature-name: lists the most commonly detected
signatures.
source: lists the source IP addresses from which the
ZyWALL has detected the most intrusion attempts.
destination: lists the most common destination IP
addresses for detected intrusion attempts.
21.6.1 IDP Statistics Example
This example shows how to collect and display IDP statistics. It also shows how to sort the
display by the most common signature name, source IP address, or destination IP address.
Router# configure terminal
Router(config)# idp statistics collect
Router(config)# no idp statistics activate
Router(config)# idp statistics flush
Router(config)# show idp statistics collect
IDP collect statistics status: yes
Router(config)# show idp statistics summary
scanned session : 268
packet dropped: 0
packet reset: 0
Router(config)# show idp statistics ranking
ranking: 1
signature id: 8003796
signature name: ICMP L3retriever Ping
type: Scan
severity: verylow
occurence: 22
ranking: 2
signature id: 8003992
signature name: ICMP Large ICMP Packet
type: DDOS
severity: verylow
occurence: 4
Router(config)# show idp statistics ranking
ranking: 1
destination ip: 172.23.5.19
occurence: 22
ranking: 2
destination ip: 172.23.5.1
occurence: 4
Router(config)# show idp statistics ranking
ranking: 1
source ip: 192.168.1.34
occurence: 26
ZyWALL (ZLD) CLI Reference Guide
status
signature-name
destination
source
201
Chapter 21 IDP Commands
202
ZyWALL (ZLD) CLI Reference Guide
CHAPTER
22
Content Filtering
This chapter covers how to use the content filtering feature to control web access.
22.1 Content Filtering Overview
Content filtering allows you to block certain web features, such as cookies, and/or block
access to specific web sites. It can also block access to specific categories of web site content.
You can create different content filtering policies for different addresses, schedules, users or
groups and content filtering profiles. For example, you can configure one policy that blocks
John Doe’s access to arts and entertainment web pages during the workday and another policy
that lets him access them after work.
22.2 Content Filtering Policies
A content filtering policy allows you to do the following.
• Use schedule objects to define when to apply a content filtering profile.
• Use address and/or user/group objects to define to whose web access to apply the content
filtering profile.
• Apply a content filtering profile that you have custom-tailored.
22.3 External Web Filtering Service
When you register for and enable the external web filtering service, your ZyWALL accesses
an external database that has millions of web sites categorized based on content. You can have
the ZyWALL block, block and/or log access to web sites based on these categories. The
content filtering lookup process is described below.
ZyWALL (ZLD) CLI Reference Guide
203
Chapter 22 Content Filtering
Figure 24 Content Filtering Lookup Procedure
1 A computer behind the ZyWALL tries to access a web site.
2 The ZyWALL looks up the web site in its . If an attempt to access the web site was made
in the past, a record of that web site’s category will be in the ZyWALL’s . The ZyWALL
blocks, blocks and logs or just logs the request based on your configuration.
3 Use the Anti-X > Content Filter screen to configure how long a web site address
remains in the as well as view those web site addresses. All of the web site address
records are also cleared from the local when the ZyWALL restarts.
4 If the ZyWALL has no record of the web site, it queries the external content filtering
database and simultaneously sends the request to the web server.
5 The external content filtering server sends the category information back to the
ZyWALL, which then blocks and/or logs access to the web site based on the settings in
the content filtering profile. The web site’s address and category are then stored in the
ZyWALL’s content filtering .
22.4 Content Filtering Reports
See the web configurator User’s Guide to see how to view content filtering reports after you
have activated the category-based content filtering subscription service.
22.5 Content Filter Command Input Values
The following table explains the values you can input with the content-filter commands.
Table 108 Content Filter Command Input Values
LABEL
DESCRIPTION
policy_number
The number of the policy <0 - X > where X depends on the number of content
filtering policies the ZyWALL model supports. See the CLI help for details.
address
The name (up to 63 characters) of an existing address object or group to
which the policy should be applied.
schedule
The name (up to 63 characters) of an existing schedule to control when the
policy should be applied.
filtering_profile The filtering profile defines how to filter web URLs or content. You may use 131 alphanumeric characters, underscores(_), or dashes (-), but the first
character cannot be a number. This value is case-sensitive.
204
category_number
The number of a web category <0…60>. Each number corresponds to a
category name.
category_name
The name of a web category (see Table 109 on page 206).
ZyWALL (ZLD) CLI Reference Guide
Chapter 22 Content Filtering
Table 108 Content Filter Command Input Values (continued)
LABEL
DESCRIPTION
trust_hosts
The IP address or domain name of a trusted web site. Use a host name such
as www.good-site.com. Do not use the complete URL of the site – that is, do
not include “http://”. All subdomains are allowed. For example, entering
“zyxel.com” also allows “www.zyxel.com”, “partner.zyxel.com”,
“press.zyxel.com”, etc. Use up to 63 case-insensitive characters (0-9a-z-).
You can enter a single IP address in dotted decimal notation like 192.168.2.5.
You can enter a subnet by entering an IP address in dotted decimal notation
followed by a slash and the bit number of the subnet mask of an IP address.
The range is 0 to 32.
To find the bit number, convert the subnet mask to binary and add all of the
1’s together. Take “255.255.255.0” for example. 255 converts to eight 1’s in
binary. There are three 255’s, so add three eights together and you get the bit
number (24).
An example is 192.168.2.1/24
You can enter an IP address range by entering the start and end IP addresses
separated by a hyphen, for example 192.168.2.5-192.168.2.23.
forbid_hosts
The IP address or domain name of a forbidden web site.
Use a host name such as www.bad-site.com into this text field. Do not use the
complete URL of the site – that is, do not include “http://”. All subdomains are
also blocked. For example, entering “bad-site.com” also blocks “www.badsite.com”, “partner.bad-site.com”, “press.bad-site.com”, etc. Use up to 63
case-insensitive characters (0-9a-z-).
You can enter a single IP address in dotted decimal notation like 192.168.2.5.
You can enter a subnet by entering an IP address in dotted decimal notation
followed by a slash and the bit number of the subnet mask of an IP address.
The range is 0 to 32.
To find the bit number, convert the subnet mask to binary and add all of the
1’s together. Take “255.255.255.0” for example. 255 converts to eight 1’s in
binary. There are three 255’s, so add three eights together and you get the bit
number (24).
An example is 192.168.2.1/24
You can enter an IP address range by entering the start and end IP addresses
separated by a hyphen, for example 192.168.2.5-192.168.2.23.
keyword
A keyword or a numerical IP address to search URLs for and block access to
if they contain it. Use up to 63 case-insensitive characters (0-9a-zA-Z;/
?:@&=+$\.-_!~*'()%,) in double quotes. For example enter “Bad_Site” to block
access to any web page that includes the exact phrase “Bad_Site”. This does
not block access to web pages that only include part of the phrase (such as
“Bad” in this example).
message
The message to display when a web site is blocked. Use up to 255 characters
(0-9a-zA-Z;/?:@&=+$\.-_!~*'()%,) in quotes. For example, “Access to this web
page is not allowed. Please contact the network administrator.”
redirect_url
The URL of the web page to which you want to send users when their web
access is blocked by content filtering. The web page you specify here opens
in a new frame below the denied access message.
Use “http://” followed by up to 255 characters (0-9a-zA-Z;/?:@&=+$\._!~*'()%) in quotes. For example, “http://192.168.1.17/blocked access”.
license
The license key (up to 15 characters) for the external web filtering service.
service_timeout
The value specifies the maximum querying time in seconds <1…60>
_timeout
The value specifies the maximum life time in hours <1..720>.
url
The URL of a web site.
ZyWALL (ZLD) CLI Reference Guide
205
Chapter 22 Content Filtering
Table 108 Content Filter Command Input Values (continued)
LABEL
DESCRIPTION
rating_server
The hostname or IP address of the rating server.
query_timeout
The value specifies the maximum querying time when rating a URL in zysh.
<1..60> seconds.
The following table lists the content filtering web category names.
Table 109 Content Filtering Web Category Names
206
CATEGORY NAME
CATEGORY NAME
Adult/Mature Content
Pornography
Sex Education
Intimate Apparel/Swimsuit
Nudity
Alcohol/Tobacco
Illegal/Questionable
Gambling
Violence/Hate/Racism
Weapons
Abortion
Hacking
Phishing
Arts/Entertainment
Business/Economy
Alternative Spirituality/Occult
Illegal Drugs
Education
Cultural/Charitable Organization
Financial Services
Brokerage/Trading
Online Games
Government/Legal
Military
Political/Activist Groups
Health
Computers/Internet
Search Engines/Portals
Spyware/Malware Sources
Spyware Effects/Privacy Concerns
Job Search/Careers
News/Media
Personals/Dating
Reference
Open Image/Media Search
Chat/Instant Messaging
Email
Blogs/Newsgroups
Religion
Social Networking
Online Storage
Remote Access Tools
Shopping
Auctions
Real Estate
Society/Lifestyle
Sexuality/Alternative Lifestyles
Restaurants/Dining/Food
Sports/Recreation/Hobbies
Travel
Vehicles
Humor/Jokes
Software Downloads
Pay to Surf
Peer-to-Peer
Streaming Media/MP3s
Proxy Avoidance
For Kids
Web Advertisements
Web Hosting
Extreme
Alcohol
Tobacco
Blogs/Personal Pages
ZyWALL (ZLD) CLI Reference Guide
Chapter 22 Content Filtering
Table 109 Content Filtering Web Category Names
CATEGORY NAME
CATEGORY NAME
Web Applications
Suspicious
Alternative Sexuality/Lifestyles
LGBT
Non-viewable
Content Servers
Placeholders
Open/Mixed Content
Potentially Unwanted Software
Greeting Cards
Audio/Video Clips
Media Sharing
Radio/Audio Streams
TV/Video Streams
Internet Telephony
Online Meetings
Newsgroups/Forums
Art/Culture
Entertainment
Games
Sports/Recreation
Translation
Alternative Spirituality/Belief
Society/Daily Living
Unrated
22.6 General Content Filter Commands
The following table lists the commands that you can use for general content filter
configuration such as enabling content filtering, viewing and ordering your list of content
filtering policies, creating a denial of access message or specifying a redirect URL and
checking your external web filtering service registration status. Use the configure
terminal command to enter the configuration mode to be able to use these commands. See
Table 108 on page 204 for details about the values you can input with these commands.
Table 110 content-filter General Commands
COMMAND
DESCRIPTION
[no] content-filter active
Turns on content filtering. The no command turns
it off.
[no] content-filter block message message
Sets the message to display when content filtering
blocks access to a web page. The no command
clears the setting.
[no] content-filter block redirect
redirect_url
Sets the URL of the web page to which to send
users when their web access is blocked by content
filtering. The no command clears the setting.
[no] content-filter -timeout _timeout
Sets how long the ZyWALL is to keep an entry in
the content filtering URL before discarding it. The
no command clears the setting.
[no] content-filter default block
Has the ZyWALL block sessions that do not match
a content filtering policy. The no command allows
sessions that do not match a content filtering
policy.
[no] content-filter license license
Sets the license key for the external web filtering
service. The no command clears the setting.
content-filter passed warning flush
Clears the ZyWALL’s record of sessions for which it
has given the user a warning before allowing
access.
ZyWALL (ZLD) CLI Reference Guide
207
Chapter 22 Content Filtering
Table 110 content-filter General Commands (continued)
COMMAND
DESCRIPTION
content-filter passed warning timeout
<1..1440>
Sets how long to keep records of sessions for
which the ZyWALL has given the user a warning
before allowing access.
[no] content-filter policy policy_number
address schedule filtering_profile
Sets a content filtering policy. The no command
removes it.
content-filter policy policy_number shutdown
Disables a content filtering policy.
content-filter url- test url
Tests whether or not a web site is saved in the
ZyWALL’s database of restricted web pages.
content-filter url-server test url [ server
rating_server ] [ timeout query_timeout ]
Tests whether or not a web site is saved in the
external content filter server’s database of
restricted web pages.
content-filter zsb port <1..65535>
Sets the port the ZyWALL uses to check if
requested web pages pose a threat to users or
their computers.
show content-filter passed warning
Displays the ZyWALL’s record of sessions for
which it has given the user a warning before
allowing access.
show content-filter policy
Displays the content filtering policies.
show content-filter settings
Displays the general content filtering settings.
show content-filter url-
Displays the contents of the content filtering URL
before discarding it.
22.7 Content Filter Filtering Profile Commands
The following table lists the commands that you can use to configure a content filtering policy.
A content filtering policy defines which content filter profile should be applied, when it should
be applied, and to whose web access it should be applied. Use the configure terminal
command to enter the configuration mode to be able to use these commands. See Table 108 on
page 204 for details about the values you can input with these commands.
Table 111 content-filter Filtering Profile Commands Summary
COMMAND
DESCRIPTION
[no] content-filter license license
Sets the license key for the external web filtering
service. The no command clears the setting.
[no] content-filter profile filtering_profile
Creates a content filtering profile. The no
command removes the profile.
[no] content-filter profile filtering_profile
custom
Sets a content filtering profile to use a profile’s
custom settings (lists of trusted web sites and
forbidden web sites and blocking of certain web
features). The no command has the profile not use
the custom settings.
[no] content-filter profile filtering_profile
custom activex
Sets a content filtering profile to block ActiveX
controls. The no command sets the profile to allow
ActiveX.
[no] content-filter profile filtering_profile
custom cookie
Sets a content filtering profile to block Cookies. The
no command sets the profile to allow Cookies.
208
ZyWALL (ZLD) CLI Reference Guide
Chapter 22 Content Filtering
Table 111 content-filter Filtering Profile Commands Summary (continued)
COMMAND
DESCRIPTION
[no] content-filter profile filtering_profile
custom forbid forbid_hosts
Adds a web site to a content filtering profile’s
forbidden list. The no command removes a web
site from the forbidden list.
[no] content-filter profile filtering_profile
custom java
Sets a content filtering profile to block Java. The
no command sets the profile to allow Java.
[no] content-filter profile filtering_profile
custom keyword keyword
Has a content filtering profile block access to Web
sites with URLs that contain the specified keyword
or IP address in the URL. The no command
removes the keyword.
[no] content-filter profile filtering_profile
custom proxy
Sets a content filtering profile to block access to
web proxy servers. The no command sets the
profile to allow access to proxy servers.
[no] content-filter profile filtering_profile
custom trust trust_hosts
Adds a web site to a content filtering profile’s
trusted list. The no command removes a web site
from the trusted list.
[no] content-filter profile filtering_profile
custom trust-allow-features
Sets a content filtering profile to permit Java,
ActiveX and Cookies from sites on the trusted list.
The no command has the content filtering profile
not permit Java, ActiveX and Cookies from sites on
the trusted list
[no] content-filter profile filtering_profile
custom trust-only
Sets a content filtering profile to only allow access
to web sites that are on the trusted list. The no
command has the profile allow access to web sites
that are not on the trusted list.
[no] content-filter profile filtering_profile
url category {category_name}
Sets a content filtering profile to check for specific
web site categories. The no command has the
profile not check for the specified categories.
[no] content-filter profile filtering_profile
url match-unsafe {block | log | warn}
Sets the action for attempted access to web pages
that match the profile’s selected unsafe categories.
The no command clears the setting.
Block access, allow and log access, or display a
warning message before allowing access.
[no] content-filter profile filtering_profile
url match {block | log}
Sets a content filtering profile to block or allow and
log access to web pages that match the profile’s
selected managed categories. The no command
clears the setting.
[no] content-filter profile filtering_profile
url offline {block | log | warn}
Sets the action for attempted access to web pages
if the external content filtering database is
unavailable. The no command clears the setting.
Block access, allow and log access, or display a
warning message before allowing access.
[no] content-filter profile filtering_profile
url unrate {block | log | warn}
Sets the action for attempted access to web pages
that the external web filtering service has not
categorized. The no command clears the setting.
Block access, allow and log access, or display a
warning message before allowing access.
[no] content-filter profile filtering_profile
url url-server
Sets a content filtering profile to use the external
web filtering service. The no command has the
profile not use the external web filtering service.
[no] content-filter service-timeout
service_timeout
Sets how many seconds the ZyWALL is to wait for
a response from the external content filtering
server. The no command clears the setting.
ZyWALL (ZLD) CLI Reference Guide
209
Chapter 22 Content Filtering
Table 111 content-filter Filtering Profile Commands Summary (continued)
COMMAND
DESCRIPTION
content-filter url- test url
Tests whether or not a web site is saved in the
ZyWALL’s database of restricted web pages.
content-filter url-server test url [server
rating_server] [timeout query_timeout]
Tests whether or not a web site is saved in the
external content filter server’s database of
restricted web pages.
show content-filter profile
[filtering_profile]
Displays the specified content filtering profile’s
settings or the settings of all them if you don’t
specify one.
22.8 Content Filter Commands
The following table lists the commands that you can use to view and configure your
ZyWALL’s URL caching. You can configure how long a categorized web site address remains
in the as well as view those web site addresses to which access has been allowed or blocked
based on the responses from the external content filtering server. The ZyWALL only queries
the external content filtering database for sites not found in the .
Use the configure terminal command to enter the configuration mode to be able to use
these commands. See Table 108 on page 204 for details about the values you can input with
these commands.
Table 112 content-filter Commands
COMMAND
DESCRIPTION
[no] content-filter -timeout _timeout
Sets how long the ZyWALL is to keep an entry in
the content filtering URL before discarding it. The
no command clears the setting.
show content-filter url-
Displays the contents of the content filtering URL
before discarding it.
22.9 Content Filtering Statistics
The following table describes the commands for collecting and displaying content filtering
statistics. You must use the configure terminal command to enter the configuration mode
before you can use these commands.
Table 113 Commands for Content Filtering Statistics
COMMAND
DESCRIPTION
[no] content-filter statistics collect
Turn the collection of content filtering statistics on or off.
content-filter statistics flush
Clears the collected statistics.
show content-filter statistics summary
Displays the collected statistics.
show content-filter statistics collect
Displays whether the collection of content filtering statistics
is turned on or off.
show content-filter statistics summary
Displays the current content filtering statistics.
210
ZyWALL (ZLD) CLI Reference Guide
Chapter 22 Content Filtering
22.9.1 Content Filtering Statistics Example
This example shows how to collect and display content filtering statistics.
Router(config)# content-filter statistics collect
Router(config)# show content-filter statistics summary
total web pages inspected
: 0
web pages warned by category service : 0
web pages blocked by category service: 0
web pages blocked by custom service : 0
restricted web features
: 0
forbidden web sites
: 0
url keywords
: 0
web pages blocked without policy
: 0
web pages passed
: 0
unsafe web pages
other web pages
: 0
: 0
22.10 Content Filtering Commands Example
The following example shows how to limit the web access for a sales group.
1 First, create a sales address object. This example uses a subnet that covers IP addresses
172.21.3.1 to 172.21.3.254.
2 Then create a schedule for all day.
3 Create a filtering profile for the group.
4 You can use the following commands to block sales from accessing adult and
pornography websites.
5 Enable the external web filtering service.
"
You must register for the external web filtering service before you can use it
(see Chapter 5 on page 37).
6 You can also customize the filtering profile. The following commands block active-X,
java and proxy access.
ZyWALL (ZLD) CLI Reference Guide
211
Chapter 22 Content Filtering
7 Activate the customization.
Router# configure terminal
Router(config)# address-object sales 172.21.3.0/24
Router(config)# schedule-object all_day 00:00 23:59
Router(config)# content-filter profile sales_CF_PROFILE
Router(config)# content-filter profile sales_CF_PROFILE
content
Router(config)# content-filter profile sales_CF_PROFILE
Router(config)# content-filter profile sales_CF_PROFILE
Router(config)# content-filter profile sales_CF_PROFILE
Router(config)# content-filter profile sales_CF_PROFILE
Router(config)# content-filter profile sales_CF_PROFILE
Router(config)# content-filter profile sales_CF_PROFILE
212
url category adult-matureurl category pornography
url url-server
custom java
custom activex
custom proxy
custom
ZyWALL (ZLD) CLI Reference Guide
Chapter 22 Content Filtering
Use this command to display the settings of the profile.
Router(config)# show content-filter
service active : yes
url match unsafe: block: no, warn:
url match other : block: yes, warn:
url unrate
: block: no, warn:
service offline : block: no, warn:
profile sales_CF_PROFILE
yes,
no,
yes,
yes,
log:
log:
log:
log:
no
no
no
no
category settings:
Adult/Mature Content
: yes, Pornography
: yes
Sex Education
: no, Intimate Apparel/Swimsuit
: no
Nudity
: no, Alcohol/Tobacco
: no
Illegal/Questionable
: no, Gambling
: no
Violence/Hate/Racism
: no, Weapons
: no
Abortion
: no, Hacking
: no
Phishing
: no, Arts/Entertainment
: no
Business/Economy
: no, Alternative Spirituality/Occult : no
Illegal Drugs
: no, Education
: no
Cultural/Charitable Organization: no, Financial Services
: no
Brokerage/Trading
: no, Online Games
: no
Government/Legal
: no, Military
: no
Political/Activist Groups
: no, Health
: no
Computers/Internet
: no, Search Engines/Portals
: no
Spyware/Malware Sources
: no, Spyware Effects/Privacy Concerns: no
Job Search/Careers
: no, News/Media
: no
Personals/Dating
: no, Reference
: no
Open Image/Media Search
: no, Chat/Instant Messaging
: no
Email
: no, Blogs/Newsgroups
: no
Religion
: no, Social Networking
: no
Online Storage
: no, Remote Access Tools
: no
Shopping
: no, Auctions
: no
Real Estate
: no, Society/Lifestyle
: no
Sexuality/Alternative Lifestyles: no, Restaurants/Dining/Food
: no
Sports/Recreation/Hobbies
: no, Travel
: no
Vehicles
: no, Humor/Jokes
: no
Software Downloads
: no, Pay to Surf
: no
Peer-to-Peer
: no, Streaming Media/MP3s
: no
Proxy Avoidance
: no, For Kids
: no
Web Advertisements
: no, Web Hosting
: no
Extreme
: no, Alcohol
: no
Tobacco
: no, Blogs/Personal Pages
: no
Web Applications
: no, Suspicious
: no
Alternative Sexuality/Lifestyles: no, LGBT
: no
Non-viewable
: no, Content Servers
: no
Placeholders
: no, Open/Mixed Content
: no
Potentially Unwanted Software
: no, Greeting Cards
: no
Audio/Video Clips
: no, Media Sharing
: no
Radio/Audio Streams
: no, TV/Video Streams
: no
Internet Telephony
: no, Online Meetings
: no
Newsgroups/Forums
: no, Art/Culture
: no
Entertainment
: no, Games
: no
Sports/Recreation
: no, Translation
: no
Alternative Spirituality/Belief : no, Society/Daily Living
: no
--------------------------------------SNAP!-----------------------------------------
ZyWALL (ZLD) CLI Reference Guide
213
Chapter 22 Content Filtering
214
ZyWALL (ZLD) CLI Reference Guide
CHAPTER
23
Anti-Spam
This chapter introduces and shows you how to configure the anti-spam scanner.
23.1 Anti-Spam Overview
The anti-spam feature can mark or discard spam (unsolicited commercial or junk e-mail). Use
the white list to identify legitimate e-mail. Use the black list to identify spam e-mail. The
ZyWALL can also check e-mail against a DNS black list (DNSBL) of IP addresses of servers
that are suspected of being used by spammers.
23.2 Anti-Spam Commands
The following table identifies the values used in some of these commands. Other input values
are discussed with the corresponding commands.
Table 114 Input Values for General Anti-Spam Commands
LABEL
DESCRIPTION
rule_number
The index number of an anti-spam rule. 1 - X where X is the highest number of
anti-spam rules the ZyWALL model supports. See the ZyWALL’s User’s Guide
for details.
zone_object
The name of the zone. The ZyWALL USG 100 and 200 models use pre-defined
zone names like DMZ, LAN1, SSL VPN, WLAN, IPSec VPN, OPT, and WAN.
23.2.1 General Anti-Spam Commands
The following table describes general anti-spam commands. You must use the configure
terminal command to enter the configuration mode before you can use these commands.
Table 115 General Anti-Spam Commands
COMMAND
DESCRIPTION
[no] anti-spam activate
Enables or disables anti-spam service.
show anti-spam activation
Displays anti-spam service status.
ZyWALL (ZLD) CLI Reference Guide
215
Chapter 23 Anti-Spam
23.2.1.1 Activate/Deactivate Anti-Spam Example
This example shows how to activate and deactivate anti-spam on the ZyWALL.
Router# configure terminal
Router(config)# anti-spam activate
Router(config)# show anti-spam activation
anti-spam activation: yes
Router(config)# no anti-spam activate
Router(config)# show anti-spam activation
anti-spam activation: no
Router(config)#
23.2.2 Zone to Zone Anti-spam Rules
The following table describes the commands for configuring the zone to zone rules. You must
use the configure terminal command to enter the configuration mode before you can use
these commands.
Table 116 Commands for Zone to Zone Anti-Spam Rules
COMMAND
DESCRIPTION
anti-spam rule append
Enters the anti-spam sub-command mode to add a
direction specific rule.
anti-spam rule insert rule_number
Enters the anti-spam sub-command mode to add a
direction specific rule.
anti-spam rule rule_number
Enters the anti-spam sub-command mode to edit the
specified direction specific rule.
[no] activate
Turns a direction specific anti-spam rule on or off.
[no] log [alert]
Sets the ZyWALL to create a log (and optionally an alert)
when packets match this rule and are found to be spam.
The no command sets the ZyWALL not to create a log or
alert when packets match this rule.
[no] from-zone zone_object
Sets the zone on which the packets are received. The no
command removes the zone setting. This is equal to any,
so the rule applies to all packets the ZyWALL sends out.
[no] to-zone zone_object
Sets the zone to which the packets are sent. The no
command removes the zone setting. This is equal to any,
so the rule applies to all packets the ZyWALL sends out.
[no] scan {smtp | pop3}
Sets the protocols of traffic to scan for spam.
[no] match-action smtp {drop |
forward | forward-with-tag}
Sets the action to take when the ZyWALL detects a spam
SMTP e-mail. The file can be deleted, forwarded, or
forwarded with a spam tag.
[no] bypass {white-list | black-list
| dnsbl}
Bypassing has the ZyWALL not check files against your
configured white (allowed) list, black (spam) list, or DNSBL
servers list.
show
Displays the details of the anti-spam rule you are
configuring.
anti-spam rule move rule_number to
rule_number
Moves a direction specific anti-spam rule to the number
that you specified.
anti-spam rule delete rule_number
Removes a direction specific anti-spam rule.
show anti-spam rule [rule_number]
Displays the details of all the configured anti-spam rules or
a specific anti-spam rule.
216
ZyWALL (ZLD) CLI Reference Guide
Chapter 23 Anti-Spam
23.2.2.1 Zone to Zone Anti-spam Rule Example
This example shows how to configure (and display) a WAN to DMZ anti-spam rule to scan
POP3 and SMTP traffic. SMTP spam is forwarded. POP3 spam is marked with a spam tag.
The ZyWALL logs the event when an e-mail matches the DNSBL (see Section 23.2.4 on page
219 for more on DNSBL). The white and black lists are ignored.
Router(config)# anti-spam rule 1
Router(config-as-rule-1)# activate
Router(config-as-rule-1)# from-zone WAN
Router(config-as-rule-1)# to-zone DMZ
Router(config-as-rule-1)# scan smtp
Router(config-as-rule-1)# scan pop3
Router(config-as-rule-1)# match-action smtp forward
Router(config-as-rule-1)# match-action pop3 forward-with-tag
Router(config-as-rule-1)# log
Router(config-as-rule-1)# bypass white-list
Router(config-as-rule-1)# bypass black-list
Router(config-as-rule-1)# exit
Router(config)# show anti-spam rule 1
Anti-Spam Rule: 1
active: yes
log: log
from zone: WAN
to zone: DMZ
scan protocols:
smtp: yes
pop3: yes
match action:
smtp: forward
pop3: forward-with-tag
bypass white list: yes
bypass black list: yes
bypass dnsbl: no
23.2.3 White and Black Lists
The following table identifies values used in these commands. Other input values are
discussed with the corresponding commands.
Table 117 Input Values for White and Black list Anti-Spam Commands
LABEL
DESCRIPTION
mail_header
The name part of an e-mail header (the part that comes before the colon).
Use up to 63 ASCII characters.
For example, if you want the entry to check the “Received:” header for a
specific mail server’s domain, use “Received”.
mail_header_value
The value part of an e-mail header (the part that comes after the colon).
Use up to 63 ASCII characters.
For example, if you want the entry to check the “Received:” header for a
specific mail server’s domain, specify the mail server’s domain.
See Section 23.2.3.2 on page 219 for more details.
ZyWALL (ZLD) CLI Reference Guide
217
Chapter 23 Anti-Spam
Table 117 Input Values for White and Black list Anti-Spam Commands (continued)
LABEL
DESCRIPTION
rule_number
The index number of an anti-spam white or black list entry. 1 - X where X is
the highest number of entries the ZyWALL model supports. See the
ZyWALL’s User’s Guide for details.
subject
A keyword in the content of the e-mail Subject headers. Use up to 63 ASCII
characters. Spaces are not allowed, although you could substitute a
question mark (?). See Section 23.2.3.2 on page 219 for more details.
Use the white list to identify legitimate e-mail and the black list to identify spam e-mail. The
following table describes the commands for configuring the white list and black list. You must
use the configure terminal command to enter the configuration mode before you can use
these commands.
Table 118 Commands for Anti-spam White and Black Lists
COMMAND
DESCRIPTION
[no] anti-spam white-list activate
Turns the white list checking on or off. Turn on the white list
to forward e-mail that matches (an active) white list entry
without doing any more anti-spam checking on that
individual e-mail.
[no] anti-spam white-list [rule_number]
ip-address ip subnet_mask
{activate|deactivate}
Adds, edits, or removes a white list entry to check e-mail for
a specific source or relay IP address. Also turns the entry
on or off.
[no] anti-spam white-list [rule_number]
e-mail email {activate|deactivate}
Adds, edits, or removes a white list entry to check e-mail for
a specific source e-mail address or domain name. Also
turns the entry on or off.
[no] anti-spam white-list [rule_number]
mail-header mail-header mail-headervalue {activate|deactivate}
Adds, edits, or removes a white list entry to check e-mail for
specific header fields and values. Also turns the entry on or
off.
[no] anti-spam white-list [rule_number]
subject subject {activate|deactivate}
Adds, edits, or removes a white list entry to check e-mail for
specific content in the subject line. Also turns the entry on
or off.
[no] anti-spam black-list activate
Turns the black list checking on or off. Turn on the black list
to treat e-mail that matches (an active) black list entry as
spam.
[no] anti-spam black-list [rule_number]
ip-address ip subnet_mask
{activate|deactivate}
Adds, edits, or removes a black list entry to check e-mail for
a specific source or relay IP address. Also turns the entry
on or off.
[no] anti-spam black-list [rule_number]
e-mail email {activate|deactivate}
Adds, edits, or removes a black list entry to check e-mail for
a specific source e-mail address or domain name. Also
turns the entry on or off.
[no] anti-spam black-list [rule_number]
mail-header mail-header mail-headervalue {activate|deactivate}
Adds, edits, or removes a black list entry to check e-mail for
specific header fields and values. Also turns the entry on or
off.
[no] anti-spam black-list [rule_number]
subject subject {activate|deactivate}
Adds, edits, or removes a black list entry to check e-mail for
specific content in the subject line. Also turns the entry on
or off.
anti-spam tag black-list [tag]
Configures a message or label (up to 15 ASCII characters)
to add to the mail subject of e-mails that match an antispam black list entry.
show anti-spam white-list [status]
Displays the current anti-spam white list. Use status to
show the activation status only.
218
ZyWALL (ZLD) CLI Reference Guide
Chapter 23 Anti-Spam
Table 118 Commands for Anti-spam White and Black Lists (continued)
COMMAND
DESCRIPTION
show anti-spam black-list [status]
Displays the current anti-spam black list. Use status to
show the activation status only.
show anti-spam tag black-list
Show the configured anti-spam black list tag.
23.2.3.1 White and Black Lists Example
This example shows how to configure and enable a white list entries for e-mails with
“testwhite” in the subject, e-mails from whitelist@ourcompany.com, e-mails with the Date
header set to 2007, and e-mails from (or forwarded by) IP address 192.168.1.0 with subnet
255.255.255.0.
Router(config)# anti-spam white-list subject testwhite activate
Router(config)# anti-spam white-list e-mail whitelist@ourcompany.com
activate
Router(config)# anti-spam white-list mail-header Date 2007 activate
Router(config)# anti-spam white-list ip-address 192.168.1.0 255.255.255.0
activate
Router(config)# show anti-spam white-list
No.
Type
Status
Content
==========================================================================
1
subject
yes
testwhite
2
e-mail
yes
whitelist@ourcompany.com
3
mail-header yes
Date : 2007
4
ip-address yes
192.168.1.0 / 255.255.255.0
23.2.3.2 Regular Expressions in Black or White List Entries
The following applies for a black or white list entry based on an e-mail subject, e-mail address,
or e-mail header value.
• Use a question mark (?) to let a single character vary. For example, use “a?c” (without the
quotation marks) to specify abc, acc and so on.
• You can also use a wildcard (*). For example, if you configure *def.com, any e-mail
address that ends in def.com matches. So “mail.def.com” matches.
• The wildcard can be anywhere in the text string and you can use more than one wildcard.
You cannot use two wildcards side by side, there must be other characters between them.
• The ZyWALL checks the first header with the name you specified in the entry. So if the email has more than one “Received” header, the ZyWALL checks the first one.
23.2.4 DNSBL Anti-Spam Commands
This section describes the commands for checking the sender and relay IP addresses in e-mail
headers against DNS (Domain Name Service)-based spam Black Lists (DNSBLs). You must
use the configure terminal command to enter the configuration mode before you can use
these commands.
ZyWALL (ZLD) CLI Reference Guide
219
Chapter 23 Anti-Spam
The following table identifies the values required for many of these commands. Other input
values are discussed with the corresponding commands.
Table 119 Input Values for DNSBL Commands
LABEL
DESCRIPTION
dnsbl_domain
A domain that is maintaining a DNSBL. You may use 0-254 alphanumeric
characters, or dashes (-).
This table describes the DNSBL commands.
Table 120 DNSBL Commands
COMMAND
DESCRIPTION
[no] anti-spam dnsbl activate
Turns DNSBL checking on or off.
anti-spam dnsbl [1..5] domain
dnsbl_domain {activate|deactivate}
Adds or edits a DNSBL domain for checking e-mail header IP
addresses.
no anti-spam dnsbl domain dnsbl_domain
Removes the specified DNSBL domain.
anti-spam dnsbl query-timeout smtp
{drop | forward | forward-with-tag}
Sets how the ZyWALL handles SMTP mail (mail going to an
e-mail server) if the queries to the DNSBL domains time out.
anti-spam dnsbl query-timeout pop3
{forward | forward-with-tag}
Sets how the ZyWALL handles POP3 mail (mail coming to an
e-mail client) if the queries to the DNSBL domains time out.
anti-spam dnsbl max-query-ip [1..5]
Sets up to how many sender and relay server IP addresses in
the mail header to check against the DNSBL.
anti-spam dnsbl ip-check-order
{forward | backward}
Configures the order in which anti-spam checks e-mail
header IP addresses against the DNSBLs.
• forward checks the first N IP addresses. Checking starts
from the first IP address in the mail header. This is the IP
of the sender or the first server that forwarded the mail.
• backward checks the last N IP addresses. Checking
starts from the last IP address in the mail header. This is
the IP of the last server that forwarded the mail.
anti-spam tag {dnsbl | dnsbl-timeout}
[tag]
dnsbl configures the message or label to add to the
beginning of the mail subject of e-mails that have a sender or
relay IP address in the header that matches a blacklist
maintained by a DNSBL domain listed in the ZyWALL.
dnsbl-timeout configures the message or label to add to
the mail subject of e-mails that the ZyWALL forwards if
queries to the DNSBL domains time out.
Use up to 15 alphanumeric characters, underscores (_),
colons (:), or dashes (-).
show anti-spam dnsbl status
Displays the activation status of the anti-spam DNSBL
checking.
show anti-spam dnsbl domain
Displays the ZyWALL’s configured anti-spam DNSBL domain
entries.
show anti-spam dnsbl max-query-ip
Displays how many sender and relay server IP addresses in
the mail header anti-spam checks against the DNSBL.
show anti-spam dnsbl ip-check-order
Displays the order in which anti-spam checks e-mail header
IP addresses against the DNSBLs.
show anti-spam dnsbl query-timeout
{smtp | pop3}
Displays how the ZyWALL handles SMTP or POP3 mail if the
queries to the DNSBL domains time out.
220
ZyWALL (ZLD) CLI Reference Guide
Chapter 23 Anti-Spam
Table 120 DNSBL Commands
COMMAND
DESCRIPTION
show anti-spam tag {dnsbl | dnsbltimeout}
dnsbl displays the anti-spam tag for e-mails that have a
sender or relay IP address in the header that matches a
blacklist maintained by a DNSBL domain.
dnsbl-timeout displays the message or label to add to the
mail subject of e-mails that the ZyWALL forwards if queries to
the DNSBL domains time out.
show anti-spam dnsbl statistics
Displays anti-spam DNSBL statistics for each configured
DNSBL domain.
anti-spam dnsbl statistics flush
Clears the anti-spam DNSBL statistics for each configured
DNSBL domain.
anti-spam dnsbl query-timeout time
[1..10]
Sets how long the ZyWALL waits for a reply from the DNSBL
domains.
show anti-spam dnsbl query-timeout
time
Displays how long the ZyWALL waits for a reply from the
DNSBL domains.
23.2.4.1 DNSBL Example
This example:
• Sets the ZyWALL to use “DNSBL-example.com” as a DNSBL.
• Turns DNSBL checking on.
• Sets the ZyWALL to forward POP3 mail with a tag if the queries to the DNSBL domains
time out.
• Sets the ZyWALL to check up to 4 sender and relay server IP addresses in e-mail headers
against the DNSBL.
• Sets the ZyWALL to start DNSBL checking from the first IP address in the mail header.
• Sets the DNSBL tag to “DNSBL”.
• Sets the DNSBL timeout tag to “DNSBL-timeout”.
• Displays the DNSBL statistics.
ZyWALL (ZLD) CLI Reference Guide
221
Chapter 23 Anti-Spam
Router(config)# anti-spam dnsbl domain DNSBL-example.com activate
Router(config)# show anti-spam dnsbl domain
No.
Status
Domain
===========================================================================
1
yes
DNSBL-example.com
Router(config)# anti-spam dnsbl activate
Router(config)# show anti-spam dnsbl status
anti-spam dnsbl status: yes
Router(config)# anti-spam dnsbl query-timeout pop3 forward-with-tag
Router(config)# show anti-spam dnsbl query-timeout pop3
dnsbl query timeout action: forward-with-tag
Router(config)# anti-spam dnsbl max-query-ip 4
Router(config)# show anti-spam dnsbl max-query-ip
dnsbl max query ip: 4
Router(config)# anti-spam dnsbl ip-check-order forward
Router(config)# show anti-spam dnsbl ip-check-order
anti-spam dnsbl IP check order: forward
Router(config)# anti-spam tag dnsbl DNSBL
Router(config)# show anti-spam tag dnsbl
dnsbl tag: DNSBL
Router(config)# anti-spam tag dnsbl-timeout DNSBL-timeout
Router(config)# show anti-spam tag dnsbl-timeout
dnsbl-timeout tag: DNSBL-timeout
Router(config)# show anti-spam dnsbl statistics
DNSBL domain: 1
domain: DNSBL-example.com
average time: 0.00
total query: 0
spam: 0
clear: 0
no timeout: 0
timeout: 0
no response: 0
23.3 Anti-Spam Statistics
The following table describes the commands for collecting and displaying anti-spam statistics.
You must use the configure terminal command to enter the configuration mode before
you can use these commands.
Table 121 Commands for Anti-spam Statistics
COMMAND
DESCRIPTION
[no] anti-spam statistics collect
Turn the collection of anti-spam statistics on or off.
anti-spam statistics flush
Clears the collected statistics.
show anti-spam statistics summary
Displays an overview of the collected statistics.
222
ZyWALL (ZLD) CLI Reference Guide
Chapter 23 Anti-Spam
Table 121 Commands for Anti-spam Statistics (continued)
COMMAND
DESCRIPTION
show anti-spam statistics collect
Displays whether the collection of anti-spam statistics is
turned on or off.
show anti-spam statistics ranking
{source | mail-address}
Query and sort the anti-spam statistics entries by source IP
address or mail address.
source: lists the source IP addresses of the most spam.
mail-address: lists the most common source mail
address for spam.
23.3.1 Anti-Spam Statistics Example
This example shows how to collect anti-spam statistics and display a summary.
Router(config)# anti-spam statistics collect
Router(config)# show anti-spam statistics collect
collect statistics: yes
collect statistics time: since 2008-03-11 07:16:01 to 2008-03-11 07:16:13
Router(config)# show anti-spam statistics summary
total mails scanned: 0
total clear mails: 0
total spam mails: 0
spam detected by blacklist: 0
spam detected by dnsbl: 0
dnsbl timeout: 0
mail session forwarded: 0
mail session dropped: 0
ZyWALL (ZLD) CLI Reference Guide
223
Chapter 23 Anti-Spam
224
ZyWALL (ZLD) CLI Reference Guide
P ART VII
Device HA
Device HA (227)
225
226
CHAPTER
24
Device HA
Use device HA to increase network reliability. Device HA lets a backup ZyWALL (B)
automatically take over if a master ZyWALL (A) fails.
Figure 25 Device HA Backup Taking Over for the Master
A
B
24.1 Device HA Overview
Active-Passive Mode and Legacy Mode
• Active-passive mode lets a backup ZyWALL take over if the master ZyWALL fails.
• Legacy mode uses VRRP (Virtual Router Redundancy Protocol) groups and allows for
more complex relationships between the master and backup ZyWALLs, such as activeactive or using different ZyWALLs as the master ZyWALL for individual interfaces.
Legacy mode configuration involves a greater degree of complexity. Active-passive mode
is recommended for general failover deployments.
• The ZyWALLs must all support and be set to use the same device HA mode (either activepassive or legacy).
Management Access
You can configure a separate management IP address for each interface. You can use it to
access the ZyWALL for management whether the ZyWALL is the master or a backup. The
management IP address should be in the same subnet as the interface IP address.
Synchronization
Use synchronization to have a backup ZyWALL copy the master ZyWALL’s configuration,
signatures (anti-virus, IDP/application patrol, and system protect), and certificates.
ZyWALL (ZLD) CLI Reference Guide
227
Chapter 24 Device HA
"
Only ZyWALLs of the same model and firmware version can synchronize.
Otherwise you must manually configure the master ZyWALL’s settings on the backup (by
editing copies of the configuration files in a text editor for example).
24.1.1 Before You Begin
• Configure a static IP address for each interface that you will have device HA monitor.
"
Subscribe to services on the backup ZyWALL before synchronizing it with the
master ZyWALL.
• Synchronization includes updates for services to which the master and backup ZyWALLs
are both subscribed. For example, a backup subscribed to IDP/AppPatrol, but not antivirus, gets IDP/AppPatrol updates from the master, but not anti-virus updates. It is highly
recommended to subscribe the master and backup ZyWALLs to the same services.
24.2 General Device HA Commands
This table lists the general commands for device HA.
Table 122 device-ha General Commands
COMMAND
DESCRIPTION
show device-ha status
Displays whether or not device HA is activated, the
configured device HA mode, and the status of the
monitored interfaces.
[no] device-ha activate
Turns device HA on or off.
device-ha mode {active-passive | legacy}
Sets the ZyWALL to use active-passive or legacy
(VRRP group based) device HA.
24.3 Active-Passive Mode Device HA
Virtual Router
The master and backup ZyWALL form a single ‘virtual router’.
Cluster ID
You can have multiple ZyWALL virtual routers on your network. Use a different cluster ID to
identify each virtual router.
228
ZyWALL (ZLD) CLI Reference Guide
Chapter 24 Device HA
Monitored Interfaces in Active-Passive Mode Device HA
You can select which interfaces device HA monitors. If a monitored interface on the ZyWALL
loses its connection, device HA has the backup ZyWALL take over.
Enable monitoring for the same interfaces on the master and backup ZyWALLs. Each
monitored interface must have a static IP address and be connected to the same subnet as the
corresponding interface on the backup or master ZyWALL.
Virtual Router and Management IP Addresses
• If a backup takes over for the master, it uses the master’s IP addresses. These IP addresses
are know as the virtual router IP addresses.
• Each interface can also have a management IP address. You can connect to this IP address
to manage the ZyWALL regardless of whether it is the master or the backup.
24.4 Active-Passive Mode Device HA Commands
The following table identify the values required for many of these commands. Other input
values are discussed with the corresponding commands.
Table 123 Input Values for device-ha Commands
LABEL
DESCRIPTION
interface_name
The name of the interface. This depends on the ZyWALL model.
For the ZyWALL USG 300 and above, use gex, x = 1 ~ N, where N equals the
highest numbered Ethernet interface for your ZyWALL model.
For the ZyWALL USG 100 and 200 models, use a name such as wan1, wan2,
opt, lan1, ext-wlan, or dmz.
Besides, in HA AP mode, the interface can also be a bridge interface.
In HA Legancy mode, the interface can also be a VLAN interface.
The following sections list the device-ha commands.
24.4.1 Active-Passive Mode Device HA Commands
This table lists the commands for configuring active-passive mode device HA.
Table 124 device-ha ap-mode Commands
COMMAND
DESCRIPTION
[no] device-ha ap-mode preempt
Turn on preempt if this ZyWALL should become the
master ZyWALL if a lower-priority ZyWALL is the
master when this ZyWALL is enabled.
device-ha ap-mode role {master|backup}
Sets the ZyWALL to be the master or a backup in
the virtual router.
device-ha ap-mode cluster-id <1..32>
Sets the cluster ID number. A virtual router consists
of a master ZyWALL and all of its backup
ZyWALLs. If you have multiple ZyWALL virtual
routers on your network, use a different cluster ID
for each virtual router.
ZyWALL (ZLD) CLI Reference Guide
229
Chapter 24 Device HA
Table 124 device-ha ap-mode Commands (continued)
COMMAND
DESCRIPTION
device-ha ap-mode priority <1..254>
Sets backup ZyWALL’s priority. The backup
ZyWALL with the highest value takes over the role
of the master ZyWALL if the master ZyWALL
becomes unavailable. The priority must be
between 1 and 254. (The master interface has
priority 255.)
[no] device-ha ap-mode authentication {string
key | ah-md5 key}
Sets the authentication method the virtual router
uses. Every interface in a virtual router must use
the same authentication method and password.
The no command disables authentication.
string: Use a plain text password for
authentication. key - Use up to eight characters
including alphanumeric characters, the underscore,
and some punctuation marks (+-/*= :; .! @$&%#~ ‘
\ () ).
ah-md5: Use an encrypted MD5 password for
authentication. key - Use up to eight characters
including alphanumeric characters, the underscore,
and some punctuation marks (+-/*= :; .! @$&%#~ ‘
\ () ).
[no] device-ha ap-mode interface_name manageip ip subnet_mask
Sets the management IP address for an interface.
[no] device-ha ap-mode interface_name activate
Has device HA monitor the status of an interface’s
connection.
[no] device-ha ap-mode master sync
authentication password password
This is for a master ZyWALL. It specifies the
password to require from synchronizing backup
ZyWALLs. Every router in the virtual router must
use the same password. The no command sets
the password setting to blank (which means no
backups can synchronize with this master).
password: Use 4-63 alphanumeric characters,
underscores (_), dashes (-), and #%^*={}:,.~
characters.
[no] device-ha ap-mode backup sync
authentication password password
Sets the password the backup ZyWALL uses when
synchronizing with the master. The no command
sets the password setting to blank (which means
this backup ZyWALL cannot synchronize with the
master).
password: Use 4-63 alphanumeric characters,
underscores (_), dashes (-), and #%^*={}:,.~
characters.
[no] device-ha ap-mode backup sync auto
Turns on automatic synchronization according to
the interval you specify in device-ha ap-mode
backup sync interval. The first
synchronization begins after the specified interval
(not immediately).
[no] device-ha ap-mode backup sync interval
<1..1440>
When you use automatic synchronization, this sets
how often (in minutes) the ZyWALL synchronizes
with the master.
[no] device-ha ap-mode backup sync from
master_address port port
Sets the address of the master ZyWALL with which
this backup ZyWALL is to synchronize.
master_address: The master ZyWALL’s IP
address or fully-qualified domain name (FQDN).
port: The master ZyWALL’s FTP port number.
230
ZyWALL (ZLD) CLI Reference Guide
Chapter 24 Device HA
Table 124 device-ha ap-mode Commands (continued)
COMMAND
DESCRIPTION
device-ha ap-mode backup sync now
Synchronize now.
show device-ha ap-mode interfaces
Displays the device HA AP mode interface settings
and status.
show device-ha ap-mode next-sync-time
Displays the next time and date (in hh:mm yyyymm-dd format) the ZyWALL will synchronize with
the master.
show device-ha ap-mode status
Displays the ZyWALL’s key device HA settings.
show device-ha ap-mode master sync
Displays the master ZyWALL’s synchronization
settings.
show device-ha ap-mode backup sync
Displays the backup ZyWALL’s synchronization
settings.
show device-ha ap-mode backup sync status
Displays the backup ZyWALL’s current
synchronization status.
show device-ha ap-mode backup sync summary
Displays the backup ZyWALL’s synchronization
settings.
show device-ha ap-mode forwarding-port
interface_name
If you apply Device HA on a bridge interface on a
backup ZyWALL, you can use this command to see
which port in the bridge interface is chosen to
receive VRRP packets used to monitor if the
master ZyWALL goes down.
interface_name: This is a bridge interface, For
example, brx.
24.4.2 Active-Passive Mode Device HA Command Example
This example configures a ZyWALL to be a master ZyWALL for active-passive mode device
HA. There is a management IP address of 192.168.1.3 on lan1. wan1 and lan1 are monitored.
The synchronization password is set to “mySyncPassword”.
Router(config)#
Router(config)#
Router(config)#
mySyncPassword
Router(config)#
Router(config)#
Router(config)#
device-ha ap-mode lan1 manage-ip 192.168.1.3 255.255.255.0
device-ha ap-mode role master
device-ha ap-mode master sync authentication password
device-ha ap-mode wan1 activate
device-ha ap-mode lan1 activate
device-ha activate
24.5 Legacy Mode (VRRP) Device HA
This section covers device HA using VRRP, VRRP groups, and synchronization.
Virtual Router Redundancy Protocol (VRRP) Overview
Every computer on a network may send packets to a default gateway, which can become a
single point of failure. Virtual Router Redundancy Protocol (VRRP), allows you to create
redundant backup gateways to ensure that the default gateway is always available. The
ZyWALL uses a custom VRRP implementation and is not compatible with standard VRRP.
ZyWALL (ZLD) CLI Reference Guide
231
Chapter 24 Device HA
VRRP Group Overview
In the ZyWALL, you should create a VRRP group to add one of its interfaces to a virtual
router. You can add any Ethernet interface, VLAN interface, or virtual interface (created on
top of Ethernet interfaces or VLAN interfaces) with a static IP address. You can only enable
one VRRP group for each interface, and you can only have one active VRRP group for each
virtual router.
24.6 Legacy Mode (VRRP) Device HA Commands
The following table identify the values required for many device-ha commands. Other input
values are discussed with the corresponding commands.
Table 125 Input Values for device-ha Commands
LABEL
DESCRIPTION
vrrp_group_name
The name of the VRRP group. The name can consist of alphanumeric
characters, the underscore, and the dash and may be up to fifteen
alphanumeric characters long.
The following sections list the device-ha commands.
24.6.1 VRRP Group Commands
This table lists the commands for VRRP groups.
Table 126 device-ha Commands: VRRP Groups
COMMAND
DESCRIPTION
show device-ha vrrp-group
Displays information about all VRRP groups.
[no] device-ha vrrp-group vrrp_group_name
Creates the specified VRRP group if necessary
and enters sub-command mode. The no command
deletes the specified VRRP group.
232
[no] vrid <1..254>
Sets the specified VRRP group’s ID to the specified
VR ID. The no command clears the VR ID.
[no] interface interface_name
Specifies the interface that is part of the specified
VRRP group. The no command removes the
specified interface from the specified VRRP group.
[no] role {master | backup}
Specifies the role of the specified VRRP group in
the virtual router. The no command clears the role,
which makes the configuration incomplete.
[no] priority <1..254>
Sets the priority of the specified VRRP group in the
virtual router. The no command resets the priority
to 100.
[no] preempt
Lets the ZyWALL preempt lower-priority routers in
the virtual router. The no command prevents the
ZyWALL from preempting lower-priority routers.
[no] manage-ip IP
Specifies the IP address of the specified VRRP
group when it is not the master. The no command
clears the IP address.
ZyWALL (ZLD) CLI Reference Guide
Chapter 24 Device HA
Table 126 device-ha Commands: VRRP Groups (continued)
COMMAND
DESCRIPTION
[no] authentication {string password | ahmd5 password}
Specifies the authentication method and password
for the specified VRRP group. The no command
means that the specified VRRP group does not use
authentication.
password: You may use alphanumeric characters,
the underscore, and some punctuation marks (+-/
*= :; .! @$&%#~ ‘ \ () ), and it can be up to eight
characters long.
[no] description description
Specifies the description for the specified VRRP
group. The no command clears the description.
description: You can use alphanumeric and
()+/:=?!*#@$_%- characters, and it can be up
to 60 characters long.
[no] activate
Turns on the specified VRRP group. The no
command turns off the VRRP group.
24.6.2 VRRP Synchronization Commands
This table lists the commands for synchronization. You can synchronize with other ZyWALL’s
of the same model that are running the same firmware version.
Table 127 device-ha Commands: Synchronization
COMMAND
DESCRIPTION
show device-ha sync
Displays the current settings for synchronization.
show device-ha sync backup next-sync-time
Displays the next time and date (in hh:mm yyyymm-dd format) the ZyWALL will synchronize with
the master.
show device-ha sync status
Displays the current status of synchronization.
[no] device-ha sync from {hostname | ip}
Specifies the fully-qualified domain name (FQDN)
or IP address of the ZyWALL router. Usually, this is
the IP address or FQDN of the virtual router. The
no command clears this field.
hostname: You may up to 254 alphanumeric
characters, dashes (-), or periods (.), but the first
character cannot be a period.
[no] device-ha sync port <1..65535>
Specifies the port number to use to synchronize
with the specified ZyWALL router. The no
command resets the port to 21.
[no] device-ha sync authentication password
password
Specifies the password to use when synchronizing.
Every router in the virtual router should use the
same password. The no command resets the
password to “1234”.
password: You can use 4-63 alphanumeric
characters, underscores (_), dashes (-), and
#%^*={}:,.~ characters.
[no] device-ha sync auto
Specifies whether or not to automatically
synchronize at regular intervals.
ZyWALL (ZLD) CLI Reference Guide
233
Chapter 24 Device HA
Table 127 device-ha Commands: Synchronization (continued)
COMMAND
DESCRIPTION
[no] device-ha sync interval <5..1440>
Specifies the number of minutes between each
synchronization if the ZyWALL automatically
synchronizes with the specified ZyWALL router.
The no command resets the interval to five
minutes.
[no] device-ha sync now
Synchronize now.
24.6.3 Link Monitoring Commands
This table lists the commands for link monitoring. Link monitoring has the master ZyWALL
shut down all of its VRRP interfaces if one of its VRRP interface links goes down. This way
the backup ZyWALL takes over all of the master ZyWALL’s functions.
Table 128 device-ha Commands: Synchronization
COMMAND
DESCRIPTION
device-ha link-monitoring activate
Turns on device HA link monitoring.
no device-ha link-monitoring
Turns off device HA link monitoring.
show device-ha link-monitoring
Displays the current link monitoring setting.
device-ha stop-stub-interface activate
Has the master ZyWALL shut down any 3G or
wireless LAN interfaces if one of its VRRP interface
links goes down.
no device-ha stop-stub-interface
Has the master ZyWALL not shut down any 3G or
wireless LAN interfaces if one of its VRRP interface
links goes down.
show device-ha stop-stub-interface
Displays whether or not the ZyWALL is set to have
the master ZyWALL shut down any 3G or wireless
LAN interfaces if one of its VRRP interface links
goes down.
234
ZyWALL (ZLD) CLI Reference Guide
P ART VIII
Objects
User/Group (237)
Addresses (245)
Services (249)
Schedules (253)
AAA Server (255)
Authentication Objects (263)
Certificates (267)
ISP Accounts (273)
SSL Application (277)
Endpoint Security (281)
235
236
CHAPTER
25
User/Group
This chapter describes how to set up user accounts, user groups, and user settings for the
ZyWALL. You can also set up rules that control when users have to log in to the ZyWALL
before the ZyWALL routes traffic for them.
25.1 User Account Overview
A user account defines the privileges of a user logged into the ZyWALL. User accounts are
used in firewall rules and application patrol, in addition to controlling access to configuration
and services in the ZyWALL.
25.1.1 User Types
There are the types of user accounts the ZyWALL uses.
Table 129 Types of User Accounts
TYPE
ABILITIES
LOGIN METHOD(S)
Admin
Change ZyWALL configuration (web, CLI)
WWW, TELNET, SSH, FTP
Limited-Admin
Look at ZyWALL configuration (web, CLI)
Perform basic diagnostics (CLI)
WWW, TELNET, SSH
User
Access network services
Browse user-mode commands (CLI)
WWW, TELNET, SSH
Guest
Access network services
WWW
Ext-User
See Section 25.2 on page 238.
WWW
Admin Users
Access Users
"
The default admin account is always authenticated locally, regardless of the
authentication method setting. (See Chapter 30 on page 263 for more
information about authentication methods.)
ZyWALL (ZLD) CLI Reference Guide
237
Chapter 25 User/Group
25.2 User/Group Commands Summary
The following table identify the values required for many username/groupname commands.
Other input values are discussed with the corresponding commands.
Table 130 username/groupname Command Input Values
LABEL
DESCRIPTION
username
The name of the user (account). You may use 1-31 alphanumeric characters,
underscores(_), or dashes (-), but the first character cannot be a number. This
value is case-sensitive.
groupname
The name of the user group. You may use 1-31 alphanumeric characters,
underscores(_), or dashes (-), but the first character cannot be a number. This
value is case-sensitive. It cannot be the same as the user name.
The following sections list the username/groupname commands.
25.2.1 User Commands
The first table lists the commands for users.
Table 131 username/groupname Commands Summary: Users
COMMAND
DESCRIPTION
show username [username]
Displays information about the specified user or
about all users set up in the ZyWALL.
username username nopassword user-type {admin
| guest | limited-admin | user}
Creates the specified user (if necessary), disables
the password, and sets the user type for the
specified user.
username username password password user-type
{admin | guest | limited-admin | user}
Creates the specified user (if necessary); enables
and sets the password; and sets the user type for
the specified user.
password: You can use 1-63 printable ASCII
characters, except double quotation marks (“) and
question marks (?).
username username user-type ext-user
Creates the specified user (if necessary) and sets
the user type to Ext-User.
no username username
Deletes the specified user.
username rename username username
Renames the specified user (first username) to
the specified username (second username).
username username [no] description description
Sets the description for the specified user. The no
command clears the description.
description: You can use alphanumeric and
()+/:=?!*#@$_%- characters, and it can be up
to 60 characters long.
username username [no] logon-time-setting
<default | manual>
Sets the account to use the factory default lease
and reauthentication times or custom ones.
238
ZyWALL (ZLD) CLI Reference Guide
Chapter 25 User/Group
Table 131 username/groupname Commands Summary: Users (continued)
COMMAND
DESCRIPTION
username username [no] logon-lease-time
<0..1440>
Sets the lease time for the specified user. Set it to
zero to set unlimited lease time. The no command
sets the lease time to five minutes (regardless of
the current default setting for new users).
username username [no] logon-re-auth-time
<0..1440>
Sets the reauthorization time for the specified user.
Set it to zero to set unlimited reauthorization time.
The no command sets the reauthorization time to
thirty minutes (regardless of the current default
setting for new users).
25.2.2 User Group Commands
This table lists the commands for groups.
Table 132 username/groupname Commands Summary: Groups
COMMAND
DESCRIPTION
show groupname [groupname]
Displays information about the specified user group
or about all user groups set up in the ZyWALL.
[no] groupname groupname
Creates the specified user group if necessary and
enters sub-command mode. The no command
deletes the specified user group.
[no] description description
Sets the description for the specified user group.
The no command clears the description for the
specified user group.
[no] groupname groupname
Adds the specified user group (second
groupname) to the specified user group (first
groupname).
[no] user username
Adds the specified user to the specified user group.
show
Displays information about the specified user
group.
groupname rename groupname groupname
Renames the specified user group (first
groupname) to the specified group-name (second
groupname).
25.2.3 User Setting Commands
This table lists the commands for user settings, except for forcing user authentication.
Table 133 username/groupname Commands Summary: Settings
COMMAND
DESCRIPTION
show users default-setting {all | user-type
{admin|user|guest|limited-admin|ext-user}}
Displays the default lease and reauthentication
times for the specified type of user accounts.
users default-setting [no] logon-lease-time
<0..1440>
Sets the default lease time (in minutes) for each
new user. Set it to zero to set unlimited lease time.
The no command sets the default lease time to
five.
users default-setting [no] logon-re-auth-time
<0..1440>
Sets the default reauthorization time (in minutes)
for each new user. Set it to zero to set unlimited
reauthorization time. The no command sets the
default reauthorization time to thirty.
ZyWALL (ZLD) CLI Reference Guide
239
Chapter 25 User/Group
Table 133 username/groupname Commands Summary: Settings (continued)
COMMAND
DESCRIPTION
users default-setting [no] user-type <admin
|ext-user|guest|limited-admin|user>
Sets the default user type for each new user. The
no command sets the default user type to user.
show users retry-settings
Displays the current retry limit settings for users.
[no] users retry-limit
Enables the retry limit for users. The no command
disables the retry limit.
[no] users retry-count <1..99>
Sets the number of failed login attempts a user can
have before the account or IP address is locked out
for lockout-period minutes. The no command sets
the retry-count to five.
[no] users lockout-period <1..65535>
Sets the amount of time, in minutes, a user or IP
address is locked out after retry-count number of
failed login attempts. The no command sets the
lockout period to thirty minutes.
show users simultaneous-logon-settings
Displays the current settings for simultaneous
logins by users.
[no] users simultaneous-logon {administration
| access} enforce
Enables the limit on the number of simultaneous
logins by users of the specified account-type. The
no command disables the limit, or allows an
unlimited number of simultaneous logins.
[no] users simultaneous-logon {administration
| access} limit <1..1024>
Sets the limit for the number of simultaneous logins
by users of the specified account-type. The no
command sets the limit to one.
show users update-lease-settings
Displays whether or not access users can
automatically renew their lease time.
[no] users update-lease automation
Lets users automatically renew their lease time.
The no command prevents them from
automatically renewing it.
show users idle-detection-settings
Displays whether or not users are automatically
logged out, and, if so, how many minutes of idle
time must pass before they are logged out.
[no] users idle-detection
Enables logging users out after a specified number
of minutes of idle time. The no command disables
logging them out.
[no] users idle-detection timeout <1..60>
Sets the number of minutes of idle time before
users are automatically logged out. The no
command sets the idle-detection timeout to three
minutes.
25.2.3.1 User Setting Command Examples
The following commands show the current settings for the number of simultaneous logins.
Router# configure terminal
Router(config)# show users simultaneous-logon-settings
enable simultaneous logon limitation for administration account: yes
maximum simultaneous logon per administration account
: 1
enable simultaneous logon limitation for access account
: yes
maximum simultaneous logon per access account
: 3
240
ZyWALL (ZLD) CLI Reference Guide
Chapter 25 User/Group
25.2.4 Force User Authentication Commands
This table lists the commands for forcing user authentication.
Table 134 username/groupname Commands Summary: Forcing User Authentication
COMMAND
DESCRIPTION
[no] force-auth activate
Enables force user authentication that force users
to log in to the ZyWALL before the ZyWALL routes
traffic for them. The no command means the user
authentication is not required.
force-auth default-rule authentication
{required | unnecessary} {no log | log
[alert]}
Sets the default authentication policy that the
ZyWALL uses on traffic that does not match any
exceptional service or other authentication policy.
required: Users need to be authenticated. They
must manually go to the ZyWALL’s login screen.
The ZyWALL will not redirect them to the login
screen.
unnecessary: Users do not need to be
authenticated.
no log | log [alert]: Select whether to have
the ZyWALL generate a log (log), log and alert
(log alert) or not (no log) for packets that
match this default policy.
force-auth [no] exceptional-service
service_name
Sets a service which you want users to be able to
access without user authentication. The no
command removes the specified service from the
exceptional list.
force-auth policy <1..1024>
Creates the specified condition for forcing user
authentication, if necessary, and enters subcommand mode. The conditions are checked in
sequence, starting at 1. See Table 135 on page
242 for the sub-commands.
force-auth policy append
Creates a new condition for forcing user
authentication at the end of the current list and
enters sub-command mode. See Table 135 on
page 242 for the sub-commands.
force-auth policy insert <1..1024>
Creates a new condition for forcing user
authentication at the specified location, renumbers
the other conditions accordingly, and enters subcommand mode. See Table 135 on page 242 for
the sub-commands.
force-auth policy delete <1..1024>
Deletes the specified condition.
To modify a condition, you can insert a new
condition (N) and then delete the one (N+1) that
you want to modify.
force-auth policy flush
Deletes every condition.
force-auth policy move <1..1024> to <1..1024>
Moves the specified condition to the specified
location and renumbers the other conditions
accordingly.
show force-auth activation
Displays whether forcing user authentication is
enabled or not.
show force-auth exceptional-service
Displays services that users can access without
user authentication.
show force-auth policy {<1..1024> | all}
Displays details about the policies for forcing user
authentication.
ZyWALL (ZLD) CLI Reference Guide
241
Chapter 25 User/Group
25.2.4.1 force-auth Sub-commands
The following table describes the sub-commands for several force-auth policy commands.
Note that not all rule commands use all the sub-commands listed here.
Table 135 force-auth policy Sub-commands
COMMAND
DESCRIPTION
[no] activate
Activates the specified condition. The no
command deactivates the specified condition.
[no] authentication {force | required}
Select the authentication requirement for users
when their traffic matches this policy. The no
command means user authentication is not
required.
force: Users need to be authenticated and the
ZyWALL automatically display the login screen
when users who have not logged in yet try to send
HTTP traffic.
required: Users need to be authenticated. They
must manually go to the login screen. The ZyWALL
will not redirect them to the login screen.
[no] description description
Sets the description for the specified condition. The
no command clears the description.
description: You can use alphanumeric and
()+/:=?!*#@$_%- characters, and it can be up
to 60 characters long.
242
[no] destination {address_object |
group_name}
Sets the destination criteria for the specified
condition. The no command removes the
destination criteria, making the condition effective
for all destinations.
[no] eps <1..8> eps_object_name
Associates the specified End Point Security (EPS)
object with the specified condition. The ZyWALL
checks authenticated users’ computers against the
condition’s endpoint security objects in the order of
1 to 8. You have to configure order 1 and then the
others if any. The no command means to
deassociate the specified EPS rule with the
condition.
To apply EPS for this condition, you have to also
make sure you enable EPS and set authentication
to either required or force for this condition.
[no] eps activate
Enables EPS for the specified condition. The no
command means to disable EPS for the condition.
eps insert <1..8> eps_object_name
Inserts the specified EPS object for the condition.
The number determines the order that this EPS
rule is executed in the condition.
eps move <1..8> to <1..8>
Changes an endpoint object’s position in the
execution order of the condition.
[no] eps periodical-check <1..1440>
Sets a number of minutes the ZyWALL has to
repeat the endpoint security check. The no
command means that the ZyWALL only perform
the endpoint security check when users log in to
the ZyWALL.
[no] force
Forces users to log in to the ZyWALL if the
specified condition is satisfied. The no command
means that users do not log in to the ZyWALL.
ZyWALL (ZLD) CLI Reference Guide
Chapter 25 User/Group
Table 135 force-auth policy Sub-commands (continued)
COMMAND
DESCRIPTION
[no] schedule schedule_name
Sets the time criteria for the specified condition.
The no command removes the time criteria,
making the condition effective all the time.
[no] source {address_object | group_name}
Sets the source criteria for the specified condition.
The no command removes the source criteria,
making the condition effective for all sources.
show
Displays information about the specified condition.
25.2.4.2 Force Authentication Policy Insert Command Example
The following commands show how to insert a force authentication policy at position 1 of the
checking order. This policy applies endpoint secruity policies and uses the following settings:
•
•
•
•
•
•
•
•
Activate: yes
Description: EPS-on-LAN
Source: use address object “LAN1_SUBNET”
Destination: use address object “DMZ_Servers”
User Authentication: required
Schedule: no specified
Endpoint security: Activate
endpoint security object: use “EPS-WinXP” and “EPS-WinVista” for the first and second
checking EPS objects
Router# configure terminal
Router(config)# force-auth policy insert 1
Router(config-force-auth-1)# activate
Router(config-force-auth-1)# description EPS-on-LAN
Router(config-force-auth-1)# source LAN1_SUBNET
Router(config-force-auth-1)# destination DMZ_Servers
Router(config-force-auth-1)# authentication force
Router(config-force-auth-1)# no schedule
Router(config-force-auth-1)# eps activate
Router(config-force-auth-1)# eps 1 EPS-WinXP
Router(config-force-auth-1)# eps 2 EPS-WinVista
Router(config-force-auth-1)# exit
25.2.5 Additional User Commands
This table lists additional commands for users.
Table 136 username/groupname Commands Summary: Additional
COMMAND
DESCRIPTION
show users {username | all | current}
Displays information about the users logged onto
the system.
show lockout-users
Displays users who are currently locked out.
unlock lockout-users ip | console
Unlocks the specified IP address.
users force-logout ip | username
Logs out the specified logins.
ZyWALL (ZLD) CLI Reference Guide
243
Chapter 25 User/Group
25.2.5.1 Additional User Command Examples
The following commands display the users that are currently logged in to the ZyWALL and
forces the logout of all logins from a specific IP address.
Router# configure terminal
Router(config)# show users all
No. Name
Type
From
Service
Session Time
Idle Time
Lease Timeout
Re-Auth. Timeout
===========================================================================
1
admin
admin
192.168.1.34
http/https
00:33:27
unlimited
23:45:18
23:26:33
2
admin
admin
192.168.1.34
http/https
00:14:31
unlimited
23:48:38
23:45:29
3
admin
admin
172.23.23.83
http/https
00:04:07
unlimited
23:58:32
23:55:53
4
admin
admin
172.23.23.83
telnet
00:03:30
unlimited
23:59:59
23:56:30
Router(config)# users force-logout 192.168.1.34
Logout user 'admin'(from 192.168.1.34): OK
Logout user 'admin'(from 192.168.1.34): OK
Total 2 users have been forced logout
Router(config)# show users all
No. Name
Type
From
Service
Session Time
Idle Time
Lease Timeout
Re-Auth. Timeout
===========================================================================
1
admin
admin
172.23.23.83
http/https
00:04:31
unlimited
23:58:08
23:55:29
2
admin
admin
172.23.23.83
telnet
00:03:54
unlimited
24:00:00
23:56:06
The following commands display the users that are currently locked out and then unlocks the
user who is displayed.
Router# configure terminal
Router(config)# show lockout-users
No. Username Tried
From
Lockout Time Remaining
===========================================================================
No. From
Failed Login Attempt
Record Expired Timer
===========================================================================
1
172.23.23.60
2
46
Router(config)# unlock lockout-users 172.23.23.60
User from 172.23.23.60 is unlocked
Router(config)# show lockout-users
No. Username Tried
From
Lockout Time Remaining
===========================================================================
No. From
Failed Login Attempt
Record Expired Timer
===========================================================================
244
ZyWALL (ZLD) CLI Reference Guide
CHAPTER
26
Addresses
This chapter describes how to set up addresses and address groups for the ZyWALL.
26.1 Address Overview
Address objects can represent a single IP address or a range of IP addresses. Address groups
are composed of address objects and other address groups.
You can create IP address objects based on an interface’s IP address, subnet, or gateway. The
ZyWALL automatically updates these objects whenever the interface’s IP address settings
change. This way every rule or setting that uses the object uses the updated IP address settings.
For example, if you change the LAN1 interface’s IP address, the ZyWALL automatically
updates the corresponding interface-based, LAN1 subnet address object. So any configuration
that uses the LAN1 subnet address object is also updated.
Address objects and address groups are used in dynamic routes, firewall rules, application
patrol, content filtering, and VPN connection policies. For example, addresses are used to
specify where content restrictions apply in content filtering. Please see the respective sections
for more information about how address objects and address groups are used in each one.
Address groups are composed of address objects and address groups. The sequence of
members in the address group is not important.
26.2 Address Commands Summary
The following table describes the values required for many address object and address group
commands. Other values are discussed with the corresponding commands.
Table 137 Input Values for Address Commands
LABEL
DESCRIPTION
object_name
The name of the address. You may use 1-31 alphanumeric characters,
underscores(_), or dashes (-), but the first character cannot be a number. This
value is case-sensitive.
group_name
The name of the address group. You may use 1-31 alphanumeric characters,
underscores(_), or dashes (-), but the first character cannot be a number. This
value is case-sensitive.
interface_name
The name of the interface. This depends on the ZyWALL model.
For the USG 300 and above, use gex, x = 1 ~ N, where N equals the highest
numbered Ethernet interface for your ZyWALL model.
For the ZyWALL USG 100 and 200 models, use a name such as wan1, wan2,
opt, lan1, ext-wlan, or dmz.
ZyWALL (ZLD) CLI Reference Guide
245
Chapter 26 Addresses
The following sections list the address object and address group commands.
26.2.1 Address Object Commands
This table lists the commands for address objects.
Table 138 address-object Commands: Address Objects
COMMAND
DESCRIPTION
show address-object [object_name]
Displays information about the specified address or
all the addresses.
address-object object_name {ip | ip_range |
ip_subnet | interface-ip | interface-subnet |
interface-gateway} {interface}
Creates the specified address object using the
specified parameters.
ip_range: <1..255>.<0..255>.<0..255>.<1..255><1..255>.<0..255>.<0..255>.<1..255>
ip_subnet:
<1..255>.<0..255>.<0..255>.<0..255>/<1..32>
interface: You only need to specify an interface
with you create an object based on an interface.
no address-object object_name
Deletes the specified address.
address-object rename object_name object_name
Renames the specified address (first
object_name) to the second object_name.
26.2.1.1 Address Object Command Examples
The following example creates three address objects and then deletes one.
Router# configure terminal
Router(config)# address-object A0 192.168.1.1
Router(config)# address-object A1 192.168.1.1-192.168.1.20
Router(config)# address-object A2 192.168.1.0/24
Router(config)# show address-object
Object name
Type
Address
Ref.
=====================================================================
A0
HOST
192.168.1.1
0
A1
RANGE
192.168.1.1-192.168.1.20
0
A2
SUBNET 192.168.1.0/24
0
Router(config)# no address-object A2
Router(config)# show address-object
Object name
Type
Address
Ref.
=====================================================================
A0
HOST
192.168.1.1
0
A1
RANGE
192.168.1.1-192.168.1.20
0
246
ZyWALL (ZLD) CLI Reference Guide
Chapter 26 Addresses
26.2.2 Address Group Commands
This table lists the commands for address groups.
Table 139 object-group Commands: Address Groups
COMMAND
DESCRIPTION
show object-group address [group_name]
Displays information about the specified address
group or about all address groups.
[no] object-group address group_name
Creates the specified address group if necessary
and enters sub-command mode. The no command
deletes the specified address group.
[no] address-object object_name
Adds the specified address to the specified
address group. The no command removes the
specified address from the specified group.
[no] object-group group_name
Adds the specified address group (second
group_name) to the specified address group (first
group_name). The no command removes the
specified address group from the specified address
group.
[no] description description
Sets the description to the specified value. The no
command clears the description.
description: You can use alphanumeric and
()+/:=?!*#@$_%- characters, and it can be up
to 60 characters long.
Renames the specified address group from the first
group_name to the second group_name.
object-group address rename group_name
group_name
26.2.2.1 Address Group Command Examples
The following commands create three address objects A0, A1, and A2 and add A1 and A2 to
address group RD.
Router# configure terminal
Router(config)# address-object A0 192.168.1.1
Router(config)# address-object A1 192.168.1.2-192.168.2.20
Router(config)# address-object A2 192.168.3.0/24
Router(config)# object-group address RD
Router(group-address)# address-object A1
Router(group-address)# address-object A2
Router(group-address)# exit
Router(config)# show object-group address
Group name
Reference
Description
===========================================================================
TW_TEAM
5
RD
0
Router(config)# show object-group address RD
Object/Group name
Type
Reference
===========================================================================
A1
Object 1
A2
Object 1
ZyWALL (ZLD) CLI Reference Guide
247
Chapter 26 Addresses
248
ZyWALL (ZLD) CLI Reference Guide
CHAPTER
27
Services
Use service objects to define TCP applications, UDP applications, and ICMP messages. You
can also create service groups to refer to multiple service objects in other features.
27.1 Services Overview
See the appendices in the web configurator’s User Guide for a list of commonly-used services.
27.2 Services Commands Summary
The following table describes the values required for many service object and service group
commands. Other values are discussed with the corresponding commands.
Table 140 Input Values for Service Commands
LABEL
DESCRIPTION
group_name
The name of the service group. You may use 1-31 alphanumeric characters,
underscores(_), or dashes (-), but the first character cannot be a number. This
value is case-sensitive.
object_name
The name of the service. You may use 1-31 alphanumeric characters,
underscores(_), or dashes (-), but the first character cannot be a number. This
value is case-sensitive.
The following sections list the service object and service group commands.
27.2.1 Service Object Commands
The first table lists the commands for service objects.
Table 141 service-object Commands: Service Objects
COMMAND
DESCRIPTION
show service-object [object_name]
Displays information about the specified service or
about all the services.
no service-object object_name
Deletes the specified service.
service-object object_name {tcp | udp} {eq
<1..65535> | range <1..65535> <1..65535>}
Creates the specified TCP service or UDP service
using the specified parameters.
ZyWALL (ZLD) CLI Reference Guide
249
Chapter 27 Services
Table 141 service-object Commands: Service Objects (continued)
COMMAND
DESCRIPTION
service-object object_name icmp icmp_value
Creates the specified ICMP message using the
specified parameters.
icmp_value: <0..255> | alternate-address |
conversion-error | echo | echo-reply | informationreply | information-request | mask-reply | maskrequest | mobile-redirect | parameter-problem |
redirect | router-advertisement | router-solicitation |
source-quench | time-exceeded | timestamp-reply |
timestamp-request | unreachable
service-object object_name protocol <1..255>
Creates the specified user-defined service using
the specified parameters.
service-object rename object_name object_name
Renames the specified service from the first
object_name to the second object_name.
27.2.1.1 Service Object Command Examples
The following commands create four services, displays them, and then removes one of them.
Router# configure terminal
Router(config)# service-object TELNET tcp eq 23
Router(config)# service-object FTP tcp range 20 21
Router(config)# service-object ICMP_ECHO icmp echo
Router(config)# service-object MULTICAST protocol 2
Router(config)# show service-object
Object name
Protocol
Minmum port Maxmum port Ref.
=====================================================================TELNET
TCP
23
23
0
FTP
TCP
20
21
0
ICMP_ECHO
ICMP
0
0
0
MULTICAST
2
0
0
0
Router(config)# no service-object ICMP_ECHO
Router(config)# show service-object
Object name
Protocol
Minmum port Maxmum port Ref.
=====================================================================TELNET
TCP
23
23
0
FTP
TCP
20
21
0
MULTICAST
2
0
0
0
27.2.2 Service Group Commands
The first table lists the commands for service groups.
Table 142 object-group Commands: Service Groups
COMMAND
DESCRIPTION
show object-group service group_name
Displays information about the specified service
group.
[no] object-group service group_name
Creates the specified service group if necessary
and enters sub-command mode. The no command
removes the specified service group.
[no] service-object object_name
250
Adds the specified service to the specified service
group. The no command removes the specified
service from the specified group.
ZyWALL (ZLD) CLI Reference Guide
Chapter 27 Services
Table 142 object-group Commands: Service Groups (continued)
COMMAND
DESCRIPTION
[no] object-group group_name
Adds the specified service group (second
group_name) to the specified service group (first
group_name). The no command removes the
specified service group from the specified service
group.
[no] description description
Sets the description to the specified value. The no
command removes the description.
description: You can use alphanumeric and
()+/:=?!*#@$_%- characters, and it can be up
to 60 characters long.
object-group service rename group_name
group_name
Renames the specified service group from the first
group_name to the second group_name.
27.2.2.1 Service Group Command Examples
The following commands create service ICMP_ECHO, create service group SG1, and add
ICMP_ECHO to SG1.
Router# configure terminal
Router(config)# service-object ICMP_ECHO icmp echo
Router(config)# object-group service SG1
Router(group-service)# service-object ICMP_ECHO
Router(group-service)# exit
Router(config)# show service-object ICMP_ECHO
Object name
Protocol
Minmum port Maxmum port Ref.
===========================================================================
ICMP_ECHO
ICMP
8
8
1
Router(config)# show object-group service SG1
Object/Group name
Type
Reference
===========================================================================
ICMP_ECHO
Object 1
ZyWALL (ZLD) CLI Reference Guide
251
Chapter 27 Services
252
ZyWALL (ZLD) CLI Reference Guide
CHAPTER
28
Schedules
Use schedules to set up one-time and recurring schedules for policy routes, firewall rules,
application patrol, and content filtering.
28.1 Schedule Overview
The ZyWALL supports two types of schedules: one-time and recurring. One-time schedules
are effective only once, while recurring schedules usually repeat. Both types of schedules are
based on the current date and time in the ZyWALL.
"
Schedules are based on the current date and time in the ZyWALL.
One-time schedules begin on a specific start date and time and end on a specific stop date and
time. One-time schedules are useful for long holidays and vacation periods.
Recurring schedules begin at a specific start time and end at a specific stop time on selected
days of the week (Sunday, Monday, Tuesday, Wednesday, Thursday, Friday, and Saturday).
Recurring schedules always begin and end in the same day. Recurring schedules are useful for
defining the workday and off-work hours.
28.2 Schedule Commands Summary
The following table describes the values required for many schedule commands. Other values
are discussed with the corresponding commands.
Table 143 Input Values for Schedule Commands
LABEL
DESCRIPTION
object_name
The name of the schedule. You may use 1-31 alphanumeric characters,
underscores(_), or dashes (-), but the first character cannot be a number. This
value is case-sensitive.
time
24-hour time, hours and minutes; <0..23>:<0..59>.
ZyWALL (ZLD) CLI Reference Guide
253
Chapter 28 Schedules
The following table lists the schedule commands.
Table 144 schedule Commands
COMMAND
DESCRIPTION
show schedule-object
Displays information about the schedules in the
ZyWALL.
no schedule-object object_name
Deletes the schedule object.
schedule-object object_name date time date
time
Creates or updates a one-time schedule.
date: yyyy-mm-dd date format; yyyy-<01..12><01..31>
schedule-object object_name time time [day]
[day] [day] [day] [day] [day] [day]
Creates or updates a recurring schedule.
day: 3-character day of the week; sun | mon | tue |
wed | thu | fri | sat
28.2.1 Schedule Command Examples
The following commands create recurring schedule SCHEDULE1 and one-time schedule
SCHEDULE2 and then delete SCHEDULE1.
Router# configure terminal
Router(config)# schedule-object SCHEDULE1 11:00 12:00 mon tue wed thu fri
Router(config)# schedule-object SCHEDULE2 2006-07-29 11:00 2006-07-31 12:00
Router(config)# show schedule-object
Object name
Type
Start/End
Ref.
===========================================================================
SCHEDULE1
Recurring 11:00/12:00 ===MonTueWedThuFri=== 0
SCHEDULE2
Once
2006-07-29 11:00/2006-07-31 12:00 0
Router(config)# no schedule-object SCHEDULE1
Router(config)# show schedule-object
Object name
Type
Start/End
Ref.
===========================================================================
SCHEDULE2
Once
2006-07-29 11:00/2006-07-31 12:00 0
254
ZyWALL (ZLD) CLI Reference Guide
CHAPTER
29
AAA Server
This chapter introduces and shows you how to configure the ZyWALL to use external
authentication servers.
29.1 AAA Server Overview
You can use an AAA (Authentication, Authorization, Accounting) server to provide access
control to your network.
The following lists the types of authentication server the ZyWALL supports.
• Local user database
The ZyWALL uses the built-in local user database to authenticate administrative users
logging into the ZyWALL’s web configurator or network access users logging into the
network through the ZyWALL. You can also use the local user database to authenticate
VPN users.
• Directory Service (LDAP/AD)
LDAP (Lightweight Directory Access Protocol)/AD (Active Directory) is a directory
service that is both a directory and a protocol for controlling access to a network. The
directory consists of a database specialized for fast information retrieval and filtering
activities. You create and store user profile and login information on the external server.
• RADIUS
RADIUS (Remote Authentication Dial-In User Service) authentication is a popular
protocol used to authenticate users by means of an external or built-in RADIUS server.
RADIUS authentication allows you to validate a large number of users from a central
location.
29.2 Authentication Server Command Summary
This section describes the commands for authentication server settings.
ZyWALL (ZLD) CLI Reference Guide
255
Chapter 29 AAA Server
29.2.1 ad-server Commands
The following table lists the ad-server commands you use to set the default AD server.
Table 145 ad-server Commands
COMMAND
DESCRIPTION
show ad-server
Displays the default AD server settings.
[no] ad-server basedn basedn
Sets a base distinguished name (DN) for the default AD server. A
base DN identifies an AD directory. The no command clears this
setting.
[no] ad-server binddn binddn
Sets the user name the ZyWALL uses to log into the default AD
server. The no command clears this setting.
[no] ad-server cn-identifier uid
Sets the unique common name (cn) to identify a record. The no
command clears this setting.
[no] ad-server host ad_server
Sets the AD server address. Enter the IP address (in dotted decimal
notation) or the domain name. The no command clears this setting.
[no] ad-server password password
Sets the bind password. This password will be encrypted when you
use the show ad-server command to display. The no command
clears this setting.
ad-server password-encrypted
password
Sets the encrypted password (less than 32 alphanumerical
characters) in order to hide the real password from people behind you
when you are configuring AD server password. This password is
displayed as what you typed when you use the show ad-server
command.
[no] ad-server port port_no
Sets the AD port number. Enter a number between 1 and 65535. The
default is 389. The no command clears this setting.
[no] ad-server search-time-limit
time
Sets the search timeout period (in seconds). Enter a number between
1 and 300. The no command clears this setting.
[no] ad-server ssl
Enables the ZyWALL to establish a secure connection to the AD
server. The no command disables this feature.
29.2.2 ldap-server Commands
The following table lists the ldap-server commands you use to set the default LDAP
server.
Table 146 ldap-server Commands
COMMAND
DESCRIPTION
show ldap-server
Displays current LDAP server settings.
[no] ldap-server basedn basedn
Sets a base distinguished name (DN) for the default LDAP server. A
base DN identifies an LDAP directory. The no command clears this
setting.
[no] ldap-server binddn binddn
Sets the user name the ZyWALL uses to log into the default LDAP
server.
The no command clears this setting.
[no] ldap-server cn-identifier
uid
Sets the unique common name (cn) to identify a record.
The no command clears this setting.
[no] ldap-server host
ldap_server
Sets the LDAP server address. Enter the IP address (in dotted decimal
notation) or the domain name. The no command clears this setting.
[no] ldap-server password
password
Sets the bind password. The no command clears this setting.
256
ZyWALL (ZLD) CLI Reference Guide
Chapter 29 AAA Server
Table 146 ldap-server Commands (continued)
COMMAND
DESCRIPTION
[no] ldap-server port port_no
Sets the LDAP port number. Enter a number between 1 and 65535. The
default is 389. The no command clears this setting.
[no] ldap-server search-timelimit time
Sets the search timeout period (in seconds). Enter a number between 1
and 300. The no command clears this setting.
[no] ldap-server ssl
Enables the ZyWALL to establish a secure connection to the LDAP
server. The no command disables this feature.
29.2.3 radius-server Commands
The following table lists the radius-server commands you use to set the default RADIUS
server.
Table 147 radius-server Commands
COMMAND
DESCRIPTION
show radius-server
Displays the default RADIUS server settings.
[no] radius-server host
radius_server auth-port auth_port
Sets the RADIUS server address and service port
number. Enter the IP address (in dotted decimal
notation) or the domain name of a RADIUS server. The
no command clears the settings.
[no] radius-server key secret
Sets a password (up to 15 alphanumeric characters)
as the key to be shared between the RADIUS server
and the ZyWALL. The no command clears this setting.
[no] radius-server timeout time
Sets the search timeout period (in seconds). Enter a
number between 1 and 300. The no command clears
this setting.
29.2.4 radius-server Command Example
The following example sets the secret key and timeout period of the default RADIUS server
(172.23.10.100) to “87643210” and 80 seconds.
Router# configure terminal
Router(config)# radius-server host 172.23.10.100 auth-port 1812
Router(config)# radius-server key 876543210
Router(config)# radius-server timeout 80
Router(config)# show radius-server
host
: 172.23.10.100
authentication port: 1812
key
: 876543210
timeout
: 80
Router(config)#
ZyWALL (ZLD) CLI Reference Guide
257
Chapter 29 AAA Server
29.2.5 aaa group server ad Commands
The following table lists the aaa group server ad commands you use to configure a
group of AD servers.
Table 148 aaa group server ad Commands
COMMAND
DESCRIPTION
clear aaa group server ad [groupname]
Deletes all AD server groups or the specified AD
server group.
Note: You can NOT delete a server group
that is currently in use.
258
show aaa group server ad groupname
Displays the specified AD server group settings.
[no] aaa group server ad groupname
Sets a descriptive name for an AD server group. Use
this command to enter the sub-command mode.
The no command deletes the specified server group.
aaa group server ad rename groupname group-name
Changes the descriptive name for an AD server group.
aaa group server ad group-name
Enter the sub-command mode to configure an AD
server group.
[no] server alternative-cnidentifier uid
Sets the second type of identifier that the users can
use to log in if any. For example “name” or “e-mail
address”. The no command clears this setting.
[no] server basedn basedn
Sets the base DN to point to the AD directory on the
AD server group. The no command clears this setting.
[no] server binddn binddn
Sets the user name the ZyWALL uses to log into the
AD server group. The no command clears this setting.
[no] server cn-identifier uid
Sets the user name the ZyWALL uses to log into the
AD server group. The no command clears this setting.
[no] server description
description
Sets the descriptive information for the AD server
group. You can use up to 60 printable ASCII
characters. The no command clears the setting.
[no] server group-attribute
group-attribute
Sets the name of the attribute that the ZyWALL is to
check to determine to which group a user belongs. The
value for this attribute is called a group identifier; it
determines to which group a user belongs. You can
add ext-group-user user objects to identify groups
based on these group identifier values.
For example you could have an attribute named
“memberOf” with values like “sales”, “RD”, and
“management”. Then you could also create an extgroup-user user object for each group. One with
“sales” as the group identifier, another for “RD” and a
third for “management”. The no command clears the
setting.
[no] server host ad_server
Enter the IP address (in dotted decimal notation) or the
domain name of an AD server to add to this group. The
no command clears this setting.
[no] server password password
Sets the bind password (up to 15 alphanumerical
characters). The no command clears this setting.
ZyWALL (ZLD) CLI Reference Guide
Chapter 29 AAA Server
Table 148 aaa group server ad Commands (continued)
COMMAND
DESCRIPTION
[no] server port port_no
Sets the AD port number. Enter a number between 1
and 65535. The default is 389. The no command
clears this setting.
[no] server search-time-limit
time
Sets the search timeout period (in seconds). Enter a
number between 1 and 300. The no command clears
this setting and set this to the default setting of 5
seconds.
[no] server ssl
Enables the ZyWALL to establish a secure connection
to the AD server. The no command disables this
feature.
29.2.6 aaa group server ldap Commands
The following table lists the aaa group server ldap commands you use to configure a
group of LDAP servers.
Table 149 aaa group server ldap Commands
COMMAND
DESCRIPTION
clear aaa group server ldap
[group-name]
Deletes all LDAP server groups or the specified LDAP
server group.
Note: You can NOT delete a server group
that is currently in use.
show aaa group server ldap groupname
Displays the specified LDAP server group settings.
[no] aaa group server ldap groupname
Sets a descriptive name for an LDAP server group.
Use this command to enter the sub-command mode.
The no command deletes the specified server group.
aaa group server ldap rename
group-name group-name
Changes the descriptive name for an LDAP server
group.
aaa group server ldap group-name
Enter the sub-command mode.
[no] server alternative-cnidentifier uid
Sets the second type of identifier that the users can
use to log in if any. For example “name” or “e-mail
address”. The no command clears this setting.
[no] server basedn basedn
Sets the base DN to point to the LDAP directory on the
LDAP server group. The no command clears this
setting.
[no] server binddn binddn
Sets the user name the ZyWALL uses to log into the
LDAP server group. The no command clears this
setting.
[no] server cn-identifier uid
Sets the user name the ZyWALL uses to log into the
LDAP server group. The no command clears this
setting.
[no] server description
description
Sets the descriptive information for the LDAP server
group. You can use up to 60 printable ASCII
characters. The no command clears this setting.
ZyWALL (ZLD) CLI Reference Guide
259
Chapter 29 AAA Server
Table 149 aaa group server ldap Commands (continued)
COMMAND
DESCRIPTION
[no] server group-attribute
group-attribute
Sets the name of the attribute that the ZyWALL is to
check to determine to which group a user belongs. The
value for this attribute is called a group identifier; it
determines to which group a user belongs. You can
add ext-group-user user objects to identify groups
based on these group identifier values.
For example you could have an attribute named
“memberOf” with values like “sales”, “RD”, and
“management”. Then you could also create an extgroup-user user object for each group. One with
“sales” as the group identifier, another for “RD” and a
third for “management”. The no command clears the
setting.
[no] server host ldap_server
Enter the IP address (in dotted decimal notation) or the
domain name of an LDAP server to add to this group.
The no command clears this setting.
[no] server password password
Sets the bind password (up to 15 characters). The no
command clears this setting.
[no] server port port_no
Sets the LDAP port number. Enter a number between
1 and 65535. The default is 389. The no command
clears this setting.
[no] server search-time-limit
time
Sets the search timeout period (in seconds). Enter a
number between 1 and 300. The no command clears
this setting and set this to the default setting of 5
seconds.
[no] server ssl
Enables the ZyWALL to establish a secure connection
to the LDAP server. The no command disables this
feature.
29.2.7 aaa group server radius Commands
The following table lists the aaa group server radius commands you use to configure
a group of RADIUS servers.
Table 150 aaa group server radius Commands
COMMAND
DESCRIPTION
clear aaa group server radius
group-name
Deletes all RADIUS server groups or the specified
RADIUS server group.
Note: You can NOT delete a server group
that is currently in use.
show aaa group server radius
group-name
Displays the specified RADIUS server group settings.
[no] aaa group server radius
group-name
Sets a descriptive name for the RADIUS server group.
The no command deletes the specified server group.
aaa group server radius rename
{group-name-old} group-name-new
Sets the server group name.
aaa group server radius group-name Enter the sub-command mode.
[no] server description
description
260
Sets the descriptive information for the RADIUS server
group. You can use up to 60 printable ASCII
characters. The no command clears the setting.
ZyWALL (ZLD) CLI Reference Guide
Chapter 29 AAA Server
Table 150 aaa group server radius Commands (continued)
COMMAND
DESCRIPTION
[no] server group-attribute
<1-255>
Sets the value of an attribute that the ZyWALL is used
to determine to which group a user belongs.
This attribute’s value is called a group identifier. You
can add ext-group-user user objects to identify
groups based on different group identifier values.
For example, you could configure attributes 1,10 and
100 and create a ext-group-user user object for each
of them. The no command clears the setting.
[no] server host
radius_server
Enter the IP address (in dotted decimal notation) or the
domain name of a RADIUS server to add to this server
group. The no command clears this setting.
[no] server key secret
Sets a password (up to 15 alphanumeric characters)
as the key to be shared between the RADIUS
server(s) and the ZyWALL. The no command clears
this setting.
[no] server timeout time
Sets the search timeout period (in seconds). Enter a
number between 1 and 300. The no command clears
this setting and set this to the default setting of 5
seconds.
29.2.8 aaa group server Command Example
The following example creates a RADIUS server group with two members and sets the secret
key to “12345678” and the timeout to 100 seconds. Then this example also shows how to view
the RADIUS group settings.
Router# configure terminal
Router(config)# aaa group server radius RADIUSGroup1
Router(group-server-radius)# server host 192.168.1.100 auth-port 1812
Router(group-server-radius)# server host 172.23.22.100 auth-port 1812
Router(group-server-radius)# server key 12345678
Router(group-server-radius)# server timeout 100
Router(group-server-radius)# exit
Router(config)# show aaa group server radius RADIUSGroup1
key
: 12345678
timeout
: 100
description
:
group attribute
: 11
No.
Host Member
Auth. Port
==========================================================================
1
192.168.1.100
1812
2
172.23.22.100
ZyWALL (ZLD) CLI Reference Guide
1812
261
Chapter 29 AAA Server
262
ZyWALL (ZLD) CLI Reference Guide
CHAPTER
30
Authentication Objects
This chapter shows you how to select different authentication methods for user authentication
using the AAA servers or the internal user database.
30.1 Authentication Objects Overview
After you have created the AAA server objects, you can specify the authentication objects
(containing the AAA server information) that the ZyWALL uses to authenticate users (using
VPN or managing through HTTP/HTTPS).
30.2 aaa authentication Commands
The following table lists the aaa authentication commands you use to configure an
authentication profile.
Table 151 aaa authentication Commands
COMMAND
DESCRIPTION
aaa authentication rename
profile-name-old profilename-new
Changes the profile name.
profile-name: You may use 1-31 alphanumeric characters,
underscores(_), or dashes (-), but the first character cannot be a
number. This value is case-sensitive.
clear aaa authentication
profile-name
Deletes all authentication profiles or the specified authentication
profile.
Note: You can NOT delete a profile that is currently
in use.
show aaa authentication
{group-name|default}
Displays the specified authentication server profile settings.
[no] aaa authentication
profile-name
Sets a descriptive name for the authentication profile. The no
command deletes a profile.
ZyWALL (ZLD) CLI Reference Guide
263
Chapter 30 Authentication Objects
Table 151 aaa authentication Commands (continued)
COMMAND
DESCRIPTION
[no] aaa authentication
default member1 [member2]
[member3] [member4]
Sets the default profile to use the authentication method(s) in
the order specified.
member = group ad, group ldap, group radius, or local.
Note: You must specify at least one member for
each profile. Each type of member can only
be used once in a profile.
The no command clears the specified authentication method(s)
for the profile.
[no] aaa authentication
profile-name member1
[member2] [member3]
[member4]
Sets the profile to use the authentication method(s) in the order
specified.
member = group ad, group ldap, group radius, or local.
Note: You must specify at least one member for
each profile. Each type of member can only
be used once in a profile.
The no command clears the specified authentication method(s)
for the profile.
30.2.1 aaa authentication Command Example
The following example creates an authentication profile to authentication users using the
LDAP server group and then the local user database.
Router# configure terminal
Router(config)# aaa authentication LDAPuser group ldap local
Router(config)# show aaa authentication LDAPuser
No. Method
===========================================================================
0
ldap
1
local
Router(config)#
264
ZyWALL (ZLD) CLI Reference Guide
Chapter 30 Authentication Objects
30.3 test aaa Command
The following table lists the test aaa command you use to teat a user account on an
authentication server.
Table 152 test aaa Command
COMMAND
DESCRIPTION
test aaa {server|secureserver} {ad|ldap} host
{hostname|ipv4-address}
[host {hostname|ipv4address}] port <1..65535>
base-dn base-dn-string
[bind-dn bind-dn-string
password password] loginname-attribute attribute
[alternative-login-nameattribute attribute]
account account-name
Tests whether a user account exists on the specified
authentication server.
30.3.1 Test a User Account Command Example
The following example shows how to test whether a user account named userABC exists on
the AD authentication server which uses the following settings:
•
•
•
•
•
•
IP address: 172.16.50.1
Port: 389
Base-dn: DC=ZyXEL,DC=com
Bind-dn: zyxel\engineerABC
Password: abcdefg
Login-name-attribute: sAMAccountName
The result shows the account exists on the AD server. Otherwise, the ZyWALL responds an
error.
Router> test aaa server ad host 172.16.50.1 port 389 base-dn DC=ZyXEL,DC=com
bind-dn zyxel\engineerABC password abcdefg login-name-attribute
sAMAccountName account userABC
dn:: Q049MTIzNzco546L5aOr56uRKSxPVT1XaXRoTWFpbCxEQz1aeVhFTCxEQz1jb20=
objectClass: top
objectClass: person
objectClass: organizationalPerson
objectClass: user
cn:: MTIzNzco546L5aOr56uRKQ==
sn: User
l: 2341100
--------------------------SNIP!--------------------------------------------
ZyWALL (ZLD) CLI Reference Guide
265
Chapter 30 Authentication Objects
266
ZyWALL (ZLD) CLI Reference Guide
CHAPTER
31
Certificates
This chapter explains how to use the Certificates.
31.1 Certificates Overview
The ZyWALL can use certificates (also called digital IDs) to authenticate users. Certificates
are based on public-private key pairs. A certificate contains the certificate owner’s identity and
public key. Certificates provide a way to exchange public keys for use in authentication.
A Certification Authority (CA) issues certificates and guarantees the identity of each
certificate owner. There are commercial certification authorities like CyberTrust or VeriSign
and government certification authorities. You can use the ZyWALL to generate certification
requests that contain identifying information and public keys and then send the certification
requests to a certification authority.
31.2 Certificate Commands
This section describes the commands for configuring certificates.
31.3 Certificates Commands Input Values
The following table explains the values you can input with the certificate commands.
Table 153 Certificates Commands Input Values
LABEL
DESCRIPTION
certificate_name
The name of a certificate. You can use up to 31 alphanumeric and
;‘~!@#$%^&()_+[]{}’,.=- characters.
cn_address
A common name IP address identifies the certificate’s owner. Type the IP
address in dotted decimal notation.
cn_domain_name
A common name domain name identifies the certificate’s owner. The
domain name is for identification purposes only and can be any string.
The domain name can be up to 255 characters. You can use
alphanumeric characters, the hyphen and periods.
cn_email
A common name e-mail address identifies the certificate’s owner. The email address is for identification purposes only and can be any string.
The e-mail address can be up to 63 characters. You can use
alphanumeric characters, the hyphen, the @ symbol, periods and the
underscore.
ZyWALL (ZLD) CLI Reference Guide
267
Chapter 31 Certificates
Table 153 Certificates Commands Input Values (continued)
LABEL
DESCRIPTION
organizational_unit
Identify the organizational unit or department to which the certificate
owner belongs. You can use up to 31 characters. You can use
alphanumeric characters, the hyphen and the underscore.
organization
Identify the company or group to which the certificate owner belongs. You
can use up to 31 characters. You can use alphanumeric characters, the
hyphen and the underscore.
country
Identify the nation where the certificate owner is located. You can use up
to 31 characters. You can use alphanumeric characters, the hyphen and
the underscore.
key_length
Type a number to determine how many bits the key should use (512 to
2048). The longer the key, the more secure it is. A longer key also uses
more PKI storage space.
password
When you have the ZyWALL enroll for a certificate immediately online,
the certification authority may want you to include a key (password) to
identify your certification request. Use up to 31 of the following
characters. a-zA-Z0-9;|`~!@#$%^&*()_+\{}':,./<>=-
ca_name
When you have the ZyWALL enroll for a certificate immediately online,
you must have the certification authority’s certificate already imported as
a trusted certificate. Specify the name of the certification authority’s
certificate. It can be up to 31 alphanumeric and ;‘~!@#$%^&()_+[]{}’,.=characters.
url
When you have the ZyWALL enroll for a certificate immediately online,
enter the IP address (or URL) of the certification authority server. You can
use up to 511 of the following characters. a-zA-Z0-9'()+,/:.=?;!*#@$_%-
31.4 Certificates Commands Summary
The following table lists the commands that you can use to display and manage the ZyWALL’s
summary list of certificates and certification requests. You can also create certificates or
certification requests. Use the configure terminal command to enter the configuration
mode to be able to use these commands.
Table 154 ca Commands Summary
COMMAND
DESCRIPTION
ca enroll cmp name certificate_name cn-type
{ip cn cn_address|fqdn cn cn_domain_name|mail
cn cn_email} [ou organizational_unit] [o
organization] [c country] key-type {rsa|dsa}
key-len key_length num <0..99999999> password
password ca ca_name url url;
Enrolls a certificate with a CA using Certificate
Management Protocol (CMP). The certification
authority may want you to include a reference
number and key (password) to identify your
certification request.
ca enroll scep name certificate_name cn-type
{ip cn cn_address|fqdn cn cn_domain_name|mail
cn cn_email} [ou organizational_unit] [o
organization] [c country] key-type {rsa|dsa}
key-len key_length password password ca
ca_name url url
Enrolls a certificate with a CA using Simple
Certificate Enrollment Protocol (SCEP). The
certification authority may want you to include a
key (password) to identify your certification
request.
268
ZyWALL (ZLD) CLI Reference Guide
Chapter 31 Certificates
Table 154 ca Commands Summary (continued)
COMMAND
DESCRIPTION
ca generate pkcs10 name certificate_name cntype {ip cn cn_address|fqdn cn
cn_domain_name|mail cn cn_email} [ou
organizational_unit] [o organization] [c
country] key-type {rsa|dsa} key-len key_length
Generates a PKCS#10 certification request.
ca generate pkcs12 name name password password
Generates a PKCS#12 certificate.
ca generate x509 name certificate_name cn-type
{ip cn cn_address|fqdn cn cn_domain_name|mail
cn cn_email} [ou organizational_unit] [o
organization] [c country] key-type {rsa|dsa}
key-len key_length
Generates a self-signed x509 certificate.
ca rename category {local|remote} old_name
new_name
Renames a local (my certificates) or remote
(trusted certificates) certificate.
ca validation remote_certificate
Enters the sub command mode for validation of
certificates signed by the specified remote (trusted)
certificates.
cdp {activate|deactivate}
Has the ZyWALL check (or not check) incoming
certificates that are signed by this certificate
against a Certificate Revocation List (CRL) or an
OCSP server. You also need to configure the
OSCP or LDAP server details.
ldap {activate|deactivate}
Has the ZyWALL check (or not check) incoming
certificates that are signed by this certificate
against a Certificate Revocation List (CRL) on a
LDAP (Lightweight Directory Access Protocol)
directory server.
ldap ip {ip|fqdn} port <1..65535> [id name
password password] [deactivate]
Sets the validation configuration for the specified
remote (trusted) certificate where the directory
server uses LDAP.
ip: Type the IP address (in dotted decimal
notation) or the domain name of the directory
server. The domain name can use alphanumeric
characters, periods and hyphens. Up to 255
characters.
port: Specify the LDAP server port number. You
must use the same server port number that the
directory server uses. 389 is the default server port
number for LDAP.
The ZyWALL may need to authenticate itself in
order to access the CRL directory server. Type the
login name (up to 31 characters) from the entity
maintaining the server (usually a certification
authority). You can use alphanumeric characters,
the underscore and the dash.
Type the password (up to 31 characters) from the
entity maintaining the CRL directory server (usually
a certification authority). You can use the following
characters: a-zA-Z0-9;|`~!@#$%^&*()_+\{}':,./<>=-
ocsp {activate|deactivate}
Has the ZyWALL check (or not check) incoming
certificates that are signed by this certificate
against a directory server that uses OCSP (Online
Certificate Status Protocol).
ZyWALL (ZLD) CLI Reference Guide
269
Chapter 31 Certificates
Table 154 ca Commands Summary (continued)
COMMAND
ocsp url url [id name password password]
[deactivate]
DESCRIPTION
Sets the validation configuration for the specified
remote (trusted) certificate where the directory
server uses OCSP.
url: Type the protocol, IP address and pathname
of the OCSP server.
name: The ZyWALL may need to authenticate itself
in order to access the OCSP server. Type the login
name (up to 31 characters) from the entity
maintaining the server (usually a certification
authority). You can use alphanumeric characters,
the underscore and the dash.
password: Type the password (up to 31 characters)
from the entity maintaining the OCSP server
(usually a certification authority). You can use the
following characters: a-zA-Z09;|`~!@#$%^&*()_+\{}':,./<>=-
no ca category {local|remote} certificate_name
Deletes the specified local (my certificates) or
remote (trusted certificates) certificate.
no ca validation name
Removes the validation configuration for the
specified remote (trusted) certificate.
show ca category {local|remote} name
certificate_name certpath
Displays the certification path of the specified local
(my certificates) or remote (trusted certificates)
certificate.
show ca category {local|remote} [name
certificate_name format {text|pem}]
Displays a summary of the certificates in the
specified category (local for my certificates or
remote for trusted certificates) or the details of a
specified certificate.
show ca validation name name
Displays the validation configuration for the
specified remote (trusted) certificate.
show ca spaceusage
Displays the storage space in use by certificates.
270
ZyWALL (ZLD) CLI Reference Guide
Chapter 31 Certificates
31.5 Certificates Commands Examples
The following example creates a self-signed X.509 certificate with IP address 10.0.0.58 as the
common name. It uses the RSA key type with a 512 bit key. Then it displays the list of local
certificates. Finally it deletes the pkcs12request certification request.
Router# configure terminal
Router(config)# ca generate x509 name test_x509 cn-type ip cn 10.0.0.58 keytype rsa key-len 512
Router(config)# show ca category local
certificate: default
type: SELF
subject: CN=ZyWALL-1050_Factory_Default_Certificate
issuer: CN=ZyWALL-1050_Factory_Default_Certificate
status: VALID
ID: ZyWALL-1050_Factory_Default_Certificate
type: EMAIL
valid from: 2003-01-01 00:38:30
valid to: 2022-12-27 00:38:30
certificate: test
type: REQ
subject: CN=1.1.1.1
issuer: none
status: VALID
ID: 1.1.1.1
type: IP
valid from: none
valid to: none
certificate: pkcs12request
type: REQ
subject: CN=1.1.1.2
issuer: none
status: VALID
ID: 1.1.1.2
type: IP
valid from: none
valid to: none
certificate: test_x509
type: SELF
subject: CN=10.0.0.58
issuer: CN=10.0.0.58
status: VALID
ID: 10.0.0.58
type: IP
valid from: 2006-05-29 10:26:08
valid to: 2009-05-28 10:26:08
Router(config)# no ca category local pkcs12request
ZyWALL (ZLD) CLI Reference Guide
271
Chapter 31 Certificates
272
ZyWALL (ZLD) CLI Reference Guide
CHAPTER
32
ISP Accounts
Use ISP accounts to manage Internet Service Provider (ISP) account information for PPPoE/
PPTP interfaces.
32.1 ISP Accounts Overview
An ISP account is a profile of settings for Internet access using PPPoE or PPTP.
32.1.1 PPPoE and PPTP Account Commands
The following table lists the PPPoE and PPTP ISP account commands.
Table 155 PPPoE and PPTP ISP Account Commands
COMMAND
DESCRIPTION
show account [pppoe profile_name | pptp
profile_name]
Displays information about the specified
account(s).
[no] account {pppoe | pptp} profile_name
Creates a new ISP account with name
profile_name if necessary and enters subcommand mode. The no command deletes the
specified ISP account.
profile_name: use 1-31 alphanumeric
characters, underscores(_), or dashes (-), but the
first character cannot be a number. This value is
case-sensitive.
[no] user username
Sets the username for the specified ISP account.
The no command clears the username.
username: You can use alphanumeric,
underscores (_), dashes (-), and /@$ characters,
and it can be up to 30 characters long.
[no] password password
Sets the password for the specified ISP account.
The no command clears the password.
password: You can use up to 63 printable ASCII
characters. Spaces are not allowed.
[no] authentication {chap-pap | chap | pap
| mschap | mschap-v2}
Sets the authentication for the specified ISP
account. The no command sets the authentication
to chap-pap.
[no] compression {on | off}
Turns compression on or off for the specified ISP
account. The no command turns off compression.
[no] idle <0..360>
Sets the idle timeout for the specified ISP account.
The no command sets the idle timeout to zero.
ZyWALL (ZLD) CLI Reference Guide
273
Chapter 32 ISP Accounts
Table 155 PPPoE and PPTP ISP Account Commands (continued)
COMMAND
DESCRIPTION
[no] service-name {ip | hostname |
service_name}
Sets the service name for the specified PPPoE ISP
account. The no command clears the service
name.
hostname: You may up to 63 alphanumeric
characters, dashes (-), or periods (.), but the first
character cannot be a period.
service_name: You can use 1-253 alphanumeric
characters, underscores (_), dashes (-), and @$./
characters.
[no] server ip
Sets the PPTP server for the specified PPTP ISP
account. The no command clears the server
name.
[no] encryption {nomppe | mppe-40 | mppe128}
Sets the encryption for the specified PPTP ISP
account. The no command sets the encryption to
nomppe.
[no] connection-id connection_id
Sets the connection ID for the specified PPTP ISP
account. The no command clears the connection
ID.
connection_id: You can use up to 31
alphanumeric characters, underscores (_), dashes
(-), and colons (:).
32.1.2 Cellular Account Commands
The following table lists the cellular ISP account commands.
Table 156 Cellular Account Commands
COMMAND
DESCRIPTION
show account cellular profile_name
Displays information about the specified account.
[no] account cellular profile_name
Creates a new cellular ISP account with name
profile_name if necessary and enters subcommand mode. The no command deletes the
specified ISP account.
profile_name: use 0-30 alphanumeric
characters, underscores(_), or dashes (-), but the
first character cannot be a number. This value is
case-sensitive.
[no] apn access_point_name
Sets the Access Point Name (APN) for the cellular
ISP account. The no command clears the APN.
access_point_name: Use up to 64 alphanumeric
characters and underscores (_), dashes (-),
periods (.), and /@\$#.
[no] phone phone_number
Sets the username for the specified ISP account.
The no command clears the username.
username: Use up to 64 alphanumeric characters
and underscores (_), dashes (-), periods (.), and /
@\$#.
[no] user username
Sets the username for the specified ISP account.
The no command clears the username.
username: Use up to 64 alphanumeric characters
and underscores (_), dashes (-), periods (.), and /
@\$#.
274
ZyWALL (ZLD) CLI Reference Guide
Chapter 32 ISP Accounts
Table 156 Cellular Account Commands (continued)
COMMAND
DESCRIPTION
[no] password password
Sets the password for the specified ISP account.
The no command clears the password.
password: Use up to 63 printable ASCII
characters. Spaces are not allowed.
[no] authentication {none | pap | chap}
Sets the authentication for the cellular account.
The no command sets the authentication to none.
[no] idle <0..360>
Sets the idle timeout for the cellular account. Zero
disables the idle timeout. The no command sets
the idle timeout to zero.
ZyWALL (ZLD) CLI Reference Guide
275
Chapter 32 ISP Accounts
276
ZyWALL (ZLD) CLI Reference Guide
CHAPTER
33
SSL Application
This chapter describes how to configure SSL application objects for use in SSL VPN.
33.1 SSL Application Overview
Configure an SSL application object to specify a service and a corresponding IP address of the
server on the local network. You can apply one or more SSL application objects in the VPN >
SSL VPN screen for a user account/user group.
33.1.1 SSL Application Object Commands
This table lists the commands for creating SSL application objects. You must use the
configure terminal command to enter the configuration mode before you can use these
commands.
Table 157 SSL Application Object Commands
COMMAND
DESCRIPTION
show sslvpn application
[application_object]
Displays SSL VPN application objects.
[no] sslvpn application
application_object
Enters the sub-command mode to create an SSL VPN application
object.
server-type {file-sharing |
owa | web-server} url URL
[entry-point entry_point]
ZyWALL (ZLD) CLI Reference Guide
Specify the type of service for this SSL application.
file-sharing: create a file share application for VPN SSL.
owa: (Outlook Web Access) to allow users to access e-mails,
contacts, calenders via an Microsoft Outlook-like interface using
supported web browsers. The ZyWALL supports one OWA object.
web-server: to allow access to the specified web site hosted on the
local network.
url: Enter the fully qualified domain name (FQDN) or IP address of
the application server. You must enter the “http://” or “https://” prefix.
Remote users are restricted to access only files in this directory. For
example, if you enter “\remote\” in this field, emote users can only
access files in the “remote” directory.
entry-point: optional. Specify the name of the directory or file on
the local server as the home page or home directory on the user
screen.
277
Chapter 33 SSL Application
Table 157 SSL Application Object Commands
COMMAND
278
DESCRIPTION
server-type file-sharing
share-path share-path
Specifies the IP address, domain name or NetBIOS name (computer
name) of the file server and the name of the share to which you want
to allow user access. Enter the path in one of the following formats.
“\\<IP address>\<share name>”
“\\<domain name>\<share name>”
“\\<computer name>\<share name>”
For example, if you enter “\\my-server\Tmp”, this allows remote users
to access all files and/or folders in the “\Tmp” share on the “myserver” computer.
server-type rdp serveraddress server-address
[startingport <1..65535> ending-port
<1..65535>] [program-path
program-path]
Creates an SSL application object to allow users to manage LAN
computers that have Remote Desktop Protocol remote desktop
server software installed.
Specify the listening ports of the LAN computer(s) running remote
desktop server software. The ZyWALL uses a port number from this
range to send traffic to the LAN computer that is being remotely
managed.
program-path: specify an application to open when a remote user
logs into the remote desktop application.
server-type vnc serveraddress server-address
[startingport <1..65535> ending-port
<1..65535>]
Creates an SSL application object to allow users to manage LAN
computers that have Virtual Network Computing remote desktop
server software installed.
Specify the listening ports of the LAN computer(s) running remote
desktop server software. The ZyWALL uses a port number from this
range to send traffic to the LAN computer that is being remotely
managed.
server-type weblink url url
Sets this to create a link to a web site you specified that you expect
the SSL VPN users to commonly use.
url: Enter the fully qualified domain name (FQDN) or IP address of
the application server. You must enter the “http://” or “https://” prefix.
For example, https://1.2.3.4. SSL VPN users are restricted to
access only web pages or files in this directory. For example, if you
enter “\remote\” in this field, emote users can only access web pages
or files in the “remote” directory.
If a link contains a file that is not within this domain, then SSL VPN
users cannot access it.
no server-type
Remove the type of service configuration for this SSL application.
[no] webpage-encrypt
Turn on web encrypt to prevent users from saving the web content.
ZyWALL (ZLD) CLI Reference Guide
Chapter 33 SSL Application
33.1.2 SSL Application Command Examples
The following commands create and display a server-type SSL application object named ZW5
for a web server at IP address 192.168.1.12.
Router(config)# sslvpn application ZW5
Router(sslvpn application)# server-type web-server url http://192.168.1.12
Router(sslvpn application)# exit
Router(config)# show sslvpn application
SSL Application: ZW5
Server Type: web-server
URL: http://192.168.1.12
Entry Point:
Encrypted URL: ~aHR0cDovLzE5Mi4xNjguMS4xMi8=/
Web Page Encryption: yes
Reference: 1
ZyWALL (ZLD) CLI Reference Guide
279
Chapter 33 SSL Application
280
ZyWALL (ZLD) CLI Reference Guide
CHAPTER
34
Endpoint Security
This chapter describes how to configure endpoint security objects for use in authentication
policy and SSL VPN.
34.1 Endpoint Security Overview
Use Endpoint Security (EPS), also known as endpoint control, to make sure users’ computers
comply with defined corporate policies before they can access the network or an SSL VPN
tunnel. After a successful user authentication, a user’s computer must meet the endpoint
security object’s Operating System (OS) option and security requirements to gain access. You
can configure the endpoint security object to require a user’s computer to match just one of the
endpoint security object’s checking criteria or all of them. Configure endpoint security objects
to use with the authentication policy and SSL VPN features.
What Endpoint Security Can Check
The settings endpoint security can check vary depending on the OS of the user’s computer.
Depending on the OS, EPS can check user computers for the following:
•
•
•
•
•
•
•
•
•
Operating System (Windows, Linux, Mac OSX, or others)
Windows version and service pack version
Windows Auto Update setting and installed security patches
Personal firewall installation and activation
Anti-virus installation and activation
Windows registry settings
Processes that the endpoint must execute
Processes that the endpoint cannot execute
The size and version of specific files
Multiple Endpoint Security Objects
You can configure an authentication policy or SSL VPN policy to use multiple endpoint
security objects. This allows checking of computers with different OSs or security settings.
When a client attempts to log in, the ZyWALL checks the client’s computer against the
endpoint security objects one-by-one. The client’s computer must match one of the force
authentication or SSL VPN policy’s endpoint security policies in order to gain access.
ZyWALL (ZLD) CLI Reference Guide
281
Chapter 34 Endpoint Security
Requirements
User computers must have Sun’s Java (Java Runtime Environment or ‘JRE’) installed and
enabled with a minimum version of 1.4.
34.1.1 Endpoint Security Commands Summary
The following table describes the values required for many endpoint security object
commands. Other values are discussed with the corresponding commands.
Table 158 Input Values for Endpoint Security Commands
LABEL
DESCRIPTION
profile_name
The name of the endpoint security object. You may use 1-31 characters (“0-9”, “az”, “A-Z”, “-”, “_” with no spaces allowed).
file_path
This is a file with the full directory path in quotation marks ““. For example,
“C:\Program Files\Internet Explorer\iexplore.exe”.
The following sections list the endpoint security object commands.
34.1.2 Endpoint Security Object Commands
This table lists the commands for creating endpoint security objects. You must use the
configure terminal command to enter the configuration mode before you can use these
commands.
Table 159 Endpoint Security Object Commands
COMMAND
DESCRIPTION
[no] eps failure-messages
failure_messages
Specify a message to display when a user’s computer fails the
endpoint security check. Use up to 1023 characters (0-9a-zA-Z;/
?:@=+$\.-_!*'()%,”). For example, “Endpoint Security checking failed.
Please contact your network administrator for help.”. The no
command removes the setting.
show eps failure-messages
Displays the message to display when a user’s computer fails the
endpoint security check.
[no] eps profile profile_name
Enters the sub-command mode. The no command removes an
endpoint secruity object.
282
[no] {anti-virus | personalfirewall} activate
If you set windows as the operating system (using the os-type
command), you can set whether or not the user’s computer is
required to have anti-virus or personal firewall software installed.
[no] anti-virus
anti_virus_software_name
detect-auto-protection
{enable | disable | ignore}
Sets a permitted anti-virus software package. If you want to enter
multiple anti-virus software packages, use this command for each of
them. Use the list signature anti-virus command to view
the available anti-virus software package options.
detect-auto-protection: Set this to enable if the specified
anti-virus software is not only detectable for the installation but also
detectable for the activation status. You can check the settings for
each anti-virus software by using the show eps signature
anti-virus command.
The user’s computer must have one of the listed anti-virus software
packages to pass this checking item. For some anti-virus software
the ZyWALL can also detect whether or not the anti-virus software is
activated; in those cases it must also be activated.
ZyWALL (ZLD) CLI Reference Guide
Chapter 34 Endpoint Security
Table 159 Endpoint Security Object Commands
COMMAND
DESCRIPTION
[no] personal-firewall
personal_firewall_software_na
me detect-auto-protection
{enable | disable | ignore}
Sets a permitted personal firewall. If you want to enter multiple
personal firewalls, use this command for each of them. Use the list
signature personal-firewall command to view the available
personal firewall software package options.
detect-auto-protection: Set this to enable if the specified
firewall software is not only detectable for the installation but also
detectable for the activation status. You can check the settings for
each firewall software by using the show eps signature
personal-firewall command.
The user’s computer must have one of the listed personal firewalls to
pass this checking item. For some personal firewalls the ZyWALL
can also detect whether or not the firewall is activated; in those
cases it must also be activated.
[no] application forbiddenprocess process_name
If you selected windows or linux as the operating system (using
the os-type command), you can use this command to set an
application that a user’s computer is not permitted to have running. If
you want to enter multiple applications, use this command for each of
them.
The user’s computer must not have any of the forbidden applications
running to pass this checking item.
Include the filename extension for Linux operating systems.
[no] application trustedprocess process_name
If you selected windows or linux as the operating system (using
the os-type command), you can use this command to set an
application that a user’s computer must be running.
The user’s computer must have all of the trusted applications running
to pass this checking item.
Include the filename extension for Linux operating systems.
[no] description description
Type a description for this endpoint security object. You can use
alphanumeric and ()+/:=?!*#@$_%- characters, and it can be up to
60 characters long.
[no] file-info file-path
file_path
If you selected windows or linux as the operating system (using
the os-type command), you can use this command to check details
of specific files on the user’s computer.
The user’s computer must pass one of the file information checks to
pass this checking item.
[no] file-info file-path
file_path {eq | gt | lt | ge |
le | neq} file-size
<1..1073741824>
Sets whether the size of the file on the user’s computer has to be
equal to (eq), greater than (gt), less than (lt), greater than or equal
to (ge), less than or equal to (le), or not equal to (neq) the size of
the file specified.
[no] file-info file-path
file_path {eq | gt | lt | ge |
le | neq} file-version
file_version
Sets whether the version of the file on the user’s computer has to be
equal to (eq), greater than (gt), less than (lt), greater than or equal
to (ge), less than or equal to (le), or not equal to (neq) the version of
the file specified.
[no] file-info file-path
file_path {eq | gt | lt | ge |
le | neq} file-size
<1..1073741824> {eq | gt | lt
| ge | le | neq} file-version
file_version
Sets whether the size and version of the file on the user’s computer
has to be equal to (eq), greater than (gt), less than (lt), greater
than or equal to (ge), less than or equal to (le), or not equal to (neq)
the size and version of the file specified.
ZyWALL (ZLD) CLI Reference Guide
283
Chapter 34 Endpoint Security
Table 159 Endpoint Security Object Commands
COMMAND
DESCRIPTION
os-type {windows | linux |
mac-osx | others}
Select the type of operating system the user’s computer must be
using. Use the windows-version command to configure the
checking items according to the set operating system. If you set this
to mac-osx, there are no other checking items.
others allows access for computers not using Windows, Linux, or
Mac OSX operating systems. For example you create Windows,
Linux, and Mac OSX endpoint security objects to apply to your LAN
users. An “others” policy allows access for LAN computers using
Solaris, HP, Android, or other operating systems.
windows-version {windows-2000
| windows-xp | windows-2003 |
windows-2008 | windows-vista
| windows-7 | windows-2008r2}
If you set windows as the operating system (using the os-type
command), use this command to set the version of Windows.
matching-criteria {any | all}
Select whether the user’s computer has to match just one of the
endpoint security object’s checking criteria or all of them.
list signature {anti-virus |
personal-firewall | status}
Displays all the anti-virus software packages, personal firewall
software packages or EPS signature information respectively.
The status command displays the EPS signature version, release
date and the total number of software packages for which the
ZyWALL’s endpoint security can check.
[no] windows-auto-update
{enable | disable | ignore}
If you set windows as the operating system (using the os-type
command), you can use enable with this command if the user’s
computer must have the Windows Auto Update feature installed and
activated; use disable if the Windows Auto Update feature must be
installed but deactivated; use ignore if the Windows Auto Update
feature must be installed but does not matter if it is activated or not.
The no command does not check the Windows Auto Update feature.
[no] windows-service-pack
<1..10>
If you set windows as the operating system (using the os-type
command), you can enter the minimum Windows service pack
number the user’s computer must have installed. The user’s
computer must have this service pack or higher. For example, “2”
means service pack 2. The no command means to have the
ZyWALL ignore the Windows service pack number.
[no] windows-security-patch
security_patch
If you set windows as the operating system (using the os-type
command), you can use this command to set a Windows security
patch that the user’s computer must have installed. If you want to
enter multiple security patches, use this command for each of them.
The user’s computer must have all of the set Windows security
patches installed to pass the checking item.
[no] windows-registry
registry_key {eq | gt | lt |
ge | le | neq} registry_value
If you set windows as the operating system (using the os-type
command), you can use this command to set a Windows registry
value to check on the user’s computer. If you want to enter multiple
registry values, use this command for each of them.
Set whether the value for the registry item in the user’s computer has
to be equal to (eq), greater than (gt), less than (lt), greater than or
equal to (ge), less than or equal to (le), or not equal to (neq) the
value specified.
The user’s computer must pass all of the set Windows registry value
checks to pass the checking item.
show eps profile [profile_name]
Displays the settings of all or the specified endpoint security object.
show eps profile profile_name
signature {anti-virus | personalfirewall}
Displays Anti-Virus or personal firewall signatures that have been
added to the specified endpoint security object.
284
ZyWALL (ZLD) CLI Reference Guide
Chapter 34 Endpoint Security
Table 159 Endpoint Security Object Commands
COMMAND
DESCRIPTION
show eps signature {anti-virus |
personal-firewall | status}
Displays all the anti-virus software packages, personal firewall
software packages or EPS signature information respectively.
The status command displays the EPS signature version, release
date and the total number of software packages for which the
ZyWALL’s endpoint security can check.
[no] eps rename profile_name
new_profile_name
Changes an endpoint security object name.
34.1.3 Endpoint Security Object Command Example
Peter wants to create and display an endpoint security object named EPS-Example. Only the
computers that match the following criteria can access the company’s SSL VPN:
•
•
•
•
•
Operating system: Windows XP
Windows auto update: enabled
Windows service pack: 2 or above
Personal firewall: Windows firewall installed and enabled
Anti-Virus: Kaspersky Anti-Virus v2010 installed and enabled
However, he needs to check the Anti-Virus software name defined on the ZyWALL. The
following example shows how to check all available Anti-Virus software packages for which
the ZyWALL’s endpoint security can check. Copy and paste the name of the output item 20 for
the setting later.
Router> configure terminal
Router(config)# show eps signature anti-virus
No. Name
Detection
=========================================================================
1
Kaspersky_Anti-Virus_v2009
yes
2
Kaspersky_Anti-Virus_v2010
yes
3
Kaspersky_Internet_Security_v2009
yes
4
Kaspersky_Internet_Security_v2010
yes
5
Norton_Anti-Virus_v2010
no
6
Norton_Internet_Security_v2010
no
7
Norton_360_v3
no
8
Microsoft_Security_Center
yes
9
TrendMicro_PC-cillin_AntiVirus_v2010
yes
10
TrendMicro_PC-cillin_Internet_Security_v2010
yes
11
TrendMicro_PC-cillin_Internet_Security_Pro_v2010
yes
12
Avira_Antivir_Personal_v2009
noRouter(config)#
ZyWALL (ZLD) CLI Reference Guide
285
Chapter 34 Endpoint Security
Then he also needs to check the personal firewall software name defined on the ZyWALL.
Copy and paste the name of the output item 11 for the setting later.
Router(config)# show eps signature personal-firewall
No. Name
Detection
=========================================================================
1
Kaspersky_Internet_Security_v2009
yes
2
Kaspersky_Internet_Security_v2010
yes
3
Microsoft_Security_Center
yes
4
Windows_Firewall
yes
5
TrendMicro_PC-cillin_Internet_Security_v2010
yes
6
TrendMicro_PC-cillin_Internet_Security_Pro_v2010
yesRouter(config)#
Now Peter can create the EPS object profile as the example shown next. Note that he uses the
matching-criteria all command to make sure all users’ computers have the required
software installed and settings being configured before they access the company’s SSL VPN.
Router(config)# eps profile EPS-Example
Router(eps EPS-Example)# windows-version windows-xp
Router(eps EPS-Example)# personal-firewall activate
Router(eps EPS-Example)# anti-virus activate
Router(eps EPS-Example)# windows-auto-update enable
Router(eps EPS-Example)# windows-service-pack 2
Router(eps EPS-Example)# personal-firewall Windows_Firewall detect-autoprotection enable
Router(eps EPS-Example)# anti-virus Kaspersky_Anti-Virus_v2010 detectauto-protection enable
Router(eps EPS-Example)# matching-criteria all
Router(eps EPS-Example)# exit
Router(config)#
286
ZyWALL (ZLD) CLI Reference Guide
Chapter 34 Endpoint Security
Then he leaves the sub-command mode and uses the show command to view the EPS object
settings.
Router(eps EPS-Example)# exit
Router(config)# show eps profile
name: EPS-Example
description:
os type: windows
windows version: windows-xp
matching criteria: all
anti-virus activation: yes
anti-virus: 1
name: Kaspersky_Anti-Virus_v2010
detect auto-protection: enable
personal firewall activation: yes
personal firewall: 1
name: Windows_Firewall
detect auto-protection: enable
windows update: enable
windows service pack: 2
windows security patch:
windows registry:
trusted application:
forbidden application:
file information:
reference count: 1
Router(config)#
See Chapter 17 on page 147 for how to configure an SSL VPN using this EPS object .
For users who fail the endpoint security checking, Peter decides to show them an error
message of “Endpoint Security checking failed. Contact helpdesk at #7777 if you have any
questions.” The following shows how to configure the error message.
Router(config)# eps failure-messages "Endpoint Security checking failed.
Contact helpdesk at #7777 if you have any questions."
Router(config)#
ZyWALL (ZLD) CLI Reference Guide
287
Chapter 34 Endpoint Security
288
ZyWALL (ZLD) CLI Reference Guide
P ART IX
System
System (291)
System Remote Management (299)
289
290
CHAPTER
35
System
This chapter provides information on the commands that correspond to what you can
configure in the system screens.
35.1 System Overview
Use these commands to configure general ZyWALL information, the system time and the
console port connection speed for a terminal emulation program. They also allow you to
configure DNS settings and determine which services/protocols can access which ZyWALL
zones (if any) from which computers.
35.2 Customizing the WWW Login Page
Use these commands to customize the Web Configurator login screen. You can also customize
the page that displays after an access user logs into the Web Configurator to access network
services like the Internet. See Chapter 25 on page 237 for more on access user accounts.
The following figures identify the parts you can customize in the login and access pages.
Figure 26 Login Page Customization
Logo
Title
Message
(color of all text)
Background
Note Message
(last line of text)
ZyWALL (ZLD) CLI Reference Guide
291
Chapter 35 System
Figure 27 Access Page Customization
Logo
Title
Message
(color of all text)
Note Message
(last line of text)
Window
Background
You can specify colors in one of the following ways:
• color-rgb: Enter red, green, and blue values in parenthesis and separate by commas.
For example, use “rgb(0,0,0)” for black.
• color-name: Enter the name of the desired color.
• color-number: Enter a pound sign (#) followed by the six-digit hexadecimal number
that represents the desired color. For example, use “#000000” for black.
The following table describes the commands available for customizing the Web Configurator
login screen and the page that displays after an access user logs into the Web Configurator to
access network services like the Internet. You must use the configure terminal command
to enter the configuration mode before you can use these commands.
Table 160 Command Summary: Customization
COMMAND
DESCRIPTION
[no] access-page color-windowbackground
Sets whether or not the access page uses a colored background.
access-page message-color {color-rgb
| color-name | color-number}
Sets the color of the message text on the access page.
[no] access-page message-text
message
Sets a note to display below the access page’s title. Use up to 64
printable ASCII characters. Spaces are allowed.
access-page title title
Sets the title for the top of the access page. Use up to 64
printable ASCII characters. Spaces are allowed.
access-page window-color {color-rgb
| color-name | color-number}
Sets the color of the access page’s colored background.
login-page background-color {colorrgb | color-name | color-number}
Sets the color of the login page’s background.
[no] login-page color-background
Sets the login page to use a solid colored background.
[no] login-page color-windowbackground
Sets the login page’s window to use a solid colored background.
login-page message-color {color-rgb
| color-name | color-number}
Sets the color of the message text on the login page.
292
ZyWALL (ZLD) CLI Reference Guide
Chapter 35 System
Table 160 Command Summary: Customization (continued)
COMMAND
DESCRIPTION
[no] login-page message-text %
message
Sets a note to display at the bottom of the login screen. Use up to
64 printable ASCII characters. Spaces are allowed.
login-page title title
Sets the title for the top of the login screen. Use up to 64
printable ASCII characters. Spaces are allowed.
login-page title-color {color-rgb |
color-name | color-number}
Sets the title text color of the login page.
login-page window-color {color-rgb |
color-name | color-number}
Sets the color of the login page’s window border.
logo background-color {color-rgb |
color-name | color-number}
Sets the color of the logo banner across the top of the login
screen and access page.
show access-page settings
Lists the current access page settings.
show login-page default-title
Lists the factory default title for the login page.
show login-page settings
Lists the current login page settings.
show logo settings
Lists the current logo background (banner) and floor (line below
the banner) settings.
show page-customization
Lists whether the ZyWALL is set to use custom login and access
pages or the default ones.
35.3 Host Name Commands
The following table describes the commands available for the hostname and domain name.
You must use the configure terminal command to enter the configuration mode before
you can use these commands.
Table 161 Command Summary: Host Name
COMMAND
DESCRIPTION
[no] domainname domain_name
Sets the domain name. The no command removes the domain
name.
domain_name: This name can be up to 254 alphanumeric
characters long. Spaces are not allowed, but dashes “-” and
underscores “_” are accepted.
[no] hostname hostname
Sets a descriptive name to identify your ZyWALL. The no
command removes the host name.
show fqdn
Displays the fully qualified domain name.
35.4 Time and Date
For effective scheduling and logging, the ZyWALL system time must be accurate. The
ZyWALL’s Real Time Chip (RTC) keeps track of the time and date. There is also a software
mechanism to set the time manually or get the current time and date from an external server.
ZyWALL (ZLD) CLI Reference Guide
293
Chapter 35 System
35.4.1 Date/Time Commands
The following table describes the commands available for date and time setup. You must use
the configure terminal command to enter the configuration mode before you can use
these commands.
Table 162 Command Summary: Date/Time
COMMAND
DESCRIPTION
clock date yyyy-mm-dd time hh:mm:ss
Sets the new date in year, month and day format
manually and the new time in hour, minute and
second format.
[no] clock daylight-saving
Enables daylight saving. The no command
disables daylight saving.
[no] clock saving-interval begin
{apr|aug|dec|feb|jan|jul|jun|mar|may|nov|oct|se
p} {1|2|3|4|last} {fri|mon|sat|sun|thu|tue|wed}
hh:mm end
{apr|aug|dec|feb|jan|jul|jun|mar|may|nov|oct|se
p} {1|2|3|4|last} {fri|mon|sat|sun|thu|tue|wed}
hh:mm offset
Configures the day and time when Daylight
Saving Time starts and ends. The no command
removes the day and time when Daylight Saving
Time starts and ends.
offset: a number from 1 to 5.5 (by 0.5 increments)
clock time hh:mm:ss
Sets the new time in hour, minute and second
format.
[no] clock time-zone {-|+hh}
Sets your time zone. The no command removes
time zone settings.
[no] ntp
Saves your date and time and time zone settings
and updates the data and time every 24 hours.
The no command stops updating the data and
time every 24 hours.
[no] ntp server {fqdn|w.x.y.z}
Sets the IP address or URL of your NTP time
server. The no command removes time server
information.
ntp sync
Gets the time and date from a NTP time server.
show clock date
Displays the current date of your ZyWALL.
show clock status
Displays your time zone and daylight saving
settings.
show clock time
Displays the current time of your ZyWALL.
show ntp server
Displays time server settings.
294
ZyWALL (ZLD) CLI Reference Guide
Chapter 35 System
35.5 Console Port Speed
This section shows you how to set the console port speed when you connect to the ZyWALL
via the console port using a terminal emulation program. The following table describes the
console port commands. You must use the configure terminal command to enter the
configuration mode before you can use these commands.
Table 163 Command Summary: Console Port Speed
COMMAND
DESCRIPTION
[no] console baud baud_rate
Sets the speed of the console port. The no command
resets the console port speed to the default
(115200).
baud_rate: 9600, 19200, 38400, 57600 or 115200.
show console
Displays console port speed.
35.6 DNS Overview
DNS (Domain Name System) is for mapping a domain name to its corresponding IP address
and vice versa. The DNS server is extremely important because without it, you must know the
IP address of a machine before you can access it.
35.6.1 Domain Zone Forwarder
A domain zone forwarder contains a DNS server’s IP address. The ZyWALL can query the
DNS server to resolve domain zones for features like VPN, DDNS and the time server. A
domain zone is a fully qualified domain name without the host. For example, zyxel.com.tw is
the domain zone for the www.zyxel.com.tw fully qualified domain name.
ZyWALL (ZLD) CLI Reference Guide
295
Chapter 35 System
35.6.2 DNS Commands
The following table identifies the values required for many of these commands. Other input
values are discussed with the corresponding commands.
Table 164 Input Values for General DNS Commands
LABEL
DESCRIPTION
address_object
The name of the IP address (group) object. You may use 1-31 alphanumeric
characters, underscores(_), or dashes (-), but the first character cannot be a
number. This value is case-sensitive.
interface_name
The name of the interface.
Ethernet interface: For the ZyWALL USG 300 and above, use gex, x = 1 - N,
where N equals the highest numbered Ethernet interface for your ZyWALL
model.
The ZyWALL USG 100 and 200 models use a name such as wan1, wan2,
opt, lan1, ext-wlan, or dmz.
virtual interface on top of Ethernet interface: add a colon (:) and the number of
the virtual interface. For example: gex:y, x = 1 - N, y = 1 - 4
VLAN interface: vlanx, x = 0 - 4094
virtual interface on top of VLAN interface: vlanx:y, x = 0 - 4094, y = 1 - 12
bridge interface: brx, x = 0 - N, where N depends on the number of bridge
interfaces your ZyWALL model supports.
virtual interface on top of bridge interface: brx:y, x = the number of the bridge
interface, y = 1 - 4
PPPoE/PPTP interface: pppx, x = 0 - N, where N depends on the number of
PPPoE/PPTP interfaces your ZyWALL model supports.
The following table describes the commands available for DNS. You must use the configure
terminal command to enter the configuration mode before you can use these commands.
Table 165 Command Summary: DNS
COMMAND
DESCRIPTION
[no] ip dns server a-record fqdn w.x.y.z
Sets an A record that specifies the mapping of a
fully qualified domain name (FQDN) to an IP
address. The no command deletes an A record.
ip dns server -flush
Clears the DNS .
[no] ip dns server mx-record domain_name
{w.x.y.z|fqdn}
Sets a MX record that specifies a mail server that
is responsible for handling the mail for a
particular domain. The no command deletes a
MX record.
ip dns server rule {<1..32>|append|insert
<1..32>} access-group {ALL|address_object} zone
{ALL|address_object} action {accept|deny}
Sets a service control rule for DNS requests.
ip dns server rule move <1..32> to <1..32>
Changes the number of a service control rule.
296
ZyWALL (ZLD) CLI Reference Guide
Chapter 35 System
Table 165 Command Summary: DNS (continued)
COMMAND
DESCRIPTION
[no] ip dns server zone-forwarder
{<1..32>|append|insert <1..32>}
{domain_zone_name|*} interface interface_name
Sets a domain zone forwarder record that
specifies a fully qualified domain name. You can
also use a star (*) if all domain zones are served
by the specified DNS server(s).
domain_zone_name: This is a domain zone, not
a host. For example, zyxel.com.tw is the domain
zone for the www.zyxel.com.tw fully qualified
domain name. For example, whenever the
ZyWALL receives needs to resolve a
zyxel.com.tw domain name, it can send a query
to the recorded name server IP address.
interface_name: This is the interface through
which the ISP provides a DNS server. The
interface should be activated and set to be a
DHCP client.
The no command deletes a zone forwarder
record.
ip dns server zone-forwarder
{<1..32>|append|insert <1..32>}
{domain_zone_name|*} user-defined w.x.y.z
[private | interface {interface_name | auto}]
Sets a domain zone forwarder record that
specifies a DNS server’s IP address.
private | interface: Use private if the
ZyWALL connects to the DNS server through a
VPN tunnel. Otherwise, use the interface
command to set the interface through which the
ZyWALL sends DNS queries to a DNS server.
The auto means any interface that the ZyWALL
uses to send DNS queries to a DNS server
according to the routing rule.
ip dns server zone-forwarder move <1..32> to
<1..32>
Changes the index number of a zone forwarder
record.
no ip dns server rule <1..32>
Deletes a service control rule.
show ip dns server
Displays all DNS entries.
show ip dns server database
Displays all configured records.
show ip dns server status
Displays whether this service is enabled or not.
35.6.3 DNS Command Example
This command sets an A record that specifies the mapping of a fully qualified domain name
(www.abc.com) to an IP address (210.17.2.13).
Router# configure terminal
Router(config)# ip dns server a-record www.abc.com 210.17.2.13
35.7 SNAT Overview
DNS (Domain Name System) is for mapping a domain name to its corresponding IP address
and vice versa. The DNS server is extremely important because without it, you must know the
IP address of a machine before you can access it.
ZyWALL (ZLD) CLI Reference Guide
297
Chapter 35 System
298
ZyWALL (ZLD) CLI Reference Guide
CHAPTER
36
System Remote Management
This chapter shows you how to determine which services/protocols can access which
ZyWALL zones (if any) from which computers.
"
To allow the ZyWALL to be accessed from a specified computer using a
service, make sure you do not have a service control rule or to-ZyWALL rule to
block that traffic.
36.1 Remote Management Overview
You may manage your ZyWALL from a remote location via:
• Internet (WAN only)
• ALL (LAN&WAN&DMZ)
• LAN only
• DMZ only
To disable remote management of a service, deselect Enable in the corresponding service
screen.
36.1.1 Remote Management Limitations
Remote management will not work when:
1 You have disabled that service in the corresponding screen.
2 The accepted IP address in the Service Control table does not match the client IP
address. If it does not match, the ZyWALL will disconnect the session immediately.
3 There is a firewall rule that blocks it.
36.1.2 System Timeout
There is a lease timeout for administrators. The ZyWALL automatically logs you out if the
management session remains idle for longer than this timeout period. The management session
does not time out when a statistics screen is polling.
Each user is also forced to log in the ZyWALL for authentication again when the
reauthentication time expires.
ZyWALL (ZLD) CLI Reference Guide
299
Chapter 36 System Remote Management
36.2 Common System Command Input Values
The following table identifies the values required for many of these commands. Other input
values are discussed with the corresponding commands.
Table 166 Input Values for General System Commands
LABEL
DESCRIPTION
address_object
The name of the IP address (group) object. You may use 1-31 alphanumeric
characters, underscores(_), or dashes (-), but the first character cannot be a
number. This value is case-sensitive.
rule_number
The number of a service control rule. 1 - X where X is the highest number of rules
the ZyWALL model supports.
zone_object
The name of the zone. For the ZyWALL USG 300 and above, use up to 31
characters (a-zA-Z0-9_-). The name cannot start with a number. This value is
case-sensitive.
The ZyWALL USG 100 and 200 models use pre-defined zone names like DMZ,
LAN1, SSL VPN, WLAN, IPSec VPN, OPT, and WAN.
36.3 HTTP/HTTPS Commands
The following table describes the commands available for HTTP/HTTPS. You must use the
configure terminal command to enter the configuration mode before you can use these
commands.
Table 167 Command Summary: HTTP/HTTPS
COMMAND
DESCRIPTION
[no] ip http authentication auth_method
Sets an authentication method used by the
HTTP/HTTPS server. The no command resets
the authentication method used by the HTTP/
HTTPS server to the factory default (default).
auth_method: The name of the authentication
method. You may use 1-31 alphanumeric
characters, underscores(_), or dashes (-), but the
first character cannot be a number. This value is
case-sensitive.
[no] ip http port <1..65535>
Sets the HTTP service port number. The no
command resets the HTTP service port number
to the factory default (80).
[no] ip http secure-port <1..65535>
Sets the HTTPS service port number. The no
command resets the HTTPS service port number
to the factory default (443).
[no] ip http secure-server
Enables HTTPS access to the ZyWALL web
configurator. The no command disables HTTPS
access to the ZyWALL web configurator.
[no] ip http secure-server auth-client
Sets the client to authenticate itself to the HTTPS
server. The no command sets the client not to
authenticate itself to the HTTPS server.
300
ZyWALL (ZLD) CLI Reference Guide
Chapter 36 System Remote Management
Table 167 Command Summary: HTTP/HTTPS (continued)
COMMAND
DESCRIPTION
[no] ip http secure-server cert certificate_name Specifies a certificate used by the HTTPS server.
The no command resets the certificate used by
the HTTPS server to the factory default
(default).
certificate_name: The name of the
certificate. You can use up to 31 alphanumeric
and ;‘~!@#$%^&()_+[]{}’,.=- characters.
[no] ip http secure-server force-redirect
Redirects all HTTP connection requests to a
HTTPS URL. The no command disables
forwarding HTTP connection requests to a
HTTPS URL.
ip http secure-server table {admin|user} rule
{rule_number|append|insert rule_number} accessgroup {ALL|address_object} zone
{ALL|zone_object} action {accept|deny}
Sets a service control rule for HTTPS service.
ip http secure-server table {admin|user} rule
move rule_number to rule_number
Changes the index number of a HTTPS service
control rule.
ip http secure-server cipher-suite
{cipher_algorithm} [cipher_algorithm]
[cipher_algorithm] [cipher_algorithm]
Sets the encryption algorithms (up to four) that
the ZyWALL uses for the SSL in HTTPS
connections and the sequence in which it uses
them. The cipher_algorithm can be any of
the following.
rc4: RC4 (RC4 may impact the ZyWALL’s CPU
performance since the ZyWALL’s encryption
accelerator does not support it).
aes: AES
des: DES
3des: Triple DES.
no ip http secure-server cipher-suite
{cipher_algorithm}
Has the ZyWALL not use the specified encryption
algorithm for the SSL in HTTPS connections.
[no] ip http server
Allows HTTP access to the ZyWALL web
configurator. The no command disables HTTP
access to the ZyWALL web configurator.
ip http server table {admin|user} rule
{rule_number|append|insert rule_number} accessgroup {ALL|address_object} zone
{ALL|zone_object} action {accept|deny}
Sets a service control rule for HTTP service.
ip http server table {admin|user} rule move
rule_number to rule_number
Changes the number of a HTTP service control
rule.
no ip http secure-server table {admin|user} rule
rule_number
Deletes a service control rule for HTTPS service.
no ip http server table {admin|user} rule
rule_number
Deletes a service control rule for HTTP service.
show ip http server status
Displays HTTP settings.
show ip http server secure status
Displays HTTPS settings.
ZyWALL (ZLD) CLI Reference Guide
301
Chapter 36 System Remote Management
36.3.1 HTTP/HTTPS Command Examples
This following example adds a service control rule that allowed an administrator from the
computers with the IP addresses matching the Marketing address object to access the WAN
zone using HTTP service.
Router# configure terminal
Router(config)# ip http server table admin rule append access-group
Marketing zone WAN action accept
This command sets an authentication method used by the HTTP/HTTPS server to authenticate
the client(s).
Router# configure terminal
Router(config)# ip http authentication Example
This following example sets a certificate named MyCert used by the HTTPS server to
authenticate itself to the SSL client.
Router# configure terminal
Router(config)# ip http secure-server cert MyCert
36.4 SSH
Unlike Telnet or FTP, which transmit data in clear text, SSH (Secure Shell) is a secure
communication protocol that combines authentication and data encryption to provide secure
encrypted communication between two hosts over an unsecured network.
36.4.1 SSH Implementation on the ZyWALL
Your ZyWALL supports SSH versions 1 and 2 using RSA authentication and four encryption
methods (AES, 3DES, Archfour, and Blowfish). The SSH server is implemented on the
ZyWALL for remote management on port 22 (by default).
36.4.2 Requirements for Using SSH
You must install an SSH client program on a client computer (Windows or Linux operating
system) that is used to connect to the ZyWALL over SSH.
302
ZyWALL (ZLD) CLI Reference Guide
Chapter 36 System Remote Management
36.4.3 SSH Commands
The following table describes the commands available for SSH. You must use the configure
terminal command to enter the configuration mode before you can use these commands.
Table 168 Command Summary: SSH
COMMAND
DESCRIPTION
[no] ip ssh server
Allows SSH access to the ZyWALL CLI. The no
command disables SSH access to the ZyWALL
CLI.
[no] ip ssh server cert certificate_name
Sets a certificate whose corresponding private
key is to be used to identify the ZyWALL for SSH
connections. The no command resets the
certificate used by the SSH server to the factory
default (default).
certificate_name: The name of the
certificate. You can use up to 31 alphanumeric
and ;‘~!@#$%^&()_+[]{}’,.=- characters.
[no] ip ssh server port <1..65535>
Sets the SSH service port number. The no
command resets the SSH service port number to
the factory default (22).
ip ssh server rule {rule_number|append|insert
rule_number} access-group {ALL|address_object}
zone {ALL|zone_object} action {accept|deny}
Sets a service control rule for SSH service.
address_object: The name of the IP address
(group) object. You may use 1-31 alphanumeric
characters, underscores(_), or dashes (-), but the
first character cannot be a number. This value is
case-sensitive.
zone_object: The name of the zone. For the
ZyWALL USG 300 and above, use up to 31
characters (a-zA-Z0-9_-). The name cannot start
with a number. This value is case-sensitive.
The ZyWALL USG 100 and 200 models use predefined zone names like DMZ, LAN1, SSL VPN,
WLAN, IPSec VPN, OPT, and WAN.
ip ssh server rule move rule_number to
rule_number
Changes the index number of a SSH service
control rule.
[no] ip ssh server v1
Enables remote management using SSH v1. The
no command stops the ZyWALL from using SSH
v1.
no ip ssh server rule rule_number
Deletes a service control rule for SSH service.
show ip ssh server status
Displays SSH settings.
36.4.4 SSH Command Examples
This command sets a service control rule that allowed the computers with the IP addresses
matching the specified address object to access the specified zone using SSH service.
Router# configure terminal
Router(config)# ip ssh server rule 2 access-group Marketing zone WAN action
accept
ZyWALL (ZLD) CLI Reference Guide
303
Chapter 36 System Remote Management
This command sets a certificate (Default) to be used to identify the ZyWALL.
Router# configure terminal
Router(config)# ip ssh server cert Default
36.5 Telnet
You can configure your ZyWALL for remote Telnet access.
36.6 Telnet Commands
The following table describes the commands available for Telnet. You must use the
configure terminal command to enter the configuration mode before you can use these
commands.
Table 169 Command Summary: Telnet
COMMAND
DESCRIPTION
[no] ip telnet server
Allows Telnet access to the ZyWALL CLI. The no
command disables Telnet access to the ZyWALL
CLI.
[no] ip telnet server port <1..65535>
Sets the Telnet service port number. The no
command resets the Telnet service port number
back to the factory default (23).
ip telnet server rule {rule_number|append|insert
rule_number} access-group {ALL|address_object}
zone {ALL|zone_object} action {accept|deny}
Sets a service control rule for Telnet service.
address_object: The name of the IP address
(group) object. You may use 1-31 alphanumeric
characters, underscores(_), or dashes (-), but the
first character cannot be a number. This value is
case-sensitive.
zone_object: The name of the zone. For the
ZyWALL USG 300 and above, use up to 31
characters (a-zA-Z0-9_-). The name cannot start
with a number. This value is case-sensitive.
The ZyWALL USG 100 and 200 models use predefined zone names like DMZ, LAN1, SSL VPN,
WLAN, IPSec VPN, OPT, and WAN.
ip telnet server rule move rule_number to
rule_number
Changes the index number of a service control
rule.
no ip telnet server rule rule_number
Deletes a service control rule for Telnet service.
show ip telnet server status
Displays Telnet settings.
304
ZyWALL (ZLD) CLI Reference Guide
Chapter 36 System Remote Management
36.6.1 Telnet Commands Examples
This command sets a service control rule that allowed the computers with the IP addresses
matching the specified address object to access the specified zone using Telnet service.
Router# configure terminal
Router(config)# ip telnet server rule 11 access-group RD zone LAN action
-> accept
This command displays Telnet settings.
Router# configure terminal
Router(config)# show ip telnet server status
active
: yes
port
: 23
service control:
No. Zone
Address
Action
========================================================================
Router(config)#
36.7 Configuring FTP
You can upload and download the ZyWALL’s firmware and configuration files using FTP. To
use this feature, your computer must have an FTP client.
36.7.1 FTP Commands
The following table describes the commands available for FTP. You must use the configure
terminal command to enter the configuration mode before you can use these commands.
Table 170 Command Summary: FTP
COMMAND
DESCRIPTION
[no] ip ftp server
Allows FTP access to the ZyWALL. The no
command disables FTP access to the ZyWALL.
[no] ip ftp server cert certificate_name
Sets a certificate to be used to identify the
ZyWALL. The no command resets the certificate
used by the FTP server to the factory default.
[no] ip ftp server port <1..65535>
Sets the FTP service port number. The no
command resets the FTP service port number to
the factory default (21).
[no] ip ftp server tls-required
Allows FTP access over TLS. The no command
disables FTP access over TLS.
ZyWALL (ZLD) CLI Reference Guide
305
Chapter 36 System Remote Management
Table 170 Command Summary: FTP (continued)
COMMAND
DESCRIPTION
ip ftp server rule {rule_number|append|insert
rule_number} access-group {ALL|address_object}
zone {ALL|zone_object} action {accept|deny}
Sets a service control rule for FTP service.
address_object: The name of the IP address
(group) object. You may use 1-31 alphanumeric
characters, underscores(_), or dashes (-), but the
first character cannot be a number. This value is
case-sensitive.
zone_object: The name of the zone. For the
ZyWALL USG 300 and above, use up to 31
characters (a-zA-Z0-9_-). The name cannot start
with a number. This value is case-sensitive.
The ZyWALL USG 100 and 200 models use predefined zone names like DMZ, LAN1, SSL VPN,
WLAN, IPSec VPN, OPT, and WAN.
ip ftp server rule move rule_number to
rule_number
Changes the index number of a service control
rule.
no ip ftp server rule rule_number
Deletes a service control rule for FTP service.
show ip ftp server status
Displays FTP settings.
36.7.2 FTP Commands Examples
This command sets a service control rule that allowed the computers with the IP addresses
matching the specified address object to access the specified zone using FTP service.
Router# configure terminal
Router(config)# ip ftp server rule 4 access-group Sales zone WAN action
accept
This command displays FTP settings.
Router# configure terminal
Router(config)# show ip ftp server status
active
: yes
port
: 21
certificate: default
TLS
: no
service control:
No. Zone
Address
Action
========================================================================
36.8 SNMP
Simple Network Management Protocol is a protocol used for exchanging management
information between network devices. Your ZyWALL supports SNMP agent functionality,
which allows a manager station to manage and monitor the ZyWALL through the network.
The ZyWALL supports SNMP version one (SNMPv1) and version two (SNMPv2c).
306
ZyWALL (ZLD) CLI Reference Guide
Chapter 36 System Remote Management
36.8.1 Supported MIBs
The ZyWALL supports MIB II that is defined in RFC-1213 and RFC-1215. The ZyWALL also
supports private MIBs (zywall.mib and zyxel-zywall-ZLD-Common.mib) to collect
information about CPU and memory usage and VPN total throughput. The focus of the MIBs
is to let administrators collect statistical data and monitor status and performance. You can
download the ZyWALL’s MIBs from www.zyxel.com.
36.8.2 SNMP Traps
The ZyWALL will send traps to the SNMP manager when any one of the following events
occurs:
Table 171 SNMP Traps
OBJECT LABEL
OBJECT ID
DESCRIPTION
Cold Start
1.3.6.1.6.3.1.1.5.1
This trap is sent when the ZyWALL is turned on or an
agent restarts.
linkDown
1.3.6.1.6.3.1.1.5.3
This trap is sent when the Ethernet link is down.
linkUp
1.3.6.1.6.3.1.1.5.4
This trap is sent when the Ethernet link is up.
authenticationFailure
1.3.6.1.6.3.1.1.5.5
This trap is sent when an SNMP request comes from
non-authenticated hosts.
36.8.3 SNMP Commands
The following table describes the commands available for SNMP. You must use the
configure terminal command to enter the configuration mode before you can use these
commands.
Table 172 Command Summary: SNMP
COMMAND
DESCRIPTION
[no] snmp-server
Allows SNMP access to the ZyWALL. The no
command disables SNMP access to the
ZyWALL.
[no] snmp-server community community_string
{ro|rw}
Enters up to 64 characters to set the password
for read-only (ro) or read-write (rw) access. The
no command resets the password for read-only
(ro) or read-write (rw) access to the default.
[no] snmp-server contact description
Sets the contact information (of up to 60
characters) for the person in charge of the
ZyWALL. The no command removes the contact
information for the person in charge of the
ZyWALL.
[no] snmp-server enable {informs|traps}
Enables all SNMP notifications (informs or traps).
The no command disables all SNMP
notifications (informs or traps).
[no] snmp-server host {w.x.y.z}
[community_string]
Sets the IP address of the host that receives the
SNMP notifications. The no command removes
the host that receives the SNMP notifications.
[no] snmp-server location description
Sets the geographic location (of up to 60
characters) for the ZyWALL. The no command
removes the geographic location for the
ZyWALL.
ZyWALL (ZLD) CLI Reference Guide
307
Chapter 36 System Remote Management
Table 172 Command Summary: SNMP (continued)
COMMAND
DESCRIPTION
[no] snmp-server port <1..65535>
Sets the SNMP service port number. The no
command resets the SNMP service port number
to the factory default (161).
snmp-server rule {rule_number|append|insert
rule_number} access-group {ALL|address_object}
zone {ALL|zone_object} action {accept|deny}
Sets a service control rule for SNMP service.
address_object: The name of the IP address
(group) object. You may use 1-31 alphanumeric
characters, underscores(_), or dashes (-), but the
first character cannot be a number. This value is
case-sensitive.
zone_object: The name of the zone. For the
ZyWALL USG 300 and above, use up to 31
characters (a-zA-Z0-9_-). The name cannot start
with a number. This value is case-sensitive.
The ZyWALL USG 100 and 200 models use predefined zone names like DMZ, LAN1, SSL VPN,
WLAN, IPSec VPN, OPT, and WAN.
snmp-server rule move rule_number to rule_number Changes the index number of a service control
rule.
no snmp-server rule rule_number
Deletes a service control rule for SNMP service.
show snmp status
Displays SNMP Settings.
36.8.4 SNMP Commands Examples
The following command sets a service control rule that allowed the computers with the IP
addresses matching the specified address object to access the specified zone using SNMP
service.
Router# configure terminal
Router(config)# snmp-server rule 11 access-group Example zone WAN action
accept
The following command sets the password (secret) for read-write (rw) access.
Router# configure terminal
Router(config)# snmp-server community secret rw
The following command sets the IP address of the host that receives the SNMP notifications to
172.23.15.84 and the password (sent with each trap) to qwerty.
Router# configure terminal
Router(config)# snmp-server host 172.23.15.84 qwerty
308
ZyWALL (ZLD) CLI Reference Guide
Chapter 36 System Remote Management
36.9 ICMP Filter
The ip icmp-filter commands are obsolete. See Chapter 15 on page 127 to configure
firewall rules for ICMP traffic going to the ZyWALL to discard or reject ICMP packets
destined for the ZyWALL.
Configure the ICMP filter to help keep the ZyWALL hidden from probing attempts. You can
specify whether or not the ZyWALL is to respond to probing for unused ports.
You must use the configure terminal command to enter the configuration mode before
you can use these commands.
Table 173 Command Summary: ICMP Filter
COMMAND
DESCRIPTION
[no] ip icmp-filter activate
Turns the ICMP filter on or off.
ip icmp-filter rule {<1..32>|append|insert
<1..32>} access-group {ALL|ADDRESS_OBJECT}
zone {ALL|ZONE_OBJECT} icmp-type {ALL
|echo-reply |destination-unreachable
|source-quench|redirect|echo-request|
router-advertisement|router-solicitation
|time-exceeded | parameter-problem|
timestamp-request|timestamp-reply|
address-mask-request| address-mask-reply}
action {accept|deny}
Sets an ICMP filter rule.
ADDRESS_OBJECT: The name of the IP address
(group) object. You may use 1-31 alphanumeric
characters, underscores(_), or dashes (-), but the first
character cannot be a number. This value is casesensitive.
ZONE_OBJECT: The name of the zone. You may use 131 alphanumeric characters, underscores(_), or dashes
(-), but the first character cannot be a number. This value
is case-sensitive.
no ip icmp-filter rule <1..64>
Deletes an ICMP filter rule.
ip icmp-filter rule move <1..64> to
<1..64>
Changes the index number of an ICMP filter rule.
show ip icmp-filter status
Displays ICMP filter settings.
36.10 Dial-in Management
Connect an external serial modem to the DIAL BACKUP port (or AUX port depending on
your model) to provide a remote management connection in case the ZyWALL’s other WAN
connections are down. This is like an auxiliary interface, except it is used for management
connections coming into the ZyWALL instead of as a backup WAN connection.
36.10.1 AT Command Strings
For regular telephone lines, the default Dial string tells the modem that the line uses tone
dialing. ATDT is the command for a switch that requires tone dialing. If your switch requires
pulse dialing, change the string to ATDP.
36.10.2 DTR Signal
The majority of WAN devices default to hanging up the current call when the DTR (Data
Terminal Ready) signal is dropped by the DTE. When the Drop DTR When Hang Up check
box is selected, the ZyWALL uses this hardware signal to force the WAN device to hang up, in
addition to issuing the drop command ATH.
ZyWALL (ZLD) CLI Reference Guide
309
Chapter 36 System Remote Management
36.10.3 Response Strings
The response strings tell the ZyWALL the tags, or labels, immediately preceding the various
call parameters sent from the serial modem. The response strings have not been standardized;
please consult the documentation of your serial modem to find the correct tags.
36.10.4 Dial-in Management Commands
The following table describes the commands available for dial-in management. You must use
the configure terminal command to enter the configuration mode before you can use
these commands.
Table 174 Command Summary: Dial-in Management
COMMAND
DESCRIPTION
dial-in
Enters sub-command mode.
[no] activate
Turns dial-in management on. The no command turns it
off.
[no] answer-rings
Sets how many times the ZyWALL lets the incoming dialin management session ring before processing it. The
no command sets it to one.
[no] description description
Specifies the description for the dial-in management
connection. The no command clears the description.
description: You can use alphanumeric and ()+/
:=?!*#@$_%- characters, and it can be up to 60
characters long.
[no] initial-string initial_string
Specifies the initial string of the auxiliary interface. The
no command removes the initial string.
initial_string: You can use up to 64 characters.
Semicolons (;) and backslashes (\) are not allowed.
[no] mute
Stops the external serial modem from making audible
sounds during a dial-in management session. The no
command turns the sounds back on.
[no] port-speed {9600 | 19200 | 38400 |
57600 | 115200}
Specifies the baud rate of the auxiliary interface. The no
command sets the baud rate to 115200.
show dial-in
Displays dial-in management settings.
36.10.4.1 Dial-in Management Command Examples
The following commands show you how to set up dial-in management with the following
parameters: active, port speed 57600, initial-string ATDT, and description “I am dial-in
management”.
Router# configure terminal
Router(config)# dial-in
Router(config-dial-in)# activate
Router(config-dial-in)# port-speed 57600
Router(config-dial-in)# initial-string ATDT
Router(config-dial-in)# description I am dial-in management
Router(config-dial-in)# exit
310
ZyWALL (ZLD) CLI Reference Guide
Chapter 36 System Remote Management
36.11 Vantage CNM
Vantage CNM (Centralized Network Management) is a browser-based global management
solution that allows an administrator from any location to easily configure, manage, monitor
and troubleshoot ZyXEL devices located worldwide. See the Vantage CNM User's Guide for
details.
If you allow your ZyWALL to be managed by the Vantage CNM server, then you should not
do any configurations directly to the ZyWALL (using either the web configurator or
commands) without notifying the Vantage CNM administrator.
36.11.1 Vantage CNM Commands
The following table describes the commands available for dial-in management. You must use
the configure terminal command to enter the configuration mode before you can use
these commands.
Table 175 Command Summary: Vantage CNM
COMMAND
DESCRIPTION
[no] cnm-agent manager url
Sets up the URL of the Vantage server that the ZyWALL registers with.
Include the full HTTPS or HTTP URL. For example, https://1.2.3.4/vantage/
TR069.
[no] cnm-agent activate
Turns management through Vantage CNM on or off.
cnm-agent keepalive
interval <10..90>
Sets the keepalive interval.
[no] cnm-agent periodicinform activate
Turns the periodic inform on or off.
cnm-agent periodic-inform
interval <10..86400>
Sets the periodic inform interval.
cnm-agent trigger-inform
[interval]
initiates a TR069 connection to the server. You can also specify the interval for
the inform messages.
[no] cnm-agent auth
activate
Enables or disables authentication of the server when using HTTPS.
show cnm-agent
configuration
Displays the Vantage CNM configuration.
[no] cnm-agent acs username
<username for ACS
connection request>
Configure the username of the ACS (Auto-Configuration Server) connection
request for the ZyWALL to authenticate the server using HTTP digest
authentication.
No removes the username of the ACS connection request.
[no] cnm-agent acs password
<password for ACS
connection request>
Configure the password of the ACS (Auto-Configuration Server) connection
request for the ZyWALL to authenticate the server using HTTP digest
authentication.
No removes the password of the ACS connection request.
[no] cnm-agent username
<TR-069 username>
Configure the username of the ZyWALLfor the ACS server to authenticate the
ZyWALL using HTTP digest authentication.
No removes the password of the ACS server authentication request.
ZyWALL (ZLD) CLI Reference Guide
311
Chapter 36 System Remote Management
Table 175 Command Summary: Vantage CNM
COMMAND
DESCRIPTION
[no] cnm-agent password
<TR-069 password>
Configure the password of the ZyWALL for the ACS server to authenticate the
ZyWALL using HTTP digest authentication.
No removes the password of the ACS server authentication request.
cnm-agent server-type
{vantage | tr069}
Configure the server type of the management server as either a Vantage
CNM server or a TR069 ACS server.
36.11.1.1 Vantage CNM Command Examples
The following example turns on Vantage CNM management and sets the ZyWALL to register
with a server at https://1.2.3.4/vantage/TR069.
Router# configure terminal
Router(config)# cnm-agent activate
Router(config)# cnm-agent manager https://1.2.3.4/vantage/TR069
Router(config)# show cnm-agent configuration
Activate: YES
ACS URL: https://1.2.3.4/vantage/TR069
Keepalive: ENABLE
Keepalive Interval: 60
Periodic Inform: DISABLE
Periodic Inform Interval: 3600
Custom IP: NO
HTTPS Authentication: NO
Vantage Certificate: zw1050.cer456
36.12 Language Commands
Use the language commands to display what language the web configurator is using or
change it. You must use the configure terminal command to enter the configuration
mode before you can use these commands.
Table 176 Command Summary: Language
312
COMMAND
DESCRIPTION
language <English |
Simplified_Chinese |
Traditional_Chinese>
Specifies the language used in the web configurator
screens.
show language {setting | all}
setting displays the current display language in the web
configurator screens.
all displays the available languages.
ZyWALL (ZLD) CLI Reference Guide
P ART X
Maintenance
File Manager (315)
Logs (333)
Reports and Reboot (339)
Diagnostics (347)
Packet Flow Explore (349)
Maintenance Tools (353)
313
314
CHAPTER
37
File Manager
This chapter covers how to work with the ZyWALL’s firmware, certificates, configuration
files, custom IDP signatures, packet trace results, shell scripts and temporary files.
37.1 File Directories
The ZyWALL stores files in the following directories.
Table 177 FTP File Transfer Notes
DIRECTORY FILE TYPE
FILE NAME
EXTENSION
A
Firmware (upload only)
bin
cert
Non-PKCS#12 certificates
cer
conf
Configuration files
conf
idp
IDP custom signatures
rules
packet_trace
Packet trace results (download only)
script
Shell scripts
tmp
Temporary system maintenance files and crash dumps for
technical support use (download only)
.zysh
A. After you log in through FTP, you do not need to change directories in order to upload the firmware.
37.2 Configuration Files and Shell Scripts Overview
You can store multiple configuration files and shell script files on the ZyWALL.
When you apply a configuration file, the ZyWALL uses the factory default settings for any
features that the configuration file does not include. Shell scripts are files of commands that
you can store on the ZyWALL and run when you need them. When you run a shell script, the
ZyWALL only applies the commands that it contains. Other settings do not change.
You can edit configuration files or shell scripts in a text editor and upload them to the
ZyWALL. Configuration files use a .conf extension and shell scripts use a .zysh extension.
ZyWALL (ZLD) CLI Reference Guide
315
Chapter 37 File Manager
These files have the same syntax, which is also identical to the way you run CLI commands
manually. An example is shown below.
Figure 28 Configuration File / Shell Script: Example
# enter configuration mode
configure terminal
# change administrator password
username admin password 4321 user-type admin
# configure ge3
interface ge3
ip address 172.23.37.240 255.255.255.0
ip gateway 172.23.37.254 metric 1
exit
# create address objects for remote management / to-ZyWALL firewall rules
# use the address group in case we want to open up remote management later
address-object TW_SUBNET 172.23.37.0/24
object-group address TW_TEAM
address-object TW_SUBNET
exit
# enable Telnet access (not enabled by default, unlike other services)
ip telnet server
# open WAN-to-ZyWALL firewall for TW_TEAM for remote management
firewall WAN ZyWALL insert 4
sourceip TW_TEAM
service TELNET
action allow
exit
write
While configuration files and shell scripts have the same syntax, the ZyWALL applies
configuration files differently than it runs shell scripts. This is explained below.
Table 178 Configuration Files and Shell Scripts in the ZyWALL
Configuration Files (.conf)
Shell Scripts (.zysh)
•
•
•
•
•
Resets to default configuration.
Goes into CLI Configuration mode.
Runs the commands in the configuration file.
Goes into CLI Privilege mode.
Runs the commands in the shell script.
You have to run the example in Table 28 on page 316 as a shell script because the first
command is run in Privilege mode. If you remove the first command, you have to run the
example as a configuration file because the rest of the commands are executed in
Configuration mode. (See Section 1.5 on page 17 for more information about CLI modes.)
37.2.1 Comments in Configuration Files or Shell Scripts
In a configuration file or shell script, use “#” or “!” as the first character of a command line to
have the ZyWALL treat the line as a comment.
Your configuration files or shell scripts can use “exit” or a command line consisting of a single
“!” to have the ZyWALL exit sub command mode.
316
ZyWALL (ZLD) CLI Reference Guide
Chapter 37 File Manager
"
“exit” or “!'” must follow sub commands if it is to make the ZyWALL exit sub
command mode.
Line 3 in the following example exits sub command mode.
interface ge1
ip address dhcp
!
Lines 1 and 3 in the following example are comments and line 4 exits sub command mode.
!
interface ge1
# this interface is a DHCP client
!
Lines 1 and 2 are comments. Line 5 exits sub command mode.
! this is from Joe
# on 2006/06/05
interface ge1
ip address dhcp
!
37.2.2 Errors in Configuration Files or Shell Scripts
When you apply a configuration file or run a shell script, the ZyWALL processes the file lineby-line. The ZyWALL checks the first line and applies the line if no errors are detected. Then
it continues with the next line. If the ZyWALL finds an error, it stops applying the
configuration file or shell script and generates a log.
You can change the way a configuration file or shell script is applied. Include setenv stopon-error off in the configuration file or shell script. The ZyWALL ignores any errors in
the configuration file or shell script and applies all of the valid commands. The ZyWALL still
generates a log for any errors.
37.2.3 ZyWALL Configuration File Details
You can store multiple configuration files on the ZyWALL. You can also have the ZyWALL
use a different configuration file without the ZyWALL restarting.
• When you first receive the ZyWALL, it uses the system-default.conf configuration file of
default settings.
ZyWALL (ZLD) CLI Reference Guide
317
Chapter 37 File Manager
• When you change the configuration, the ZyWALL creates a startup-config.conf file of
the current configuration.
• The ZyWALL checks the startup-config.conf file for errors when it restarts. If there is an
error in the startup-config.conf file, the ZyWALL copies the startup-config.conf
configuration file to the startup-config-bad.conf configuration file and tries the existing
lastgood.conf configuration file.
• When the ZyWALL reboots, if the startup-config.conf file passes the error check, the
ZyWALL keeps a copy of the startup-config.conf file as the lastgood.conf configuration
file for you as a back up file. If you upload and apply a configuration file with an error,
you can apply lastgood.conf to return to a valid configuration.
37.2.4 Configuration File Flow at Restart
If there is not a startup-config.conf when you restart the ZyWALL (whether through a
management interface or by physically turning the power off and back on), the ZyWALL uses
the system-default.conf configuration file with the ZyWALL’s default settings.
If there is a startup-config.conf, the ZyWALL checks it for errors and applies it. If there are
no errors, the ZyWALL uses it and copies it to the lastgood.conf configuration file. If there is
an error, the ZyWALL generates a log and copies the startup-config.conf configuration file to
the startup-config-bad.conf configuration file and tries the existing lastgood.conf
configuration file. If there isn’t a lastgood.conf configuration file or it also has an error, the
ZyWALL applies the system-default.conf configuration file.
You can change the way the startup-config.conf file is applied. Include the setenvstartup stop-on-error off command. The ZyWALL ignores any errors in the startupconfig.conf file and applies all of the valid commands. The ZyWALL still generates a log for
any errors.
37.3 File Manager Commands Input Values
The following table explains the values you can input with the file manager commands.
Table 179 File Manager Command Input Values
318
LABEL
DESCRIPTION
file_name
The name of a file. Use up to 25 characters (including a-zA-Z09;‘~!@#$%^&()_+[]{}’,.=-).
ZyWALL (ZLD) CLI Reference Guide
Chapter 37 File Manager
37.4 File Manager Commands Summary
The following table lists the commands that you can use for file management.
Table 180 File Manager Commands Summary
COMMAND
DESCRIPTION
apply /conf/file_name.conf [ignore-error]
[rollback]
Has the ZyWALL use a specific configuration file. You
must still use the write command to save your
configuration changes to the flash (“non-volatile” or
“long term”) memory.
Use this command without specify both ignoreerror and rollback: this is not recommended
because it would leave the rest of the configuration
blank. If the interfaces were not configured before the
first error, the console port may be the only way to
access the device.
Use ignore-error without rollback: this applies
the valid parts of the configuration file and generates
error logs for all of the configuration file’s errors. This
lets the ZyWALL apply most of your configuration and
you can refer to the logs for what to fix.
Use both ignore-error and rollback: this applies
the valid parts of the configuration file, generates error
logs for all of the configuration file’s errors, and starts
the ZyWALL with a fully valid configuration file.
Use rollback without ignore-error: this gets the
ZyWALL started with a fully valid configuration file as
quickly as possible.
You can use the “apply /conf/systemdefault.conf” command to reset the ZyWALL to go
back to its system defaults.
copy {/cert | /conf | /idp | /packet_trace |
/script | /tmp}file_name-a.conf {/cert | /
conf | /idp | /packet_trace | /script | /
tmp}/file_name-b.conf
Saves a duplicate of a file on the ZyWALL from the
source file name to the target file name.
Specify the directory and file name of the file that you
want to copy and the directory and file name to use for
the duplicate. Always copy the file into the same
directory.
copy running-config startup-config
Saves your configuration changes to the flash (“nonvolatile” or “long term”) memory. The ZyWALL
immediately uses configuration changes made via
commands, but if you do not use this command or the
write command, the changes will be lost when the
ZyWALL restarts.
copy running-config /conf/file_name.conf
Saves a duplicate of the configuration file that the
ZyWALL is currently using. You specify the file name to
which to copy.
delete {/cert | /conf | /idp | /packet_trace
| /script | /tmp}/file_name
Removes a file. Specify the directory and file name of
the file that you want to delete.
dir {/cert | /conf | /idp | /packet_trace |
/script | /tmp}
Displays the list of files saved in the specified directory.
rename {/cert | /conf | /idp | /packet_trace
| /script | /tmp}/old-file_name {/cert | /
conf | /idp | /packet_trace | /script | /
tmp}/new-file_name
Changes the name of a file.
Specify the directory and file name of the file that you
want to rename. Then specify the directory again
followed by the new file name.
rename /script/old-file_name /script/newfile_name
Changes the name of a shell script.
ZyWALL (ZLD) CLI Reference Guide
319
Chapter 37 File Manager
Table 180 File Manager Commands Summary (continued)
COMMAND
DESCRIPTION
run /script/file_name.zysh
Has the ZyWALL execute a specific shell script file.
You must still use the write command to save your
configuration changes to the flash (“non-volatile” or
“long term”) memory.
show running-config
Displays the settings of the configuration file that the
system is using.
setenv-startup stop-on-error off
Has the ZyWALL ignore any errors in the startupconfig.conf file and apply all of the valid commands.
show setenv-startup
Displays whether or not the ZyWALL is set to ignore
any errors in the startup-config.conf file and apply all of
the valid commands.
write
Saves your configuration changes to the flash (“nonvolatile” or “long term”) memory. The ZyWALL
immediately uses configuration changes made via
commands, but if you do not use the write
command, the changes will be lost when the ZyWALL
restarts.
37.5 File Manager Command Example
This example saves a back up of the current configuration before applying a shell script file.
Router(config)# copy running-config /conf/backup.conf
Router(config)# run /script/vpn_setup.zysh
37.6 FTP File Transfer
You can use FTP to transfer files to and from the ZyWALL for advanced maintenance and
support.
37.6.1 Command Line FTP File Upload
1 Connect to the ZyWALL.
2 Enter “bin” to set the transfer mode to binary.
3 You can upload the firmware after you log in through FTP. To upload other files, use
“cd” to change to the corresponding directory.
4 Use “put” to transfer files from the computer to the ZyWALL.1 For example:
In the conf directory, use "put config.conf today.conf” to upload the configuration file
(config.conf) to the ZyWALL and rename it “today.conf”.
"put 1.00(XL.0).bin” transfers the firmware (1.00(XL.0).bin) to the ZyWALL.
1.
320
When you upload a custom signature, the ZyWALL appends it to the existing custom signatures stored in the
"custom.rules” file.
ZyWALL (ZLD) CLI Reference Guide
Chapter 37 File Manager
1
The firmware update can take up to five minutes. Do not turn off or reset the
ZyWALL while the firmware update is in progress! If you lose power during the
firmware upload, you may need to refer to Section 37.8 on page 323 to recover
the firmware.
37.6.2 Command Line FTP Configuration File Upload Example
The following example transfers a configuration file named tomorrow.conf from the computer
and saves it on the ZyWALL as next.conf.
"
Uploading a custom signature file named "custom.rules”, overwrites all custom
signatures on the ZyWALL.
Figure 29 FTP Configuration File Upload Example
C:\>ftp 192.168.1.1
Connected to 192.168.1.1.
220 FTP Server (ZyWALL) [192.168.1.1]
User (192.168.1.1:(none)): admin
331 Password required for admin.
Password:
230 User admin logged in.
ftp> cd conf
250 CWD command successful
ftp> bin
200 Type set to I
ftp> put tomorrow.conf next.conf
200 PORT command successful
150 Opening BINARY mode data connection for next.conf
226-Post action ok!!
226 Transfer complete.
ftp: 20231 bytes sent in 0.00Seconds 20231000.00Kbytes/sec.
37.6.3 Command Line FTP File Download
1
2
3
4
5
Connect to the ZyWALL.
Enter “bin” to set the transfer mode to binary.
Use “cd” to change to the directory that contains the files you want to download.
Use “dir” or “ls” if you need to display a list of the files in the directory.
Use "get” to download files. For example:
“get vpn_setup.zysh vpn.zysh” transfers the vpn_setup.zysh configuration file on the
ZyWALL to your computer and renames it “vpn.zysh.”
ZyWALL (ZLD) CLI Reference Guide
321
Chapter 37 File Manager
37.6.4 Command Line FTP Configuration File Download Example
The following example gets a configuration file named today.conf from the ZyWALL and
saves it on the computer as current.conf.
Figure 30 FTP Configuration File Download Example
C:\>ftp 192.168.1.1
Connected to 192.168.1.1.
220 FTP Server (ZyWALL) [192.168.1.1]
User (192.168.1.1:(none)): admin
331 Password required for admin.
Password:
230 User admin logged in.
ftp> bin
200 Type set to I
ftp> cd conf
250 CWD command successful
ftp> get today.conf current.conf
200 PORT command successful
150 Opening BINARY mode data connection for conf/today.conf
(20220 bytes)
226 Transfer complete.
ftp: 20220 bytes received in 0.03Seconds 652.26Kbytes/sec.
37.7 ZyWALL File Usage at Startup
The ZyWALL uses the following files at system startup.
Figure 31 ZyWALL File Usage at Startup
1. Boot Module
2. Recovery Image
3. Firmware
1 The boot module performs a basic hardware test. You cannot restore the boot module if it
is damaged. The boot module also checks and loads the recovery image. The ZyWALL
notifies you if the recovery image is damaged.
2 The recovery image checks and loads the firmware. The ZyWALL notifies you if the
firmware is damaged.
322
ZyWALL (ZLD) CLI Reference Guide
Chapter 37 File Manager
37.8 Notification of a Damaged Recovery Image or Firmware
The ZyWALL’s recovery image and/or firmware could be damaged, for example by the power
going off during a firmware upgrade. This section describes how the ZyWALL notifies you of
a damaged recovery image or firmware file. Use this section if your device has stopped
responding for an extended period of time and you cannot access or ping it. Note that the
ZyWALL does not respond while starting up. It takes less than five minutes to start up with the
default configuration, but the start up time increases with the complexity of your
configuration.
1 Use a console cable and connect to the ZyWALL via a terminal emulation program (such
as HyperTerminal). Your console session displays the ZyWALL’s startup messages. If
you cannot see any messages, check the terminal emulation program’s settings (see
Section 1.2.1 on page 12) and restart the ZyWALL.
2 The system startup messages display followed by “Press any key to enter debug mode
within 3 seconds.”
"
Do not press any keys at this point. Wait to see what displays next.
Figure 32 System Startup Stopped
3 If the console session displays “Invalid Firmware”, or “Invalid Recovery Image”, or the
console freezes at "Press any key to enter debug mode within 3 seconds" for more than
one minute, go to Section 37.9 on page 324 to restore the recovery image.
Figure 33 Recovery Image Damaged
4 If “Connect a computer to port 1 and FTP to 192.168.1.1 to upload the new file”
displays on the screen, the firmware file is damaged. Use the procedure in Section 37.10
ZyWALL (ZLD) CLI Reference Guide
323
Chapter 37 File Manager
on page 326 to restore it. If the message does not display, the firmware is OK and you do
not need to use the firmware recovery procedure.
Figure 34 Firmware Damaged
37.9 Restoring the Recovery Image
This procedure requires the ZyWALL’s recovery image. Download the firmware package
from www.zyxel.com and unzip it. The recovery image uses a .ri extension, for example,
"1.01(XL.0)C0.ri". Do the following after you have obtained the recovery image file.
"
You only need to use this section if you need to restore the recovery image.
1 Restart the ZyWALL.
2 When “Press any key to enter debug mode within 3 seconds.” displays, press a key to
enter debug mode.
Figure 35 Enter Debug Mode
3 Enter atuk to initialize the recovery process.If the screen displays “ERROR”, enter
atur to initialize the recovery process.
"
324
You only need to use the atuk or atur command if the recovery image is
damaged.
ZyWALL (ZLD) CLI Reference Guide
Chapter 37 File Manager
Figure 36 atuk Command for Restoring the Recovery Image
4 Enter Y and wait for the “Starting XMODEM upload” message before activating
XMODEM upload on your terminal.
Figure 37 Starting Xmodem Upload
5 This is an example Xmodem configuration upload using HyperTerminal. Click
Transfer, then Send File to display the following screen.
Figure 38 Example Xmodem Upload
Type the firmware file's
location, or click Browse to
search for it.
Choose the 1K Xmodem
protocol.
Then click Send.
6 Wait for about three and a half minutes for the Xmodem upload to finish.
Figure 39 Recovery Image Upload Complete
7 Enter atgo. The ZyWALL starts up. If “Connect a computer to port 1 and FTP to
192.168.1.1 to upload the new file” displays on the screen, the firmware file is damaged
and you need to use the procedure in Section 37.10 on page 326 to recover the firmware.
ZyWALL (ZLD) CLI Reference Guide
325
Chapter 37 File Manager
Figure 40 atgo Debug Command
37.10 Restoring the Firmware
This procedure requires the ZyWALL’s firmware. Download the firmware package from
www.zyxel.com and unzip it. The firmware file uses a .bin extension, for example,
"1.01(XL.0)C0.bin". Do the following after you have obtained the firmware file.
"
This section is not for normal firmware uploads. You only need to use this
section if you need to recover the firmware.
1 Connect your computer to the ZyWALL’s port 1 (only port 1 can be used).
2 The ZyWALL’s FTP server IP address for firmware recovery is 192.168.1.1, so set your
computer to use a static IP address from 192.168.1.2 ~192.168.1.254.
3 Use an FTP client on your computer to connect to the ZyWALL. For example, in the
Windows command prompt, type ftp 192.168.1.1. Keep the console session
connected in order to see when the firmware recovery finishes.
4 Hit enter to log in anonymously.
5 Set the transfer mode to binary (type bin).
6 Transfer the firmware file from your computer to the ZyWALL. Type put followed by
the path and name of the firmware file. This examples uses put e:\ftproot\ZLD
FW \1.01(XL.0)C0.bin.
Figure 41 FTP Firmware Transfer Command
7 Wait for the file transfer to complete.
Figure 42 FTP Firmware Transfer Complete
326
ZyWALL (ZLD) CLI Reference Guide
Chapter 37 File Manager
8 After the transfer is complete, “Firmware received” or “ZLD-current received” displays.
Wait (up to four minutes) while the ZyWALL recovers the firmware.
Figure 43 Firmware Received and Recovery Started
9 The console session displays “done” when the firmware recovery is complete. Then the
ZyWALL automatically restarts.
Figure 44 Firmware Recovery Complete and Restart
10 The username prompt displays after the ZyWALL starts up successfully. The firmware
recovery process is now complete and the ZyWALL is ready to use.
ZyWALL (ZLD) CLI Reference Guide
327
Chapter 37 File Manager
Figure 45 Restart Complete
37.11 Restoring the Default System Database
The default system database stores information such as the default anti-virus or IDP
signatures. The ZyWALL can still operate if the default system database is damaged or
missing, but related features (like anti-virus or IDP) may not function properly.
If the default system database file is not valid, the ZyWALL displays a warning message in
your console session at startup or when reloading the anti-virus or IDP signatures. It also
generates a log. Here are some examples. Use this section to restore the ZyWALL’s default
system database.
328
ZyWALL (ZLD) CLI Reference Guide
Chapter 37 File Manager
Figure 46 Default System Database Console Session Warning at Startup: Anti-virus
Figure 47 Default System Database Console Session Warning When Reloading IDP
Figure 48 Default System Database Missing Log: Anti-virus
This procedure requires the ZyWALL’s default system database file. Download the firmware
package from www.zyxel.com and unzip it. The default system database file uses a .db
extension, for example, "1.01(XL.0)C0.db". Do the following after you have obtained the
default system database file.
ZyWALL (ZLD) CLI Reference Guide
329
Chapter 37 File Manager
37.11.1 Using the atkz -u Debug Command
"
You only need to use the atkz -u command if the default system database is
damaged.
1 Restart the ZyWALL.
2 When “Press any key to enter debug mode within 3 seconds.” displays, press a key to
enter debug mode.
Figure 49 Enter Debug Mode
3 Enter atkz -u to start the recovery process.
Figure 50 atkz -u Command for Restoring the Default System Database
4 “Connect a computer to port 1 and FTP to 192.168.1.1 to upload the new file” displays
on the screen. Connect your computer to the ZyWALL’s port 1 (only port 1 can be used).
Figure 51 Use FTP with Port 1 and IP 192.168.1.1 to Upload File
5 The ZyWALL’s FTP server IP address for firmware recovery is 192.168.1.1, so set your
computer to use a static IP address from 192.168.1.2 ~192.168.1.254.
6 Use an FTP client on your computer to connect to the ZyWALL. For example, in the
Windows command prompt, type ftp 192.168.1.1. Keep the console session
connected in order to see when the default system database recovery finishes.
7 Hit enter to log in anonymously.
330
ZyWALL (ZLD) CLI Reference Guide
Chapter 37 File Manager
8 Set the transfer mode to binary (type bin).
9 Transfer the firmware file from your computer to the ZyWALL. Type put followed by
the path and name of the firmware file. This examples uses put e:\ftproot\ZLD
FW \1.01(XL.0)C0.db.
Figure 52 FTP Default System Database Transfer Command
10 Wait for the file transfer to complete.
Figure 53 FTP Default System Database Transfer Complete
11 The console session displays “done” after the default system database is recovered.
Figure 54 Default System Database Received and Recovery Complete
12 The username prompt displays after the ZyWALL starts up successfully. The default
system database recovery process is now complete and the ZyWALL IDP and anti-virus
features are ready to use again.
ZyWALL (ZLD) CLI Reference Guide
331
Chapter 37 File Manager
Figure 55 Startup Complete
332
ZyWALL (ZLD) CLI Reference Guide
CHAPTER
38
Logs
This chapter provides information about the ZyWALL’s logs.
"
When the system log reaches the maximum number of log messages, new log
messages automatically overwrite existing log messages, starting with the
oldest existing log message first.
See the User’s Guide for the maximum number of system log messages in the ZyWALL.
38.1 Log Commands Summary
The following table describes the values required for many log commands. Other values are
discussed with the corresponding commands.
Table 181 Input Values for Log Commands
LABEL
DESCRIPTION
module_name
The name of the category; kernel, syslog, .... The default category
includes debugging messages generated by open source software. The all
category includes all messages in all categories.
The following sections list the logging commands.
38.1.1 Log Entries Commands
This table lists the commands to look at log entries.
Table 182 logging Commands: Log Entries
COMMAND
DESCRIPTION
show logging entries [priority pri] [category
module_name] [srcip ip] [dstip ip] [service
service_name] [begin <1..512> end <1..512>]
[keyword keyword]
Displays the selected entries in the system log.
PRI: alert | crit | debug | emerg | error | info | notice
| warn
keyword: You can use alphanumeric and ()+/
:=?!*#@$_%- characters, and it can be up to 63
characters long.This searches the message,
source, destination, and notes fields.
show logging entries field field [begin
<1..512> end <1..512>]
Displays the selected fields in the system log.
field: time | msg | src | dst | note | pri | cat | all
ZyWALL (ZLD) CLI Reference Guide
333
Chapter 38 Logs
38.1.2 System Log Commands
This table lists the commands for the system log settings.
Table 183 logging Commands: System Log Settings
COMMAND
DESCRIPTION
show logging status system-log
Displays the current settings for the system log.
logging system-log category module_name
{disable | level normal | level all}
Specifies what kind of information, if any, is logged
in the system log and debugging log for the
specified category.
[no] logging system-log suppression interval
<10..600>
Sets the log consolidation interval for the system
log. The no command sets the interval to ten.
[no] logging system-log suppression
Enables log consolidation in the system log. The
no command disables log consolidation in the
system log.
[no] connectivity-check continuous-log
activate
Has the ZyWALL generate a log for each
connectivity check. The no command has the
ZyWALL only log the first connectivity check.
show connectivity-check continuous-log status
Displays whether or not the ZyWALL generates a
log for each connectivity check.
clear logging system-log buffer
Clears the system log.
38.1.2.1 System Log Command Examples
The following command displays the current status of the system log.
Router# configure terminal
Router(config)# show logging status system-log
512 events logged
suppression active : yes
suppression interval: 10
category settings
:
content-filter
: normal , forward-web-sites : no
blocked-web-sites : normal , user
: normal
myZyXEL.com
: normal , zysh
: normal
idp
: normal , app-patrol
: normal
ike
: normal , ipsec
: normal
firewall
: normal , sessions-limit
: normal
policy-route
: normal , built-in-service : normal
system
: normal , connectivity-check: normal
device-ha
: normal , routing-protocol : normal
nat
: normal , pki
: normal
interface
: normal , interface-statistics: no
account
: normal , port-grouping
: normal
force-auth
: normal , l2tp-over-ipsec
: normal
anti-virus
: normal , white-list
: normal
black-list
: normal , ssl-vpn
: normal
cnm
: normal , traffic-log
: no
file-manage
: normal , dial-in
: normal
adp
: normal , default
: all
334
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
ZyWALL (ZLD) CLI Reference Guide
Chapter 38 Logs
38.1.3 Debug Log Commands
This table lists the commands for the debug log settings.
Table 184 logging Commands: Debug Log Settings
COMMAND
DESCRIPTION
show logging debug status
Displays the current settings for the debug log.
show logging debug entries [priority pri]
[category module_name] [srcip ip] [dstip ip]
[service service_name] [begin <1..512> end
<1..512>] [keyword keyword]
Displays the selected entries in the debug log.
pri: alert | crit | debug | emerg | error | info | notice
| warn
keyword: You can use alphanumeric and ()+/
:=?!*#@$_%- characters, and it can be up to 63
characters long.This searches the message,
source, destination, and notes fields.
show logging debug entries field field [begin
<1..1024> end <1..1024>]
Displays the selected fields in the debug log.
field: time | msg | src | dst | note | pri | cat | all
[no] logging debug suppression
Enables log consolidation in the debug log. The no
command disables log consolidation in the debug
log.
[no] logging debug suppression interval
<10..600>
Sets the log consolidation interval for the debug
log. The no command sets the interval to ten.
clear logging debug buffer
Clears the debug log.
This table lists the commands for the remote syslog server settings.
Table 185 logging Commands: Remote Syslog Server Settings
COMMAND
DESCRIPTION
show logging status syslog
Displays the current settings for the remote
servers.
[no] logging syslog <1..4>
Enables the specified remote server. The no
command disables the specified remote server.
[no] logging syslog <1..4> address {ip |
hostname}
Sets the URL or IP address of the specified remote
server. The no command clears this field.
hostname: You may up to 63 alphanumeric
characters, dashes (-), or periods (.), but the first
character cannot be a period.
[no] logging syslog <1..4> {disable | level
normal | level all}
Specifies what kind of information, if any, is logged
for the specified category.
[no] logging syslog <1..4> facility {local_1 |
local_2 | local_3 | local_4 | local_5 | local_6
| local_7}
Sets the log facility for the specified remote server.
The no command sets the facility to local_1.
[no] logging syslog <1..4> format {cef | vrpt}
Sets the format of the log information.
cef: Common Event Format, syslog-compatible
format.
vrpt: ZyXEL’s Vantage Report, syslog-compatible
format.
ZyWALL (ZLD) CLI Reference Guide
335
Chapter 38 Logs
This table lists the commands for setting how often to send information to the VRPT (ZyXEL’s
Vantage Report) server.
Table 186 logging Commands: VRPT Settings
COMMAND
DESCRIPTION
vrpt send device information interval
<15..3600>
Sets the interval (in seconds) for how often the
ZyWALL sends a device information log to the
VRPT server.
vrpt send interface statistics interval
<15..3600>
Sets the interval (in seconds) for how often the
ZyWALL sends an interface statistics log to the
VRPT server.
vrpt send system status interval <15..3600>
Sets the interval (in seconds) for how often the
ZyWALL sends a system status log to the VRPT
server.
show vrpt send device information interval
Displays the interval (in seconds) for how often the
ZyWALL sends a device information log to the
VRPT server.
show vrpt send interface statistics interval
Displays the interval (in seconds) for how often the
ZyWALL sends an interface statistics log to the
VRPT server.
show vrpt send system status interval
Displays the interval (in seconds) for how often the
ZyWALL sends a system status log to the VRPT
server.
38.1.4 E-mail Profile Commands
This table lists the commands for the e-mail profile settings.
Table 187 logging Commands: E-mail Profile Settings
COMMAND
DESCRIPTION
show logging status mail
Displays the current settings for the e-mail profiles.
[no] logging mail <1..2>
Enables the specified e-mail profile. The no
command disables the specified e-mail profile.
[no] logging mail <1..2> address {ip |
hostname}
Sets the URL or IP address of the mail server for
the specified e-mail profile. The no command
clears the mail server field.
hostname: You may up to 63 alphanumeric
characters, dashes (-), or periods (.), but the first
character cannot be a period.
logging mail <1..2> sending_now
Sends mail for the specified e-mail profile
immediately, according to the current settings.
[no] logging mail <1..2> authentication
Enables SMTP authentication. The no command
disables SMTP authentication.
[no] logging mail <1..2> authentication
username username password password
Sets the username and password required by the
SMTP mail server. The no command clears the
username and password fields.
username: You can use alphanumeric characters,
underscores (_), and dashes (-), and it can be up to
31 characters long.
password: You can use most printable ASCII
characters. You cannot use square brackets [ ],
double quotation marks (“), question marks (?),
tabs or spaces. It can be up to 31 characters long.
336
ZyWALL (ZLD) CLI Reference Guide
Chapter 38 Logs
Table 187 logging Commands: E-mail Profile Settings (continued)
COMMAND
DESCRIPTION
[no] logging mail <1..2> {send-log-to | sendalerts-to} e_mail
Sets the e-mail address for logs or alerts. The no
command clears the specified field.
e_mail: You can use up to 63 alphanumeric
characters, underscores (_), or dashes (-), and you
must use the @ character.
[no] logging mail <1..2> subject subject
Sets the subject line when the ZyWALL mails to the
specified e-mail profile. The no command clears
this field.
subject: You can use up to 60 alphanumeric
characters, underscores (_), dashes (-), or
!@#$%*()+=;:’,./ characters.
[no] logging mail <1..2> category module_name
level {alert | all}
Specifies what kind of information is logged for the
specified category. The no command disables
logging for the specified category.
[no] logging mail <1..2> schedule {full |
hourly}
Sets the e-mail schedule for the specified e-mail
profile. The no command clears the schedule field.
logging mail <1..2> schedule daily hour
<0..23> minute <0..59>
Sets a daily e-mail schedule for the specified e-mail
profile.
logging mail <1..2> schedule weekly day day
hour <0..23> minute <0..59>
Sets a weekly e-mail schedule for the specified email profile.
day: sun | mon | tue | wed | thu | fri | sat
38.1.4.1 E-mail Profile Command Examples
The following commands set up e-mail log 1.
Router# configure terminal
Router(config)# logging mail
Router(config)# logging mail
Router(config)# logging mail
XXXXXX
Router(config)# logging mail
Router(config)# logging mail
Router(config)# logging mail
Router(config)# logging mail
Router(config)# logging mail
1 address mail.zyxel.com.tw
1 subject AAA
1 authentication username lachang.li password
1
1
1
1
1
send-log-to lachang.li@zyxel.com.tw
send-alerts-to lachang.li@zyxel.com.tw
from lachang.li@zyxel.com.tw
schedule weekly day mon hour 3 minute 3
38.1.5 Console Port Logging Commands
This table lists the commands for the console port settings.
Table 188 logging Commands: Console Port Settings
COMMAND
DESCRIPTION
show logging status console
Displays the current settings for the console log.
(This log is not discussed above.)
[no] logging console
Enables the console log. The no command
disables the console log.
ZyWALL (ZLD) CLI Reference Guide
337
Chapter 38 Logs
Table 188 logging Commands: Console Port Settings (continued)
COMMAND
DESCRIPTION
logging console category module_name level
{alert | crit | debug | emerg | error | info |
notice | warn}
Controls whether or not debugging information for
the specified priority is displayed in the console log,
if logging for this category is enabled.
[no] logging console category module_name
Enables logging for the specified category in the
console log. The no command disables logging.
338
ZyWALL (ZLD) CLI Reference Guide
CHAPTER
39
Reports and Reboot
This chapter provides information about the report associated commands and how to restart
the ZyWALL using commands. It also covers the daily report e-mail feature.
39.1 Report Commands Summary
The following sections list the report and session commands.
39.1.1 Report Commands
This table lists the commands for reports.
Table 189 report Commands
COMMAND
DESCRIPTION
[no] report
Begins data collection. The no command stops
data collection.
show report status
Displays whether or not the ZyWALL is collecting
data and how long it has collected data.
clear report [interface_name]
Clears the report for the specified interface or for all
interfaces.
show report [interface_name {ip | service |
url}]
Displays the traffic report for the specified interface
and controls the format of the report. Formats are:
ip - traffic by IP address and direction
service - traffic by service and direction
url - hits by URL
ZyWALL (ZLD) CLI Reference Guide
339
Chapter 39 Reports and Reboot
39.1.2 Report Command Examples
The following commands start collecting data, display the traffic reports, and stop collecting
data.
Router# configure terminal
Router(config)# show report ge1 ip
No. IP Address
User
Amount
Direction
===================================================================
1
192.168.1.4
admin
1273(bytes)
Outgoing
2
192.168.1.4
admin
711(bytes)
Incoming
Router(config)# show report ge1 service
No. Port Service
Amount
Direction
====================================================================
1
21
ftp
1273(bytes)
Outgoing
2
21
ftp
711(bytes)
Incoming
Router(config)# show report ge1 url
No. Hit
URL
=====================================================================
1
1
140.114.79.60
Router(config)# show report status
Report status: on
Collection period: 0 days 0 hours 0 minutes 18 seconds
39.1.3 Session Commands
This table lists the command to display the current sessions for debugging or statistical
analysis.
Table 190 session Commands
COMMAND
DESCRIPTION
show conn [user {username|any|unknown}]
[service {service-name|any|unknown}] [source
{ip|any}] [destination {ip|any}] [begin
<1..128000>] [end <1..128000>]
Displays information about the selected sessions
or about all sessions. You can look at all the active
sessions or filter the information by user name,
service object, source IP, destination IP, or session
number(s).
any means all users, services and IP addresses
resepectively.
unknow means unknown users and services
resepectively.
show conn ip-traffic destination
Displays information about traffic session sorted by
the destination.
show conn ip-traffic source
Displays information about traffic session sorted by
the source.
show conn status
Displays the number of active sessions.
340
ZyWALL (ZLD) CLI Reference Guide
Chapter 39 Reports and Reboot
39.2 Email Daily Report Commands
The following table identifies the values used in some of these commands. Other input values
are discussed with the corresponding commands.
Table 191 Input Values for Email Daily Report Commands
LABEL
DESCRIPTION
e_mail
An e-mail address. You can use up to 80 alphanumeric characters, underscores
(_), periods (.), or dashes (-), and you must use the @ character.
Use these commands to have the ZyWALL e-mail you system statistics every day. You must
use the configure terminal command to enter the configuration mode before you can use
these commands.
Table 192 Email Daily Report Commands
COMMAND
DESCRIPTION
daily-report [no] activate
Turns daily e-mail reports on or off.
show daily-report status
Displays the e-mail daily report settings.
daily-report smtp-address {ip | hostname}
Sets the SMTP mail server IP address or domain
name.
daily-report [no] smtp-auth activate
Enables or disables SMTP authentication.
daily-report smtp-auth username username
password password
Sets the username and password for SMTP
authentication.
daily-report no smtp-address
Resets the SMTP mail server configuration.
daily-report no smtp-auth username
Resets the authentication configuration.
daily-report mail-subject set subject
Configures the subject of the report e-mails.
daily-report no mail-subject set
Clears the configured subject for the report emails.
daily-report [no] mail-subject append systemname
Determines whether the system name will be
appended to the subject of report mail.
daily-report [no] mail-subject append date-time Determine whether the sending date-time will be
appended at subject of the report e-mails.
daily-report mail-from e_mail
Sets the sender value of the report e-mails.
daily-report mail-to-1 e_mail
Sets to whom the ZyWALL sends the report emails (up to five recipients).
daily-report mail-to-2 e_mail
See above.
daily-report mail-to-3 e_mail
See above.
daily-report mail-to-4 e_mail
See above.
daily-report mail-to-5 e_mail
See above.
daily-report [no] item cf-report
Determines whether or not content filtering
statistics are included in the report e-mails.
daily-report [no] item cpu-usage
Determines whether or not CPU usage statistics
are included in the report e-mails.
daily-report [no] item mem-usage
Determines whether or not memory usage
statistics are included in the report e-mails.
ZyWALL (ZLD) CLI Reference Guide
341
Chapter 39 Reports and Reboot
Table 192 Email Daily Report Commands (continued)
COMMAND
DESCRIPTION
daily-report [no] item session-usage
Determines whether or not session usage
statistics are included in the report e-mails.
daily-report [no] item port-usage
Determines whether or not port usage statistics
are included in the report e-mails.
daily-report [no] item idp-report
Determines whether or not IDP statistics are
included in the report e-mails.
daily-report [no] item av-report
Determines whether or not anti-virus statistics are
included in the report e-mails.
daily-report [no] item as-report
Determines whether or not anti-spam statistics are
included in the report e-mails.
daily-report [no] item traffic-report
Determines whether or not network traffic
statistics are included in the report e-mails.
daily-report schedule hour <0..23> minute
<00..59>
Sets the time for sending out the report e-mails.
[no] daily-report reset-counter
Determines whether or not to clear the report
statistics data after successfully sending out a
report e-mail.
daily-report send-now
Sends the daily e-mail report immediately.
let user actively send out the report e-mails.
daily-report reset-counter-now
Discards all report data and starts all of the
counters over at zero.
39.2.1 Email Daily Report Example
This example sets the ZyWALL to send a daily report e-mail.
Router(config)#
Router(config)#
Router(config)#
Router(config)#
Router(config)#
Router(config)#
Router(config)#
Router(config)#
Router(config)#
Router(config)#
Router(config)#
Router(config)#
Router(config)#
Router(config)#
Router(config)#
Router(config)#
Router(config)#
Router(config)#
Router(config)#
Router(config)#
Router(config)#
Router(config)#
Router(config)#
Router(config)#
342
no daily-report activate
daily-report smtp-address example-SMTP-mail-server.com
daily-report mail-subject set test subject
no daily-report mail-subject append system-name
daily-report mail-subject append date-time
daily-report mail-from my-email@example.com
daily-report example-administrator@example.com
no daily-report mail-to-2
no daily-report mail-to-3
daily-report mail-to-4 my-email@example.com
no daily-report mail-to-5
daily-report smtp-auth activate
daily-report smtp-auth username 12345 password pass12345
daily-report schedule hour 13 minutes 57
no daily-report schedule reset-counter
daily-report item cpu-usage
daily-report item mem-usage
daily-report item session-usage
daily-report item port-usage
daily-report item idp-report
daily-report item av-report
daily-report item as-report
daily-report item traffic-report
daily-report activate
ZyWALL (ZLD) CLI Reference Guide
Chapter 39 Reports and Reboot
This displays the email daily report settings and has the ZyWALL send the report now.
Router(config)# show daily-report status
email daily report status
=========================
activate: yes
scheduled time: 13:57
reset counter: no
smtp address: example-SMTP-mail-server.com
smtp auth: yes
smtp username: 12345
smtp password: pass12345
mail subject: test subject
append system name: no
append date time: yes
mail from: my-email@example.com
mail-to-1: example-administrator@example.com
mail-to-2:
mail-to-3:
mail-to-4: my-email@example.com
mail-to-5:
cpu-usage: yes
mem-usage: yes
session-usage: yes
port-usage: yes
idp-report: yes
av-report: yes
as-report: yes
traffic-report: yes
Router(config)# daily-report send-now
39.3 Reboot
Use this to restart the device (for example, if the device begins behaving erratically).
If you made changes in the CLI, you have to use the write command to save the
configuration before you reboot. Otherwise, the changes are lost when you reboot.
Use the reboot command to restart the device.
ZyWALL (ZLD) CLI Reference Guide
343
Chapter 39 Reports and Reboot
344
ZyWALL (ZLD) CLI Reference Guide
CHAPTER
40
Session Timeout
Use these commands to modify and display the session timeout values. You must use the
configure terminal command before you can use these commands.
Table 193 Session Timeout Commands
COMMAND
DESCRIPTION
session timeout {udp-connect <1..300> | udpdeliver <1..300> | icmp <1..300>}
Sets the timeout for UDP sessions to connect or
deliver and for ICMP sessions.
session timeout session {tcp-established |
tcp-synrecv | tcp-close | tcp-finwait | tcpsynsent | tcp-closewait | tcp-lastack | tcptimewait} <1..300>
Sets the timeout for TCP sessions in the
ESTABLISHED, SYN_RECV, FIN_WAIT,
SYN_SENT, CLOSE_WAIT, LAST_ACK, or
TIME_WAIT state.
show session timeout {icmp | tcp-timewait |
udp}
Displays ICMP, TCP, and UDP session timeouts.
The following example sets the UDP session connect timeout to 10 seconds, the UDP deliver
session timeout to 15 seconds, and the ICMP timeout to 15 seconds.
Router(config)# session timeout udp-connect 10
Router(config)# session timeout udp-deliver 15
Router(config)# session timeout icmp 15
Router(config)# show session timeout udp
UDP session connect timeout: 10 seconds
UDP session deliver timeout: 15 seconds
Router(config)# show session timeout icmp
ICMP session timeout: 15 seconds
ZyWALL (ZLD) CLI Reference Guide
345
Chapter 40 Session Timeout
346
ZyWALL (ZLD) CLI Reference Guide
CHAPTER
41
Diagnostics
This chapter covers how to use the diagnostics feature.
41.1 Diagnostics
The diagnostics feature provides an easy way for you to generate a file containing the
ZyWALL’s configuration and diagnostic information. You may need to generate this file and
send it to customer support during troubleshooting.
41.2 Diagnosis Commands
The following table lists the commands that you can use to have the ZyWALL collect
diagnostics information. Use the configure terminal command to enter the configuration
mode to be able to use these commands.
Table 194 diagnosis Commands
COMMAND
DESCRIPTION
diag-info collect
Has the ZyWALL create a new diagnostic file.
show diag-info
Displays the name, size, and creation date (in yyyy-mm-dd hh:mm:ss format) of the
diagnostic file.
41.3 Diagnosis Commands Example
The following example creates a diagnostic file and displays its name, size, and creation date.
Router# configure terminal
Router(config)# diag-info collect
Please wait, collecting information
Router(config)# show diag-info
Filename : diaginfo-20070423.tar.bz2
File size : 1259 KB
Date
: 2007-04-23 09:55:09
ZyWALL (ZLD) CLI Reference Guide
347
Chapter 41 Diagnostics
348
ZyWALL (ZLD) CLI Reference Guide
CHAPTER
42
Packet Flow Explore
This chapter covers how to use the packet flow explore feature.
42.1 Packet Flow Explore
Use this to get a clear picture on how the ZyWALL determines where to forward a packet and
how to change the source IP address of the packet according to your current settings. This
function provides you a summary of all your routing and SNAT settings and helps
troubleshoot the related problems.
42.2 Packet Flow Explore Commands
The following table lists the commands that you can use to have the ZyWALL display routing
and SNAT related settings.
Table 195 Packet Flow Explore Commands
COMMAND
DESCRIPTION
show route order
Displays the order of routing related functions the ZyWALL checks for packets. Once a
packet matches the criteria of a routing rule, the ZyWALL takes the corresponding action
and does not perform any further flow checking.
show system snat
order
Displays the order of SNAT related functions the ZyWALL checks for packets. Once a
packet matches the criteria of an SNAT rule, the ZyWALL uses the corresponding source
IP address and does not perform any further flow checking.
show system route
policy-route
Displays activated policy routes.
show system route
nat-1-1
Displays activated 1-to-1 NAT rules.
show system route
site-to-site-vpn
Displays activated site-to-site VPN rules.
show system route
dynamic-vpn
Displays activated dynamic VPN rules.
show system route
default-wan-trunk
Displays the default WAN trunk settings.
show ip route
static-dynamic
Displays activated static-dynamic routes.
show system snat
policy-route
Displays activated policy routes which use SNAT.
ZyWALL (ZLD) CLI Reference Guide
349
Chapter 42 Packet Flow Explore
Table 195 Packet Flow Explore Commands (continued)
COMMAND
DESCRIPTION
show system snat
nat-1-1
Displays activated NAT rules which use SNAT.
show system snat
nat-loopback
Displays activated activated NAT rules which use SNAT with NAT loopback enabled.
show system snat
default-snat
Displays the default WAN trunk settings.
42.3 Packet Flow Explore Commands Example
The following example shows all routing related functions and their order.
Router> show route order
route order: Policy Route, Direct Route, 1-1 SNAT, SiteToSite VPN, Dynamic
VPN, Static-Dynamic Route, Default WAN Trunk, Main Route
The following example shows all SNAT related functions and their order.
Router> show system snat order
snat order: Policy Route SNAT, 1-1 SNAT, Loopback SNAT, Default SNAT
The following example shows all SNAT related functions and their order.
Router> show system route policy-route
No. PR NO. Source
Destination
Incoming
DSCP
Service
Nexthop
Type
Nexthop Info
===========================================================================
The following example shows all activated 1-to-1 SNAT rules.
Router> show system route nat-1-1
No. VS Name
Source
Destination
Outgoing
Gateway
===========================================================================
The following example shows all activated site-to-site VPN rules.
Router> show system route site-to-site-vpn
No. Source
Destination
VPN Tunnel
===========================================================================
350
ZyWALL (ZLD) CLI Reference Guide
Chapter 42 Packet Flow Explore
The following example shows all activated dynamic VPN rules.
Router> show system route dynamic-vpn
No. Source
Destination
VPN Tunnel
===========================================================================
The following example shows the default WAN trunk’s settings.
Router> show system route default-wan-trunk
No. Source
Destination
Trunk
===========================================================================
1
any
any
trunk_ex
The following example shows all activated dynamic VPN rules.
Router> show system route dynamic-vpn
No. Source
Destination
VPN Tunnel
===========================================================================
The following example shows all activated static-dynamic VPN rules.
Router> show ip route static-dynamic
Flags: A - Activated route, S - Static route, C - directly Connected
O - OSPF derived, R - RIP derived, G - selected Gateway
! - reject, B - Black hole, L - Loop
IP Address/Netmask
Gateway
IFace
Metric
Flags
Persis
t
===========================================================================
0.0.0.0/0
10.1.1.254
wan1
0
ASG
-
The following example shows all activated policy routes which use SNAT.
Router> show system snat policy-route
No. PR NO. Outgoing
SNAT
===========================================================================
The following example shows all activated 1-to-1 NAT rules.
Router> show system snat nat-1-1
No. VS Name
Source
Destination
Outgoing
SNAT
===========================================================================
ZyWALL (ZLD) CLI Reference Guide
351
Chapter 42 Packet Flow Explore
The following example shows all activated policy routes which use SNAT and enable NAT
loopback..
Router> show system snat nat-loopback
Note: Loopback SNAT will be only applied only when the initiator is located
at the network which the server locates at
No. VS Name
Source
Destination
SNAT
===========================================================================
The following example shows all activated 1-to-1 NAT rules.
Router> show system snat nat-1-1
No. VS Name
Source
Destination
Outgoing
SNAT
===========================================================================
The following example shows the default WAN trunk settings.
Router> show system snat default-snat
Incoming
Outgoing
SNAT
===========================================================================
Internal Interface
External Interface
Outgoing Interface IP
Internal Interfaces: lan1, hidden, lan2, dmz
External Interfaces: wan1, wan2, wan1_ppp, wan2_ppp
Router>
352
ZyWALL (ZLD) CLI Reference Guide
CHAPTER
43
Maintenance Tools
Use the maintenance tool commands to check the conditions of other devices through the
ZyWALL. The maintenance tools can help you to troubleshoot network problems.
Here are maintenance tool commands that you can use in privilege mode.
Table 196 Maintenance Tools Commands in Privilege Mode
COMMAND
DESCRIPTION
packet-trace [interface interface_name] [ipproto {<0..255> | protocol_name | any}] [srchost {ip | hostname | any}] [dst-host {ip |
hostname | any}] [port {<1..65535> | any}]
[file] [duration <1..3600>] [extension-filter
filter_extension]
traceroute {ip | hostname}
Sends traffic through the specified interface with
the specified protocol, source address, destination
address, and/or port number.
If you specify file, the ZyWALL dumps the traffic
to /packet_trace/
packet_trace_interface. Use FTP to
retrieve the files (see Section 37.6 on page 320).
If you do not assign the duration, the ZyWALL
keeps dumping traffic until you use Ctrl-C.
Use the extension filter to extend the use of this
command.
protocol_name: You can use the name, instead
of the number, for some IP protocols, such as tcp,
udp, icmp, and so on. The names consist of 1-16
alphanumeric characters, underscores (_), or
dashes (-). The first character cannot be a number.
hostname: You can use up to 252 alphanumeric
characters, dashes (-), or periods (.). The first
character cannot be a period.
filter_extension: You can use 1-256
alphanumeric characters, spaces, or '()+,/
:=?;!*#@$_%.- characters.
traceroute {ip | hostname}
Displays the route taken by packets to the specified
destination. Use Ctrl+c when you want to return
to the prompt.
[no] packet-capture activate
Performs a packet capture that captures network
traffic going through the set interface(s). Studying
these packet captures may help you identify
network problems.
The no command stops the running packet capture
on the ZyWALL.
Note: Use the packet-capture
configure command to configure
the packet-capture settings before
using this command.
packet-capture configure
ZyWALL (ZLD) CLI Reference Guide
Enters the sub-command mode.
353
Chapter 43 Maintenance Tools
Table 196 Maintenance Tools Commands in Privilege Mode (continued)
COMMAND
DESCRIPTION
duration <0..300>
Sets a time limit in seconds for the capture. The
ZyWALL stops the capture and generates the
capture file when either this period of time has
passed or the file reaches the size specified using
the files-size command below. 0 means there
is no time limit.
file-suffix <profile_name>
Specifies text to add to the end of the file name
(before the dot and filename extension) to help you
identify the packet capture files. Modifying the file
suffix also avoids making new capture files that
overwrite existing files of the same name.
The file name format is “interface name-file
suffix.cap”, for example “vlan2-packetcapture.cap”.
files-size <1..10000>
Specify a maximum size limit in kilobytes for the
total combined size of all the capture files on the
ZyWALL, including any existing capture files and
any new capture files you generate.
The ZyWALL stops the capture and generates the
capture file when either the file reaches this size or
the time period specified ( using the duration
command above) expires.
Note: If you have existing capture files
you may need to set this size larger
or delete existing capture files.
354
host-ip {ip-address | profile_name | any>
Sets a host IP address or a host IP address object
for which to capture packets. any means to capture
packets for all hosts.
host-port <0..65535>
If you set the IP Type to any, tcp, or udp using the
ip-type command below, you can specify the
port number of traffic to capture.
iface {add | del} {interface_name |
virtual_interface_name}
Adds or deletes an interface or a virtual interface
for which to capture packets to the capture
interfaces list.
ip-type {icmp | igmp | igrp | pim | ah |
esp | vrrp | udp | tcp | any}
Sets the protocol of traffic for which to capture
packets. any means to capture packets for all
types of traffic.
snaplen <68..1512>
Specifies the maximum number of bytes to capture
per packet. The ZyWALL automatically truncates
packets that exceed this size. As a result, when
you view the packet capture files in a packet
analyzer, the actual size of the packets may be
larger than the size of captured packets.
storage <internal|usbstorage>
Sets to have the ZyWALL only store packet capture
entries on the ZyWALL (internal) or on a USB
storage connected to the ZyWALL.
ring-buffer <enable|disable>
Enables or disables the ring buffer used as a
temporary storage.
split-size <1..2048>
Specify a maximum size limit in megabytes for
individual packet capture files. After a packet
capture file reaches this size, the ZyWALL starts
another packet capture file.
ZyWALL (ZLD) CLI Reference Guide
Chapter 43 Maintenance Tools
Table 196 Maintenance Tools Commands in Privilege Mode (continued)
COMMAND
DESCRIPTION
show packet-capture status
Displays whether a packet capture is ongoing.
show packet-capture config
Displays current packet capture settings.
43.0.1 Command Examples
Some packet-trace command examples are shown below.
Router# packet-trace duration 3
tcpdump: listening on eth0
19:24:43.239798 192.168.1.10 > 192.168.1.1:
19:24:43.240199 192.168.1.1 > 192.168.1.10:
19:24:44.258823 192.168.1.10 > 192.168.1.1:
19:24:44.259219 192.168.1.1 > 192.168.1.10:
19:24:45.268839 192.168.1.10 > 192.168.1.1:
19:24:45.269238 192.168.1.1 > 192.168.1.10:
icmp:
icmp:
icmp:
icmp:
icmp:
icmp:
echo
echo
echo
echo
echo
echo
request
reply
request
reply
request
reply
6 packets received by filter
0 packets dropped by kernel
Router# packet-trace interface ge2 ip-proto icmp file extension-filter -s
-> 500 -n
tcpdump: listening on eth1
07:24:07.898639 192.168.105.133 > 192.168.105.40: icmp: echo request (DF)
07:24:07.900450 192.168.105.40 > 192.168.105.133: icmp: echo reply
07:24:08.908749 192.168.105.133 > 192.168.105.40: icmp: echo request (DF)
07:24:08.910606 192.168.105.40 > 192.168.105.133: icmp: echo reply
8 packets received by filter
0 packets dropped by kernel
Router# packet-trace interface ge2 ip-proto icmp file extension-filter
-> and src host 192.168.105.133 and dst host 192.168.105.40 -s 500 -n
tcpdump: listening on eth1
07:26:51.731558 192.168.105.133 > 192.168.105.40: icmp: echo request (DF)
07:26:52.742666 192.168.105.133 > 192.168.105.40: icmp: echo request (DF)
07:26:53.752774 192.168.105.133 > 192.168.105.40: icmp: echo request (DF)
07:26:54.762887 192.168.105.133 > 192.168.105.40: icmp: echo request (DF)
8 packets received by filter
0 packets dropped by kernel
ZyWALL (ZLD) CLI Reference Guide
355
Chapter 43 Maintenance Tools
Router# traceroute www.zyxel.com
traceroute to www.zyxel.com (203.160.232.7), 30 hops max, 38 byte packets
1 172.23.37.254 3.049 ms 1.947 ms 1.979 ms
2 172.23.6.253 2.983 ms 2.961 ms 2.980 ms
3 172.23.6.1 5.991 ms 5.968 ms 6.984 ms
4 * * *
Here are maintenance tool commands that you can use in configure mode.
Table 197 Maintenance Tools Commands in Configuration Mode
COMMAND
DESCRIPTION
show arp-table
Displays the current Address Resolution Protocol table.
arp IP mac_address
Edits or creates an ARP table entry.
no arp ip
Removes an ARP table entry.
The following example creates an ARP table entry for IP address 192.168.1.10 and MAC
address 01:02:03:04:05:06. Then it shows the ARP table and finally removes the new entry.
Router# arp 192.168.1.10 01:02:03:04:05:06
Router# show arp-table
Address
HWtype HWaddress
Flags Mask
192.168.1.10
ether
01:02:03:04:05:06
CM
172.23.19.254
ether
00:04:80:9B:78:00
C
Router# no arp 192.168.1.10
Router# show arp-table
Address
HWtype HWaddress
Flags Mask
192.168.1.10
(incomplete)
172.23.19.254
ether
00:04:80:9B:78:00
C
Iface
ge1
ge2
Iface
ge1
ge2
43.0.1.1 Packet Capture Command Example
The following examples show how to configure packet capture settings and perform a packet
capture. First you have to check whether a packet capture is running. This example shows no
other packet capture is running. Then you can also check the current packet capture settings.
Router(config)# show packet-capture status
capture status: off
Router(config)#
Router(config)# show packet-capture config
iface: wan1,lan2,wan2
ip-type: any
host-port: 0
host-ip: any
file-suffix: Example
snaplen: 1500
duration: 150
file-size: 10000
split-size: 2
ring-buffer: 0
storage: 0
356
ZyWALL (ZLD) CLI Reference Guide
Chapter 43 Maintenance Tools
Then configure the following settings to capture packets going through the ZyWALL’s WAN1
interface only (this means you have to remove LAN2 and WAN2 from the iface list).
•
•
•
•
•
•
•
•
•
IP address: any
Host IP: any
Host port: any (then you do not need to configure this setting)
File suffix: Example
File size: 10000 byes
Duration: 150 seconds
Save the captured packets to: USB storage device
Use the ring buffer: no
The maximum size of a packet capture file: 100 MB
Router(config)# packet-capture configure
Router(packet-capture)# iface add wan1
Router(packet-capture)# iface del lan2
Router(packet-capture)# iface del wan2
Router(packet-capture)# ip-type any
Router(packet-capture)# host-ip any
Router(packet-capture)# file-suffix Example
Router(packet-capture)# files-size 10000
Router(packet-capture)# duration 150
Router(packet-capture)# storage usbstorage
Router(packet-capture)# ring-buffer disable
Router(packet-capture)# split-size 100
Router(packet-capture)#
Exit the sub-command mode and have the ZyWALL capture packets according to the settings
you just configured.
Router(packet-capture)# exit
Router(config)# packet-capture activate
Router(config)#
Manually stop the running packet capturing.
Router(config)# no packet-capture activate
Router(config)#
Check current packet capture status and list all stored packet captures.
Router(config)# show packet-capture status
capture status: off
Router(config)# dir /packet_trace
File Name
Size
Modified Time
===========================================================================
wan1-Example.cap
575160
2009-11-24 09:06:59
Router(config)#
ZyWALL (ZLD) CLI Reference Guide
357
Chapter 43 Maintenance Tools
You can use FTP to download a capture file. Open and study it using a packet analyzer tool
(for example, Ethereal or Wireshark).
358
ZyWALL (ZLD) CLI Reference Guide
CHAPTER
44
Watchdog Timer
This chapter provides information about the ZyWALL’s watchdog timers.
44.1 Hardware Watchdog Timer
The hardware watchdog has the system restart if the hardware fails.
1
The hardware-watchdog-timer commands are for support engineers. It
is recommended that you not modify the hardware watchdog timer settings.
Table 198 hardware-watchdog-timer Commands
COMMAND
DESCRIPTION
[no] hardware-watchdog-timer <4..37>
Sets how long the system’s hardware can be
unresponsive before resetting. The no command
turns the timer off.
show hardware-watchdog-timer status
Displays the settings of the hardware watchdog
timer.
44.2 Software Watchdog Timer
The software watchdog has the system restart if the core firmware fails.
1
The software-watchdog-timer commands are for support engineers. It
is recommended that you not modify the software watchdog timer settings.
Table 199 software-watchdog-timer Commands
COMMAND
DESCRIPTION
[no] software-watchdog-timer <10..600>
Sets how long the system’s core firmware can be
unresponsive before resetting. The no command
turns the timer off.
ZyWALL (ZLD) CLI Reference Guide
359
Chapter 44 Watchdog Timer
Table 199 software-watchdog-timer Commands (continued)
COMMAND
DESCRIPTION
show software-watchdog-timer status
Displays the settings of the software watchdog
timer.
show software-watchdog-timer log
Displays a log of when the software watchdog timer
took effect.
44.3 Application Watchdog
The application watchdog has the system restart a process that fails. These are the appwatchdog commands.Use the configure terminal command to enter the configuration
mode to be able to use these commands.
Table 200 app-watchdog Commands
COMMAND
DESCRIPTION
[no] app-watch-dog
activate
Turns the application watchdog timer on or off.
[no] app-watch-dog
console-print
{always|once}
Display debug messages on the console (every time they occur or once). The no
command changes the setting back to the default.
[no] app-watch-dog
interval <5..60>
Sets how frequently (in seconds) the ZyWALL checks the system processes. The no
command changes the setting back to the default.
[no] app-watch-dog
retry-count <1..5>
Set how many times the ZyWALL is to re-check a process before considering it failed.
The no command changes the setting back to the default.
[no] app-watch-dog
alert
Has the ZyWALL send an alert the user when the system is out of memory or disk
space.
[no] app-watch-dog
disk-threshold min
<1..100> max
<1..100>
Sets the percentage thresholds for sending a disk usage alert. The ZyWALL starts
sending alerts when disk usage exceeds the maximum (the second threshold you
enter). The ZyWALL stops sending alerts when the disk usage drops back below the
minimum threshold (the first threshold you enter). The no command changes the
setting back to the default.
[no] app-watch-dog
mem-threshold min
threshold_min max
threshold_max
Sets the percentage thresholds for sending a memory usage alert. The ZyWALL starts
sending alerts when memory usage exceeds the maximum (the second threshold you
enter). The ZyWALL stops sending alerts when the memory usage drops back below
the minimum threshold (the first threshold you enter). The no command changes the
setting back to the default.
show app-watch-dog
config
Displays the application watchdog timer settings.
show app-watch-dog
monitor-list
Display the list of applications that the application watchdog is monitoring.
360
ZyWALL (ZLD) CLI Reference Guide
Chapter 44 Watchdog Timer
44.3.1 Application Watchdog Commands Example
The following example displays the application watchdog configuration and lists the processes
that the application watchdog is monitoring.
Router# configure terminal
Router(config)# show app-watch-dog config
Application Watch Dog Setting:
activate: yes
alert: yes
console print: always
retry count: 3
interval: 60
mem threshold: 80% ~ 90%
disk threshold: 80% ~ 90%
Router(config)# show app-watch-dog monitor-list
#app_name
min_process_count
max_process_count(negative integer
means
unlimited)
uamd
1
-1
firewalld
5
5
policyd
6
7
contfltd
3
5
appd
5
6
classify
1
1
ospfd
1
1
ripd
1
1
resd
1
1
zyshd_wd
1
1
sshipsecpm
1
1
zylogd
1
-1
syslog-ng
1
1
zylogger
1
1
ddns_had
1
1
tpd
1
1
wdtd
1
1
zebra
1
1
link_updown
1
1
aux_config
1
1
fauthd
5
5
decomp_server
1
1
lavd
1
1
sslvpn
1
1
wan
1
1
sslvpnpptp
1
1
dnsrd
1
1
signal_wrapper 1
1
ZyWALL (ZLD) CLI Reference Guide
361
Chapter 44 Watchdog Timer
362
ZyWALL (ZLD) CLI Reference Guide
P ART XI
Command List
List of Commands (Alphabetical) (365)
363
364
List of Commands (Alphabetical)
List of Commands (Alphabetical)
This section lists the commands and sub-commands in alphabetical order. Commands and subcommands appear at the same level.
................................................................................. 95
................................................................................. 95
[no] {anti-virus | personal-firewall} activate .................................. 282
[no] aaa authentication default member1 [member2] [member3] [member4] ........... 264
[no] aaa authentication profile-name ............................................ 263
[no] aaa authentication profile-name member1 [member2] [member3] [member4] ...... 264
[no] aaa group server ad group-name ............................................. 258
[no] aaa group server ldap group-name ........................................... 259
[no] aaa group server radius group-name ......................................... 260
[no] access-page color-window-background ........................................ 292
[no] access-page message-text message ........................................... 292
[no] account {pppoe | pptp} profile_name ........................................ 273
[no] account cellular profile_name .............................................. 274
[no] account profile_name ........................................................ 66
[no] account profile_name ........................................................ 68
[no] action-block {login|message|audio|video|file-transfer} ..................... 165
[no] action-block {login|message|audio|video|file-transfer} ..................... 167
[no] action-block {login|message|audio|video|file-transfer} ..................... 169
[no] activate ................................................................... 130
[no] activate ................................................................... 133
[no] activate ................................................................... 148
[no] activate ................................................................... 165
[no] activate ................................................................... 167
[no] activate ................................................................... 168
[no] activate ................................................................... 179
[no] activate ................................................................... 187
[no] activate ................................................................... 216
[no] activate ................................................................... 233
[no] activate ................................................................... 242
[no] activate ................................................................... 310
[no] activate .................................................................... 75
[no] address address_object ..................................................... 133
[no] address-object object_name ................................................. 247
[no] ad-server basedn basedn .................................................... 256
[no] ad-server binddn binddn .................................................... 256
[no] ad-server cn-identifier uid ................................................ 256
[no] ad-server host ad_server ................................................... 256
[no] ad-server password password ................................................ 256
[no] ad-server port port_no ..................................................... 256
[no] ad-server search-time-limit time ........................................... 256
[no] ad-server ssl .............................................................. 256
[no] ampdu ....................................................................... 75
[no] amsdu ....................................................................... 75
[no] answer-rings ............................................................... 310
[no] anti-spam activate ......................................................... 215
[no] anti-spam black-list [rule_number] e-mail email {activate|deactivate} ...... 218
[no] anti-spam black-list [rule_number] ip-address ip subnet_mask {activate|deactivate}
218
[no] anti-spam black-list [rule_number] mail-header mail-header mail-header-value {ac-
ZyWALL (ZLD) CLI Reference Guide
365
List of Commands (Alphabetical)
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
366
tivate|deactivate} ....................................................... 218
anti-spam black-list [rule_number] subject subject {activate|deactivate} ... 218
anti-spam black-list activate .............................................. 218
anti-spam dnsbl activate ................................................... 220
anti-spam statistics collect ............................................... 222
anti-spam white-list [rule_number] e-mail email {activate|deactivate} ...... 218
anti-spam white-list [rule_number] ip-address ip subnet_mask {activate|deactivate}
218
anti-spam white-list [rule_number] mail-header mail-header mail-header-value {activate|deactivate} ....................................................... 218
anti-spam white-list [rule_number] subject subject {activate|deactivate} ... 218
anti-spam white-list activate .............................................. 218
anti-virus activate ........................................................ 178
anti-virus anti_virus_software_name detect-auto-protection {enable | disable | ignore} .................................................................... 282
anti-virus black-list activate ............................................. 181
anti-virus black-list file-pattern av_file_pattern {activate|deactivate} ... 181
anti-virus eicar activate .................................................. 178
anti-virus skip-unknown-file-type activate ................................. 178
anti-virus statistics collect .............................................. 183
anti-virus update auto ..................................................... 182
anti-virus white-list activate ............................................. 180
anti-virus white-list file-pattern av_file_pattern {activate|deactivate} ... 180
apn access_point_name ...................................................... 274
app activate ............................................................... 169
app highest sip bandwidth priority ......................................... 169
app other log [alert] ...................................................... 168
app other protocol_name bandwidth-graph .................................... 170
app protocol_name activate ................................................. 164
app protocol_name allowport <1..65535> ..................................... 164
app protocol_name bandwidth-graph .......................................... 169
app protocol_name bwm ...................................................... 164
app protocol_name defaultport <1..65535> ................................... 164
app protocol_name log [alert] .............................................. 165
application application_object ............................................. 148
application forbidden-process process_name ................................. 283
application trusted-process process_name ................................... 283
app-watch-dog activate ..................................................... 360
app-watch-dog alert ........................................................ 360
app-watch-dog console-print {always|once} .................................. 360
app-watch-dog disk-threshold min <1..100> max <1..100> ..................... 360
app-watch-dog interval <5..60> ............................................. 360
app-watch-dog mem-threshold min threshold_min max threshold_max ............ 360
app-watch-dog retry-count <1..5> ........................................... 360
area IP [{stub | nssa}] .................................................... 101
area IP authentication ..................................................... 101
area IP authentication authentication-key authkey .......................... 101
area IP authentication message-digest ...................................... 101
area IP authentication message-digest-key <1..255> md5 authkey ............. 101
area IP virtual-link IP .................................................... 101
area IP virtual-link IP authentication ..................................... 101
area IP virtual-link IP authentication authentication-key authkey .......... 102
area IP virtual-link IP authentication message-digest ...................... 102
area IP virtual-link IP authentication message-digest-key <1..255> md5 authkey
102
area IP virtual-link IP authentication same-as-area ........................ 102
area IP virtual-link IP authentication-key authkey ......................... 102
authentication {chap-pap | chap | pap | mschap | mschap-v2} ................ 273
authentication {chap-pap | chap | pap | mschap | mschap-v2} ................. 82
ZyWALL (ZLD) CLI Reference Guide
List of Commands (Alphabetical)
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
authentication {force | required} .......................................... 242
authentication {none | pap | chap} ......................................... 275
authentication {string password | ah-md5 password} ......................... 233
authentication mode {md5 | text} ........................................... 100
authentication string authkey .............................................. 100
auto-destination ............................................................ 92
auto-disable ................................................................ 92
backmx ..................................................................... 109
backup-custom ip ........................................................... 108
backup-iface interface_name ................................................ 109
band {auto|wcdma|gsm} ....................................................... 68
bandwidth excess-usage ..................................................... 165
bandwidth excess-usage ..................................................... 167
bandwidth excess-usage ..................................................... 169
bandwidth <1..1048576> priority <1..1024> [maximize-bandwidth-usage] ........ 92
bind interface_name ......................................................... 67
block ...................................................................... 104
block-ack ................................................................... 75
block-intra ................................................................. 76
budget active ............................................................... 68
budget data active {download-upload|download|upload} <1..100000> ............ 69
budget time active <1..672> ................................................. 68
bwm activate ............................................................... 170
bwm activate ................................................................ 92
bypass {white-list | black-list | dnsbl} ................................... 216
bypass {white-list | black-list} ........................................... 179
cache-clean activate ....................................................... 148
client-identifier mac_address ............................................... 56
client-name host_name ....................................................... 56
clock daylight-saving ...................................................... 294
clock saving-interval begin {apr|aug|dec|feb|jan|jul|jun|mar|may|nov|oct|sep}
{1|2|3|4|last} {fri|mon|sat|sun|thu|tue|wed} hh:mm end
{apr|aug|dec|feb|jan|jul|jun|mar|may|nov|oct|sep} {1|2|3|4|last}
{fri|mon|sat|sun|thu|tue|wed} hh:mm offset ............................... 294
clock time-zone {-|+hh} .................................................... 294
cnm-agent acs password <password for ACS connection request> ............... 311
cnm-agent acs username <username for ACS connection request> ............... 311
cnm-agent activate ......................................................... 311
cnm-agent auth activate .................................................... 311
cnm-agent manager url ...................................................... 311
cnm-agent password <TR-069 password> ....................................... 312
cnm-agent periodic-inform activate ......................................... 311
cnm-agent username <TR-069 username> ....................................... 311
compression {on | off} ..................................................... 273
connection-id connection_id ................................................ 274
connectivity {nail-up | dial-on-demand} ..................................... 67
connectivity-check continuous-log activate ................................. 334
connectivity-check continuous-log activate .................................. 62
connlimit max-per-host <1..8192> ........................................... 128
console baud baud_rate ..................................................... 295
content-filter active ...................................................... 207
content-filter block message message ....................................... 207
content-filter block redirect redirect_url ................................. 207
content-filter default block ............................................... 207
content-filter license license ............................................. 207
content-filter license license ............................................. 208
content-filter policy policy_number address schedule filtering_profile ..... 208
content-filter profile filtering_profile custom activex .................... 208
content-filter profile filtering_profile custom cookie ..................... 208
ZyWALL (ZLD) CLI Reference Guide
367
List of Commands (Alphabetical)
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
368
content-filter profile filtering_profile custom forbid forbid_hosts ........ 209
content-filter profile filtering_profile custom java ....................... 209
content-filter profile filtering_profile custom keyword keyword ............ 209
content-filter profile filtering_profile custom proxy ...................... 209
content-filter profile filtering_profile custom trust trust_hosts .......... 209
content-filter profile filtering_profile custom trust-allow-features ....... 209
content-filter profile filtering_profile custom trust-only ................. 209
content-filter profile filtering_profile custom ............................ 208
content-filter profile filtering_profile url category {category_name} ...... 209
content-filter profile filtering_profile url match {block | log} ........... 209
content-filter profile filtering_profile url match-unsafe {block | log | warn}
209
content-filter profile filtering_profile url offline {block | log | warn} .. 209
content-filter profile filtering_profile url unrate {block | log | warn} ... 209
content-filter profile filtering_profile url url-server .................... 209
content-filter profile filtering_profile ................................... 208
content-filter service-timeout service_timeout ............................. 209
content-filter statistics collect .......................................... 210
content-filter -timeout _timeout ........................................... 207
content-filter -timeout _timeout ........................................... 210
corefile copy usb-storage ................................................... 74
crypto ignore-df-bit ....................................................... 141
crypto map map_name ........................................................ 141
crypto map_name ............................................................ 145
crypto profile_name ........................................................ 104
ctmatch {dnat | snat} ...................................................... 130
ctsrts <256..2346> .......................................................... 75
custom ip .................................................................. 108
daily-report reset-counter ................................................. 342
deactivate .................................................................. 92
default-router ip ........................................................... 56
description description .................................................... 130
description description .................................................... 133
description description .................................................... 148
description description .................................................... 233
description description .................................................... 239
description description .................................................... 242
description description .................................................... 247
description description .................................................... 251
description description .................................................... 283
description description .................................................... 310
description description ..................................................... 52
description description ..................................................... 56
description description ..................................................... 92
destination {address_object | group_name} .................................. 242
destination {address_object|any} ............................................ 92
destination profile_name ................................................... 165
destination profile_name ................................................... 167
destination profile_name ................................................... 168
destinationip address_object ............................................... 130
device <device_model_name> .................................................. 70
device-ha activate ......................................................... 228
device-ha ap-mode authentication {string key | ah-md5 key} ................. 230
device-ha ap-mode backup sync authentication password password ............. 230
device-ha ap-mode backup sync auto ......................................... 230
device-ha ap-mode backup sync from master_address port port ................ 230
device-ha ap-mode backup sync interval <1..1440> ........................... 230
device-ha ap-mode interface_name activate .................................. 230
device-ha ap-mode interface_name manage-ip ip subnet_mask .................. 230
ZyWALL (ZLD) CLI Reference Guide
List of Commands (Alphabetical)
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
device-ha ap-mode master sync authentication password password ............. 230
device-ha ap-mode preempt .................................................. 229
device-ha sync authentication password password ............................ 233
device-ha sync auto ........................................................ 233
device-ha sync from {hostname | ip} ........................................ 233
device-ha sync interval <5..1440> .......................................... 234
device-ha sync now ......................................................... 234
device-ha sync port <1..65535> ............................................. 233
device-ha vrrp-group vrrp_group_name ....................................... 232
diag-info copy usb-storage .................................................. 74
dialing-type {tone | pulse} ................................................. 82
dial-timeout <30..120> ...................................................... 82
domainname domain_name ..................................................... 293
domain-name domain_name ..................................................... 56
downstream <0..1048576> ..................................................... 52
dpd ........................................................................ 139
dscp {any | <0..63>} ........................................................ 93
dscp class {default | dscp_class} ........................................... 93
duplex <full | half> ........................................................ 64
encryption {nomppe | mppe-40 | mppe-128} ................................... 274
eps activate ............................................................... 148
eps activate ............................................................... 242
eps failure-messages failure_messages ...................................... 282
eps periodical-check activate .............................................. 149
eps periodical-check <1..1440> ............................................. 149
eps periodical-check <1..1440> ............................................. 242
eps profile profile_name ................................................... 282
eps rename profile_name new_profile_name ................................... 285
eps <1..8> eps_object_name ................................................. 242
eps <1..8> eps_profile_name ................................................ 148
fall-back .................................................................. 139
file-decompression [unsupported destroy] ................................... 179
file-info file-path file_path .............................................. 283
file-info file-path file_path {eq | gt | lt | ge | le | neq} file-size
<1..1073741824> .......................................................... 283
file-info file-path file_path {eq | gt | lt | ge | le | neq} file-size
<1..1073741824> {eq | gt | lt | ge | le | neq} file-version file_version . 283
file-info file-path file_path {eq | gt | lt | ge | le | neq} file-version
file_version ............................................................. 283
firewall activate .......................................................... 129
first-dns-server {ip | interface_name {1st-dns | 2nd-dns | 3rd-dns} | ZyWALL} 57
first-wins-server ip ........................................................ 57
flood-detection {tcp-flood | udp-flood | ip-flood | icmp-flood} {activate | log
[alert] | block} ......................................................... 190
force ...................................................................... 242
force-auth activate ........................................................ 241
frag <256..2346> ............................................................ 75
from zone_name ............................................................. 165
from zone_name ............................................................. 167
from zone_name ............................................................. 168
from zone_object ........................................................... 130
from zone_object ........................................................... 179
from-zone zone_object ...................................................... 216
from-zone zone_profile ..................................................... 187
groupname groupname ........................................................ 239
groupname groupname ........................................................ 239
ha-iface interface_name .................................................... 109
hardware-address mac_address ................................................ 56
hardware-watchdog-timer <4..37> ............................................ 359
ZyWALL (ZLD) CLI Reference Guide
369
List of Commands (Alphabetical)
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
370
hide ........................................................................ 76
host hostname .............................................................. 108
host ip ..................................................................... 56
hostname hostname .......................................................... 293
http-inspection {http-xxx} action {drop | reject-sender | reject-receiver | rejectboth}} ................................................................... 190
http-inspection {http-xxx} activate ........................................ 190
icmp-decoder {truncated-header | truncated-timestamp-header | truncated-addressheader} activate ......................................................... 191
idle <0..360> .............................................................. 273
idle <0..360> .............................................................. 275
idle <0..360> ............................................................... 82
idp ........................................................................ 186
idp {signature | system-protect} update auto ............................... 199
idp statistics collect ..................................................... 200
inbound-dscp-mark {<0..63> | class {default | dscp_class}} ................. 166
inbound-dscp-mark {<0..63> | class {default | dscp_class}} ................. 167
inbound-dscp-mark {<0..63> | class {default | dscp_class}} ................. 169
in-dnat activate ........................................................... 143
infected-action {destroy | send-win-msg} ................................... 179
initial-string initial_string .............................................. 310
initial-string initial_string ............................................... 82
in-snat activate ........................................................... 142
interface {num|interface-name} .............................................. 87
interface ap_interface ...................................................... 76
interface interface_name ................................................... 104
interface interface_name ................................................... 232
interface interface_name .................................................... 51
interface interface_name .................................................... 68
interface interface_name .................................................... 93
interface-group group-name .................................................. 86
ip address dhcp ............................................................. 52
ip address ip subnet_mask ................................................... 52
ip address ip subnet_mask ................................................... 76
ip ddns profile profile_name ............................................... 108
ip dhcp pool profile_name ................................................... 55
ip dhcp-pool profile_name ................................................... 57
ip dns server a-record fqdn w.x.y.z ........................................ 296
ip dns server mx-record domain_name {w.x.y.z|fqdn} ......................... 296
ip dns server zone-forwarder {<1..32>|append|insert <1..32>} {domain_zone_name|*}
interface interface_name ................................................. 297
ip ftp server .............................................................. 305
ip ftp server cert certificate_name ........................................ 305
ip ftp server port <1..65535> .............................................. 305
ip ftp server tls-required ................................................. 305
ip gateway ip ............................................................... 52
ip helper-address ip ........................................................ 57
ip http authentication auth_method ......................................... 300
ip http port <1..65535> .................................................... 300
ip http secure-port <1..65535> ............................................. 300
ip http secure-server ...................................................... 300
ip http secure-server auth-client .......................................... 300
ip http secure-server cert certificate_name ................................ 301
ip http secure-server force-redirect ....................................... 301
ip http server ............................................................. 301
ip load-balancing link-sticking activate .................................... 90
ip load-balancing link-sticking timeout timeout ............................. 90
ip ospf authentication-key password ......................................... 60
ip ospf cost <1..65535> ..................................................... 60
ZyWALL (ZLD) CLI Reference Guide
List of Commands (Alphabetical)
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
ip ospf dead-interval <1..65535> ............................................ 61
ip ospf hello-interval <1..65535> ........................................... 61
ip ospf priority <0..255> ................................................... 60
ip ospf retransmit-interval <1..65535> ...................................... 61
ip rip {send | receive} version <1..2> ...................................... 60
ip rip v2-broadcast ......................................................... 60
ip route {w.x.y.z} {w.x.y.z} {interface|w.x.y.z} <0..127> ................... 97
ip ssh server .............................................................. 303
ip ssh server cert certificate_name ........................................ 303
ip ssh server port <1..65535> .............................................. 303
ip ssh server v1 ........................................................... 303
ip telnet server ........................................................... 304
ip telnet server port <1..65535> ........................................... 304
ip-select {iface | auto | custom} .......................................... 108
ip-select-backup {iface | auto | custom} ................................... 108
isakmp policy policy_name .................................................. 139
join interface_name ......................................................... 81
l2tp-over-ipsec activate; .................................................. 155
l2tp-over-ipsec first-dns-server {ip | interface_name} {1st-dns|2nd-dns|3rd-dns}|
{ppp_interface|aux}{1st-dns|2nd-dns}} .................................... 156
l2tp-over-ipsec first-wins-server ip ....................................... 156
l2tp-over-ipsec keepalive-timer <1..180> ................................... 156
l2tp-over-ipsec second-dns-server {ip | interface_name} {1st-dns|2nd-dns|3rd-dns}|
{ppp_interface|aux}{1st-dns|2nd-dns}} .................................... 156
l2tp-over-ipsec second-wins-server ip ...................................... 156
l2tp-over-ipsec user user_name ............................................. 156
ldap-server basedn basedn .................................................. 256
ldap-server binddn binddn .................................................. 256
ldap-server cn-identifier uid .............................................. 256
ldap-server host ldap_server ............................................... 256
ldap-server password password .............................................. 256
ldap-server port port_no ................................................... 257
ldap-server search-time-limit time ......................................... 257
ldap-server ssl ............................................................ 257
lease {<0..365> [<0..23> [<0..59>]] | infinite} ............................. 57
limit <0..8192> ............................................................ 133
local-address ip ............................................................ 67
local-address <ip> .......................................................... 70
log [alert] ................................................................ 130
log [alert] ................................................................ 166
log [alert] ................................................................ 167
log [alert] ................................................................ 169
log [alert] ................................................................ 179
log [alert] ................................................................ 216
logging console ............................................................ 337
logging console category module_name ....................................... 338
logging debug suppression .................................................. 335
logging debug suppression interval <10..600> ............................... 335
logging mail <1..2> ........................................................ 336
logging mail <1..2> {send-log-to | send-alerts-to} e_mail .................. 337
logging mail <1..2> address {ip | hostname} ................................ 336
logging mail <1..2> authentication ......................................... 336
logging mail <1..2> authentication username username password password ..... 336
logging mail <1..2> category module_name level {alert | all} ............... 337
logging mail <1..2> schedule {full | hourly} ............................... 337
logging mail <1..2> subject subject ........................................ 337
logging syslog <1..4> ...................................................... 335
logging syslog <1..4> {disable | level normal | level all} ................. 335
logging syslog <1..4> address {ip | hostname} .............................. 335
ZyWALL (ZLD) CLI Reference Guide
371
List of Commands (Alphabetical)
[no] logging syslog <1..4> facility {local_1 | local_2 | local_3 | local_4 | local_5 |
local_6 | local_7} ....................................................... 335
[no] logging syslog <1..4> format {cef | vrpt} .................................. 335
[no] logging system-log suppression ............................................. 334
[no] logging system-log suppression interval <10..600> .......................... 334
[no] logging usb-storage ......................................................... 73
[no] login-page color-background ................................................ 292
[no] login-page color-window-background ......................................... 292
[no] login-page message-text % message .......................................... 293
[no] manage-ip IP ............................................................... 232
[no] match-action smtp {drop | forward | forward-with-tag} ...................... 216
[no] metric <0..15> .............................................................. 52
[no] mss <536..1452> ............................................................. 67
[no] mss <536..1460> ............................................................. 52
[no] mtu <576..1500> ............................................................. 52
[no] mtu <576..2304> ............................................................. 76
[no] mute ....................................................................... 310
[no] mx {ip | domain_name} ...................................................... 108
[no] nail-up .................................................................... 142
[no] natt ....................................................................... 140
[no] negotiation auto ............................................................ 65
[no] netbios-broadcast .......................................................... 142
[no] network interface area IP .................................................. 101
[no] network interface_name ..................................................... 100
[no] network interface_name ...................................................... 59
[no] network interface_name area ip .............................................. 60
[no] network-extension {activate | ip-pool address_object | 1st-dns {address_object | ip
} | 2nd-dns {address_object | ip } | 1st-wins {address_object | ip } | 2nd-wins
{address_object | ip } | network address_object} ......................... 149
[no] network-selection {auto|home} ............................................... 68
[no] next-hop {auto|gateway address object |interface interface_name |trunk
trunk_name|tunnel tunnel_name} ............................................ 93
[no] ntp ........................................................................ 294
[no] ntp server {fqdn|w.x.y.z} .................................................. 294
[no] object-group address group_name ............................................ 247
[no] object-group group_name .................................................... 247
[no] object-group group_name .................................................... 251
[no] object-group service group_name ............................................ 250
[no] outbound-dscp-mark {<0..63> | class {default | dscp_class}} ................ 166
[no] outbound-dscp-mark {<0..63> | class {default | dscp_class}} ................ 167
[no] outbound-dscp-mark {<0..63> | class {default | dscp_class}} ................ 169
[no] outonly-interface interface_name ........................................... 100
[no] outonly-interface interface_name ............................................ 59
[no] out-snat activate .......................................................... 142
[no] packet-capture activate .................................................... 353
[no] passive-interface interface_name ........................................... 100
[no] passive-interface interface_name ........................................... 101
[no] passive-interface interface_name ............................................ 59
[no] passive-interface interface_name ............................................ 60
[no] password password .......................................................... 273
[no] password password .......................................................... 275
[no] password password ........................................................... 82
[no] personal-firewall personal_firewall_software_name detect-auto-protection {enable |
disable | ignore} ........................................................ 283
[no] phone phone_number ......................................................... 274
[no] phone-number phone .......................................................... 82
[no] pin <pin code> .............................................................. 70
[no] ping-check activate ......................................................... 62
[no] policy controll-ipsec-dynamic-rules activate ................................ 94
372
ZyWALL (ZLD) CLI Reference Guide
List of Commands (Alphabetical)
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
policy override-direct-route activate ....................................... 94
policy-enforcement ......................................................... 142
port interface_name ......................................................... 80
port <0..65535> ............................................................ 168
port-speed {9600 | 19200 | 38400 | 57600 | 115200} ......................... 310
port-speed {9600 | 19200 | 38400 | 57600 | 115200} .......................... 82
preempt .................................................................... 232
priority <1..254> .......................................................... 232
protocol {tcp | udp} ....................................................... 168
radius-server host radius_server auth-port auth_port ....................... 257
radius-server key secret ................................................... 257
radius-server timeout time ................................................. 257
redistribute {static | ospf} ............................................... 100
redistribute {static | rip} ................................................ 100
redistribute {static | rip} metric-type <1..2> metric <0..16777214> ........ 100
remote-address ip ........................................................... 67
remote-address <ip> ......................................................... 70
replay-detection ........................................................... 142
report ..................................................................... 339
role {master | backup} ..................................................... 232
router-id IP ............................................................... 101
scan {http | ftp | imap4 | smtp | pop3} .................................... 179
scan {smtp | pop3} ......................................................... 216
scan-detection {icmp-sweep | icmp-filtered-sweep} {activate | log [alert] | block}
189
scan-detection {ip-xxx} {activate | log [alert] | block} ................... 189
scan-detection {tcp-xxx} {activate | log [alert] | block} .................. 189
scan-detection {udp-xxx} {activate | log [alert] | block} .................. 189
scan-detection open-port {activate | log [alert] | block} .................. 190
schedule profile_name ...................................................... 166
schedule profile_name ...................................................... 167
schedule profile_name ...................................................... 168
schedule schedule_name ..................................................... 243
schedule schedule_object ................................................... 130
schedule schedule_object .................................................... 93
second-dns-server {ip | interface_name {1st-dns | 2nd-dns | 3rd-dns} | ZyWALL} 57
second-wins-server ip ....................................................... 57
security dot1x acct ip port <1..65535> ...................................... 78
security dot1x activate ..................................................... 78
security dot1x auth ip port <1..65535> ...................................... 78
security external acct ip port <1..65535> ................................... 78
security external auth ip port <1..65535> ................................... 78
server alternative-cn-identifier uid ....................................... 258
server alternative-cn-identifier uid ....................................... 259
server basedn basedn ....................................................... 258
server basedn basedn ....................................................... 259
server binddn binddn ....................................................... 258
server binddn binddn ....................................................... 259
server cn-identifier uid ................................................... 258
server cn-identifier uid ................................................... 259
server description description ............................................. 258
server description description ............................................. 259
server description description ............................................. 260
server group-attribute group-attribute ..................................... 258
server group-attribute group-attribute ..................................... 260
server group-attribute <1-255> ............................................. 261
server host ad_server ...................................................... 258
server host ldap_server .................................................... 260
server host radius_server .................................................. 261
ZyWALL (ZLD) CLI Reference Guide
373
List of Commands (Alphabetical)
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
[no]
374
server ip .................................................................. 274
server key secret .......................................................... 261
server password password ................................................... 258
server password password ................................................... 260
server port port_no ........................................................ 259
server port port_no ........................................................ 260
server search-time-limit time .............................................. 259
server search-time-limit time .............................................. 260
server ssl ................................................................. 259
server ssl ................................................................. 260
server timeout time ........................................................ 261
service {service_name|any} .................................................. 93
service service_name ....................................................... 130
service-name {ip | hostname | service_name} ................................ 274
service-object object_name ................................................. 250
service-type {dyndns | dyndns_static | dyndns_custom | dynu-basic | dynu-premium |
no-ip | peanut-hull | 3322-dyn | 3322-static} ............................ 108
session-limit activate ..................................................... 133
shutdown .................................................................... 52
signature sid activate ..................................................... 188
signature sid activate ..................................................... 193
snat {outgoing-interface|pool {address_object}} ............................. 93
snmp-server ................................................................ 307
snmp-server community community_string {ro|rw} ............................. 307
snmp-server contact description ............................................ 307
snmp-server enable {informs|traps} ......................................... 307
snmp-server host {w.x.y.z} [community_string] .............................. 307
snmp-server location description ........................................... 307
snmp-server port <1..65535> ................................................ 308
software-watchdog-timer <10..600> .......................................... 359
source {address_object | group_name} ....................................... 243
source {address_object|any} ................................................. 93
source profile_name ........................................................ 166
source profile_name ........................................................ 167
source profile_name ........................................................ 168
sourceip address_object .................................................... 130
sourceport {tcp|udp} {eq <1..65535>|range <1..65535> <1..65535>} ........... 130
speed <100,10> .............................................................. 65
sslvpn application application_object ...................................... 277
sslvpn profile_name ........................................................ 104
sslvpn tunnel_name .......................................................... 94
starting-address ip pool-size <1..65535> .................................... 57
super ....................................................................... 75
system default-snat ......................................................... 87
tcp-decoder {tcp-xxx} action {drop | reject-sender | reject-receiver | reject-both}}
190
tcp-decoder {tcp-xxx} activate ............................................. 190
third-dns-server {ip | interface_name {1st-dns | 2nd-dns | 3rd-dns} | ZyWALL} 57
to {zone_object|ZyWALL} .................................................... 130
to zone_name ............................................................... 166
to zone_name ............................................................... 167
to zone_name ............................................................... 168
to zone_object ............................................................. 179
to-zone zone_object ........................................................ 216
to-zone zone_profile ....................................................... 187
trigger <1..8> incoming service_name trigger service_name ................... 94
tunnel tunnel_name .......................................................... 94
udp-decoder {truncated-header | undersize-len | oversize-len} activate ..... 190
upstream <0..1048576> ....................................................... 52
ZyWALL (ZLD) CLI Reference Guide
List of Commands (Alphabetical)
[no] usb-storage activate ........................................................ 73
[no] user user_name ............................................................. 130
[no] user user_name ............................................................. 133
[no] user user_name ............................................................. 149
[no] user username .............................................................. 166
[no] user username .............................................................. 167
[no] user username .............................................................. 168
[no] user username .............................................................. 239
[no] user username .............................................................. 273
[no] user username .............................................................. 274
[no] user user_name .............................................................. 94
[no] username username ........................................................... 82
[no] username username password password ........................................ 108
[no] users idle-detection ....................................................... 240
[no] users idle-detection timeout <1..60> ....................................... 240
[no] users lockout-period <1..65535> ............................................ 240
[no] users retry-count <1..99> .................................................. 240
[no] users retry-limit .......................................................... 240
[no] users simultaneous-logon {administration | access} enforce ................. 240
[no] users simultaneous-logon {administration | access} limit <1..1024> ......... 240
[no] users update-lease automation .............................................. 240
[no] version <1..2> ............................................................. 100
[no] vlan-id <1..4094> ........................................................... 80
[no] vpn-concentrator profile_name .............................................. 144
[no] vrid <1..254> .............................................................. 232
[no] wan-iface interface_name ................................................... 109
[no] webpage-encrypt ............................................................ 278
[no] wildcard ................................................................... 109
[no] windows-auto-update {enable | disable | ignore} ............................ 284
[no] windows-registry registry_key {eq | gt | lt | ge | le | neq} registry_value 284
[no] windows-security-patch security_patch ...................................... 284
[no] windows-service-pack <1..10> ............................................... 284
[no] wlan mac-filter activate .................................................... 79
[no] wlan mac-filter mac_address [description description] ....................... 79
[no] xauth type {server xauth_method | client name username password password} .. 140
[no] zone profile_name .......................................................... 104
[no]ip gateway ip [metric <0..15>] ............................................... 76
{signature | anomaly | system-protect} activate ................................. 186
{signature | anomaly | system-protect} activation ............................... 186
aaa authentication rename profile-name-old profile-name-new ..................... 263
aaa group server ad group-name .................................................. 258
aaa group server ad rename group-name group-name ................................ 258
aaa group server ldap group-name ................................................ 259
aaa group server ldap rename group-name group-name .............................. 259
aaa group server radius group-name .............................................. 260
aaa group server radius rename {group-name-old} group-name-new .................. 260
access {forward | drop | reject} ................................................ 165
access {forward | drop | reject} ................................................ 167
access {forward | drop | reject} ................................................ 168
access-page message-color {color-rgb | color-name | color-number} ............... 292
access-page title title ......................................................... 292
access-page window-color {color-rgb | color-name | color-number} ................ 292
action {allow|deny|reject} ...................................................... 130
activate ........................................................................ 139
activate ........................................................................ 141
address-object object_name {ip | ip_range | ip_subnet | interface-ip | interface-subnet
| interface-gateway} {interface} ......................................... 246
address-object rename object_name object_name ................................... 246
ad-server password-encrypted password ........................................... 256
ZyWALL (ZLD) CLI Reference Guide
375
List of Commands (Alphabetical)
algorithm {wrr|llf|spill-over} ................................................... 86
anti-spam dnsbl [1..5] domain dnsbl_domain {activate|deactivate} ................ 220
anti-spam dnsbl ip-check-order {forward | backward} ............................. 220
anti-spam dnsbl max-query-ip [1..5] ............................................. 220
anti-spam dnsbl query-timeout pop3 {forward | forward-with-tag} ................. 220
anti-spam dnsbl query-timeout smtp {drop | forward | forward-with-tag} .......... 220
anti-spam dnsbl query-timeout time [1..10] ...................................... 221
anti-spam dnsbl statistics flush ................................................ 221
anti-spam rule append ........................................................... 216
anti-spam rule delete rule_number ............................................... 216
anti-spam rule insert rule_number ............................................... 216
anti-spam rule move rule_number to rule_number .................................. 216
anti-spam rule rule_number ...................................................... 216
anti-spam statistics flush ...................................................... 222
anti-spam tag {dnsbl | dnsbl-timeout} [tag] ..................................... 220
anti-spam tag black-list [tag] .................................................. 218
anti-virus black-list replace old_av_file_pattern new_av_file_pattern {activate|deactivate} .................................................................... 181
anti-virus reload signatures .................................................... 178
anti-virus rule append .......................................................... 178
anti-virus rule delete <1..32> .................................................. 179
anti-virus rule insert <1..32> .................................................. 178
anti-virus rule move <1..32> to <1..32> ......................................... 179
anti-virus rule <1..32> ......................................................... 179
anti-virus search signature {all | category category | id id | name name | severity severity [{from id to id}] ................................................. 182
anti-virus statistics flush ..................................................... 183
anti-virus update daily <0..23> ................................................. 182
anti-virus update hourly ........................................................ 182
anti-virus update signatures .................................................... 182
anti-virus update weekly {sun | mon | tue | wed | thu | fri | sat} <0..23> ...... 182
anti-virus white-list replace old_av_file_pattern new_av_file_pattern {activate|deactivate} .................................................................... 180
app other {del | forward | drop | reject} ....................................... 168
app other append ................................................................ 168
app other default ............................................................... 168
app other insert rule_number .................................................... 168
app other move rule_number to rule_number ....................................... 168
app other <1..64> ............................................................... 168
app protocol_name {forward | drop | reject} ..................................... 164
app protocol_name bandwidth <0..102400> ......................................... 164
app protocol_name exception append .............................................. 166
app protocol_name exception default ............................................. 166
app protocol_name exception insert rule_number .................................. 166
app protocol_name exception modify default ...................................... 166
app protocol_name exception modify rule_number .................................. 166
app protocol_name exception move rule_number to rule_number ..................... 166
app protocol_name exception rule_number ......................................... 166
app protocol_name exception rule_number ......................................... 166
app protocol_name mode {portless | portbase} .................................... 165
app protocol_name rule append ................................................... 165
app protocol_name rule default .................................................. 165
app protocol_name rule insert rule_number ....................................... 165
app protocol_name rule modify default ........................................... 165
app protocol_name rule modify rule_number ....................................... 165
app protocol_name rule rule_number .............................................. 165
apply ............................................................................ 27
apply /conf/file_name.conf [ignore-error] [rollback] ............................ 319
area IP virtual-link IP message-digest-key <1..255> md5 authkey ................. 102
376
ZyWALL (ZLD) CLI Reference Guide
List of Commands (Alphabetical)
arp IP mac_address .............................................................. 356
atse ............................................................................. 27
authentication {pre-share | rsa-sig} ............................................ 139
authentication key <1..255> key-string authkey .................................. 100
band <b | g | bg> ................................................................ 75
bandwidth {inbound | outbound} <0..1048576> ..................................... 167
bandwidth {inbound|outbound} <0..1048576> ....................................... 165
bandwidth {inbound|outbound} <0..1048576> ....................................... 169
bandwidth priority <1..7> ....................................................... 165
bandwidth priority <1..7> ....................................................... 167
bandwidth priority <1..7> ....................................................... 169
bandwidth-graph ................................................................. 164
bind profile .................................................................... 187
budget {log|log-alert}[recursive <1..65535>] ..................................... 69
budget {log-percentage|log-percentage-alert} [recursive <1..65535>] .............. 69
budget current-connection {keep|drop} ............................................ 69
budget new-connection {allow|disallow} ........................................... 69
budget percentage {ptime|pdata} <0..99> .......................................... 69
budget reset-counters ............................................................ 69
budget reset-day <0..31> ......................................................... 69
ca enroll cmp name certificate_name cn-type {ip cn cn_address|fqdn cn cn_domain_name|mail
cn cn_email} [ou organizational_unit] [o organization] [c country] key-type
{rsa|dsa} key-len key_length num <0..99999999> password password ca ca_name url
url; ..................................................................... 268
ca enroll scep name certificate_name .............. cn-type {ip cn cn_address|fqdn cn
cn_domain_name|mail cn cn_email} [ou organizational_unit] [o organization] [c
country] key-type {rsa|dsa} key-len key_length password password ca ca_name url
url ...................................................................... 268
ca generate pkcs10 name certificate_name cn-type {ip cn cn_address|fqdn cn
cn_domain_name|mail cn cn_email} [ou organizational_unit] [o organization] [c
country] key-type {rsa|dsa} key-len key_length ........................... 269
ca generate pkcs12 name name password password .................................. 269
ca generate x509 name certificate_name cn-type {ip cn cn_address|fqdn cn
cn_domain_name|mail cn cn_email} [ou organizational_unit] [o organization] [c
country] key-type {rsa|dsa} key-len key_length ........................... 269
ca rename category {local|remote} old_name new_name ............................. 269
ca validation remote_certificate ................................................ 269
cdp {activate|deactivate} ....................................................... 269
certificate certificate-name .................................................... 139
channel <wireless_channel | auto> ................................................ 75
clear ............................................................................ 27
clear aaa authentication profile-name ........................................... 263
clear aaa group server ad [group-name] .......................................... 258
clear aaa group server ldap [group-name] ........................................ 259
clear aaa group server radius group-name ........................................ 260
clear ip dhcp binding {ip | *} ................................................... 57
clear logging debug buffer ...................................................... 335
clear logging system-log buffer ................................................. 334
clear report [interface_name] ................................................... 339
clock date yyyy-mm-dd time hh:mm:ss ............................................. 294
clock time hh:mm:ss ............................................................. 294
cnm-agent keepalive interval <10..90> ........................................... 311
cnm-agent periodic-inform interval <10..86400> .................................. 311
cnm-agent server-type {vantage | tr069} ......................................... 312
cnm-agent trigger-inform [interval] ............................................. 311
configure ........................................................................ 27
connectivity {nail-up | dial-on-demand} .......................................... 70
content-filter passed warning flush ............................................. 207
content-filter passed warning timeout <1..1440> ................................. 208
ZyWALL (ZLD) CLI Reference Guide
377
List of Commands (Alphabetical)
content-filter policy policy_number shutdown .................................... 208
content-filter statistics flush ................................................. 210
content-filter url- test url .................................................... 208
content-filter url- test url .................................................... 210
content-filter url-server test url [ server rating_server ] [ timeout query_timeout ]
208
content-filter url-server test url [server rating_server] [timeout query_timeout] 210
content-filter zsb port <1..65535> .............................................. 208
copy ............................................................................. 27
copy {/cert | /conf | /idp | /packet_trace | /script | /tmp}file_name-a.conf {/cert | /
conf | /idp | /packet_trace | /script | /tmp}/file_name-b.conf ........... 319
copy running-config /conf/file_name.conf ........................................ 319
copy running-config startup-config .............................................. 319
crypto map dial map_name ........................................................ 141
crypto map map_name ............................................................. 141
crypto map map_name ............................................................. 144
crypto map rename map_name map_name ............................................. 141
daily-report [no] activate ...................................................... 341
daily-report [no] item as-report ................................................ 342
daily-report [no] item av-report ................................................ 342
daily-report [no] item cf-report ................................................ 341
daily-report [no] item cpu-usage ................................................ 341
daily-report [no] item idp-report ............................................... 342
daily-report [no] item mem-usage ................................................ 341
daily-report [no] item port-usage ............................................... 342
daily-report [no] item session-usage ............................................ 342
daily-report [no] item traffic-report ........................................... 342
daily-report [no] mail-subject append date-time ................................. 341
daily-report [no] mail-subject append system-name ............................... 341
daily-report [no] smtp-auth activate ............................................ 341
daily-report mail-from e_mail ................................................... 341
daily-report mail-subject set subject ........................................... 341
daily-report mail-to-1 e_mail ................................................... 341
daily-report mail-to-2 e_mail ................................................... 341
daily-report mail-to-3 e_mail ................................................... 341
daily-report mail-to-4 e_mail ................................................... 341
daily-report mail-to-5 e_mail ................................................... 341
daily-report no mail-subject set ................................................ 341
daily-report no smtp-address .................................................... 341
daily-report no smtp-auth username .............................................. 341
daily-report reset-counter-now .................................................. 342
daily-report schedule hour <0..23> minute <00..59> .............................. 342
daily-report send-now ........................................................... 342
daily-report smtp-address {ip | hostname} ....................................... 341
daily-report smtp-auth username username password password ...................... 341
deactivate ...................................................................... 139
deactivate ...................................................................... 141
debug (*) ........................................................................ 27
debug [cmdexec|corefile|ip |kernel|mac-id-rewrite|observer|switch |system|zyinetpkt|zysh-ipt-op] (*) ............................................................ 30
debug alg ........................................................................ 29
debug anti-spam .................................................................. 29
debug app ........................................................................ 29
debug app show l7protocol (*) .................................................... 29
debug ca (*) ..................................................................... 29
debug content-filter ............................................................. 29
debug device-ha (*) .............................................................. 29
debug eps ........................................................................ 29
debug force-auth (*) ............................................................. 29
378
ZyWALL (ZLD) CLI Reference Guide
List of Commands (Alphabetical)
debug gui (*) .................................................................... 29
debug gui (*) .................................................................... 29
debug hardware (*) ............................................................... 29
debug idp ........................................................................ 29
debug idp-av ..................................................................... 29
debug interface .................................................................. 29
debug interface ifconfig [interface] ............................................. 29
debug interface-group ............................................................ 29
debug ip dns ..................................................................... 29
debug ip virtual-server .......................................................... 29
debug ipsec ...................................................................... 29
debug logging .................................................................... 29
debug manufacture ................................................................ 29
debug myzyxel server (*) ......................................................... 29
debug network arpignore (*) ...................................................... 29
debug no myzyxel server (*) ...................................................... 30
debug policy-route (*) ........................................................... 30
debug reset content-filter profiling ............................................. 30
debug service-register ........................................................... 30
debug show content-filter server ................................................. 30
debug show ipset ................................................................. 30
debug show myzyxel server status ................................................. 30
debug show myzyxel server status ................................................. 30
debug sslvpn ..................................................................... 30
debug update server (*) .......................................................... 30
delete ........................................................................... 27
delete {/cert | /conf | /idp | /packet_trace | /script | /tmp}/file_name ........ 319
details .......................................................................... 27
device-ha ap-mode backup sync now ............................................... 231
device-ha ap-mode cluster-id <1..32> ............................................ 229
device-ha ap-mode priority <1..254> ............................................. 230
device-ha ap-mode role {master|backup} .......................................... 229
device-ha link-monitoring activate .............................................. 234
device-ha mode {active-passive | legacy} ........................................ 228
device-ha stop-stub-interface activate .......................................... 234
device-register checkuser user_name .............................................. 39
device-register username user_name password password [e-mail user@domainname] [countrycode country_code] [reseller-name name] [reseller-mail email-address] [resellerphone phone-number] [vat vat-number] ...................................... 39
diag ............................................................................. 28
diag-info ........................................................................ 28
diag-info collect ............................................................... 347
dial-in ......................................................................... 310
dir .............................................................................. 28
dir {/cert | /conf | /idp | /packet_trace | /script | /tmp} ..................... 319
disable .......................................................................... 28
dscp-marking class {default | dscp_class} ........................................ 93
dscp-marking <0..63> ............................................................. 93
duration <0..300> ............................................................... 354
enable ........................................................................... 28
encapsulation {tunnel | transport} .............................................. 141
eps insert <1..8> eps_object_name ............................................... 242
eps insert <1..8> eps_profile_name .............................................. 148
eps move <1..8> to <1..8> ....................................................... 149
eps move <1..8> to <1..8> ....................................................... 242
exit ............................................................................ 133
exit ............................................................................. 28
exit ............................................................................. 52
exit ............................................................................. 64
ZyWALL (ZLD) CLI Reference Guide
379
List of Commands (Alphabetical)
exit ............................................................................. 75
exit ............................................................................. 86
fall-back-check-interval <60..86400> ............................................ 139
files-size <1..10000> ........................................................... 354
file-suffix <profile_name> ...................................................... 354
firewall append ................................................................. 129
firewall default-rule action {allow | deny | reject} { no log | log [alert] } ... 129
firewall delete rule_number ..................................................... 129
firewall flush .................................................................. 129
firewall insert rule_number ..................................................... 129
firewall move rule_number to rule_number ........................................ 129
firewall rule_number ............................................................ 128
firewall zone_object {zone_object|ZyWALL} append ................................ 129
firewall zone_object {zone_object|ZyWALL} delete <1..5000> ...................... 129
firewall zone_object {zone_object|ZyWALL} flush ................................. 129
firewall zone_object {zone_object|ZyWALL} insert rule_number .................... 129
firewall zone_object {zone_object|ZyWALL} move rule_number to rule_number ....... 129
firewall zone_object {zone_object|ZyWALL} rule_number ........................... 129
flood-detection block-period <1..3600> .......................................... 190
flush ............................................................................ 86
force-auth [no] exceptional-service service_name ................................ 241
force-auth default-rule authentication {required | unnecessary} {no log | log [alert]}
241
force-auth policy append ........................................................ 241
force-auth policy delete <1..1024> .............................................. 241
force-auth policy flush ......................................................... 241
force-auth policy insert <1..1024> .............................................. 241
force-auth policy move <1..1024> to <1..1024> ................................... 241
force-auth policy <1..1024> ..................................................... 241
group1 .......................................................................... 140
group2 .......................................................................... 140
group5 .......................................................................... 140
group-key <30..30000> ............................................................ 76
groupname rename groupname groupname ............................................ 239
guard-interval [short | long] .................................................... 75
host-ip {ip-address | profile_name | any> ....................................... 354
host-port <0..65535> ............................................................ 354
htm .............................................................................. 28
http-inspection {http-xxx} log [alert] .......................................... 190
icmp-decoder {truncated-header | truncated-timestamp-header | truncated-address-header}
action {drop | reject-sender | reject-receiver | reject-both}} ........... 191
icmp-decoder {truncated-header | truncated-timestamp-header | truncated-address-header}
log [alert] .............................................................. 191
idle <30..30000> ................................................................. 76
idp {signature | system-protect} update daily <0..23> ........................... 199
idp {signature | system-protect} update hourly .................................. 199
idp {signature | system-protect} update signatures .............................. 199
idp {signature | system-protect} update weekly {sun | mon | tue | wed | thu | fri | sat}
<0..23> .................................................................. 199
idp {signature| anomaly } rule { append | <1..32> | insert <1..32> } ............ 187
idp {signature| anomaly } rule { delete <1..32> | move <1..32> to <1..32> } ..... 187
idp anomaly newpro [base {all | none}] .......................................... 189
idp customize signature edit quoted_string ...................................... 196
idp customize signature quoted_string ........................................... 196
idp reload ...................................................................... 186
idp rename {signature | anomaly} profile1 profile2 .............................. 186
idp search signature my_profile name quoted_string sid SID severity severity_mask platform platform_mask policytype policytype_mask service service_mask activate {any
| yes | no} log {any | no | log | log-alert} action action_mask .......... 193
380
ZyWALL (ZLD) CLI Reference Guide
List of Commands (Alphabetical)
idp search system-protect my_profile name quoted_string sid SID severity severity_mask
platform platform_mask policytype policytype_mask service service_mask activate
{any | yes | no} log {any | no | log | log-alert} action action_mask ..... 193
idp signature newpro [base {all | lan | wan | dmz | none}] ...................... 188
idp statistics flush ............................................................ 200
idp system-protect .............................................................. 193
idp system-protect deactivate ................................................... 186
iface {add | del} {interface_name | virtual_interface_name} ..................... 354
in-dnat append protocol {all | tcp | udp} original-ip address_name <0..65535> <0..65535>
mapped-ip address_name <0..65535> <0..65535> ............................. 143
in-dnat delete <1..10> .......................................................... 143
in-dnat insert <1..10> protocol {all | tcp | udp} original-ip address_name <0..65535>
<0..65535> mapped-ip address_name <0..65535> <0..65535> .................. 143
in-dnat move <1..10> to <1..10> ................................................. 143
in-dnat <1..10> protocol {all | tcp | udp} original-ip address_name <0..65535> <0..65535>
mapped-ip address_name <0..65535> <0..65535> ............................. 143
in-snat source address_name destination address_name snat address_name .......... 143
interface ........................................................................ 28
interface {num|append|insert num} interface-name [weight <1..10>|limit <1..2097152>|passive] ..................................................................... 86
interface aux .................................................................... 82
interface cellular budget-auto-save <5..1440> .................................... 70
interface dial aux ............................................................... 82
interface dial interface_name .................................................... 66
interface disconnect aux ......................................................... 82
interface disconnect interface_name .............................................. 66
interface interface_name ......................................................... 57
interface interface_name ......................................................... 59
interface interface_name ......................................................... 60
interface interface_name ......................................................... 62
interface interface_name ......................................................... 63
interface interface_name ......................................................... 66
interface interface_name ......................................................... 80
interface interface_name ......................................................... 81
interface reset {interface_name|virtual_interface_name|all} ...................... 53
interface send statistics interval <15..3600> .................................... 53
interface-name {ppp_interface | ethernet_interface} user_defined_name ............ 53
interface-rename old_user_defined_name new_user_defined_name ..................... 53
ip dhcp pool rename profile_name profile_name .................................... 55
ip dns server -flush ............................................................ 296
ip dns server rule {<1..32>|append|insert <1..32>} access-group {ALL|address_object}
zone {ALL|address_object} action {accept|deny} ........................... 296
ip dns server rule move <1..32> to <1..32> ...................................... 296
ip dns server zone-forwarder {<1..32>|append|insert <1..32>} {domain_zone_name|*} userdefined w.x.y.z [private | interface {interface_name | auto}] ............ 297
ip dns server zone-forwarder move <1..32> to <1..32> ............................ 297
ip ftp server rule {rule_number|append|insert rule_number} access-group
{ALL|address_object} zone {ALL|zone_object} action {accept|deny} ......... 306
ip ftp server rule move rule_number to rule_number .............................. 306
ip gateway ip metric <0..15> ..................................................... 52
ip http secure-server cipher-suite {cipher_algorithm} [cipher_algorithm]
[cipher_algorithm] [cipher_algorithm] .................................... 301
ip http secure-server table {admin|user} rule {rule_number|append|insert rule_number}
access-group {ALL|address_object} zone {ALL|zone_object} action {accept|deny}
301
ip http secure-server table {admin|user} rule move rule_number to rule_number ... 301
ip http server table {admin|user} rule {rule_number|append|insert rule_number} accessgroup {ALL|address_object} zone {ALL|zone_object} action {accept|deny} ... 301
ip http server table {admin|user} rule move rule_number to rule_number .......... 301
ZyWALL (ZLD) CLI Reference Guide
381
ListofC om m ands (A lphabetical)
ip http-redirect activate description ........................................... 118
ip http-redirect deactivate description ......................................... 118
ip http-redirect description interface interface_name redirect-to w.x.y.z <1..65535>
118
ip http-redirect description interface interface_name redirect-to w.x.y.z <1..65535> deactivate ................................................................. 118
ip http-redirect flush .......................................................... 118
ip ospf authentication ........................................................... 60
ip ospf authentication message-digest ............................................ 60
ip ospf authentication same-as-area .............................................. 60
ip ospf message-digest-key <1..255> md5 password ................................. 61
ip route replace {w.x.y.z} {w.x.y.z} {interface|w.x.y.z} <0..127> with {w.x.y.z}
{w.x.y.z} {interface|w.x.y.z} <0..127> .................................... 97
ip ssh server rule {rule_number|append|insert rule_number} access-group
{ALL|address_object} zone {ALL|zone_object} action {accept|deny} ......... 303
ip ssh server rule move rule_number to rule_number .............................. 303
ip telnet server rule {rule_number|append|insert rule_number} access-group
{ALL|address_object} zone {ALL|zone_object} action {accept|deny} ......... 304
ip telnet server rule move rule_number to rule_number ........................... 304
ip virtual-server {activate | deactivate} profile_name .......................... 113
ip virtual-server delete profile_name ........................................... 113
ip virtual-server flush ......................................................... 113
ip virtual-server profile_name interface interface_name original-ip {any | ip |
address_object} map-to {address_object | ip} map-type any [nat-loopback [nat-1-1map] [deactivate] | nat-1-1-map [deactivate] | deactivate] ............... 112
ip virtual-server profile_name interface interface_name original-ip {any | IP |
address_object} map-to {address_object | ip} map-type original-service
service_object mapped-service service_object [nat-loopback [nat-1-1-map] [deactivate] | nat-1-1-map [deactivate] | deactivate] ........................... 113
ip virtual-server profile_name interface interface_name original-ip {any | IP |
address_object} map-to {address_object | ip} map-type port protocol {any | tcp |
udp} original-port <1..65535> mapped-port <1..65535> [nat-loopback [nat-1-1-map]
[deactivate] | nat-1-1-map [deactivate] | deactivate] .................... 112
ip virtual-server profile_name interface interface_name original-ip {any | IP |
address_object} map-to {address_object | ip} map-type ports protocol {any | tcp |
udp} original-port-begin <1..65535> original-port-end <1..65535> mapped-port-begin <1..65535> [nat-loopback [nat-1-1-map] [deactivate] | nat-1-1-map [deactivate] | deactivate] ...................................................... 113
ip virtual-server rename profile_name profile_name .............................. 113
ipsec-isakmp policy_name ........................................................ 141
ip-type {icmp | igmp | igrp | pim | ah | esp | vrrp | udp | tcp | any} .......... 354
isakmp keepalive <2..60> ........................................................ 139
isakmp policy rename policy_name policy_name .................................... 140
keystring pre_shared_key ........................................................ 140
l2tp-over-ipsec authentication aaa authentication profile_name .................. 156
l2tp-over-ipsec crypto map_name ................................................. 155
l2tp-over-ipsec pool address-object ............................................. 155
l2tp-over-ipsec recover default-ipsec-policy .................................... 155
language <English | Simplified_Chinese | Traditional_Chinese> ................... 312
ldap {activate|deactivate} ...................................................... 269
ldap ip {ip|fqdn} port <1..65535> [id name password password] [deactivate] ...... 269
lifetime <180..3000000> ......................................................... 140
list signature {anti-virus | personal-firewall | status} ........................ 284
loadbalancing-index <outbound|inbound|total> ...................................... 87
local-id type {ip ip | fqdn domain_name | mail e_mail | dn distinguished_name} .. 140
local-ip {ip {ip | domain_name} | interface interface_name} ..................... 140
local-ip ip ..................................................................... 144
local-policy address_name ....................................................... 142
logging console category module_name level {alert | crit | debug | emerg | error | info
382
ZyWALL (ZLD) CLI Reference Guide
List of Commands (Alphabetical)
| notice | warn} ......................................................... 338
logging mail <1..2> schedule daily hour <0..23> minute <0..59> .................. 337
logging mail <1..2> schedule weekly day day hour <0..23> minute <0..59> ......... 337
logging mail <1..2> sending_now ................................................. 336
logging system-log category module_name {disable | level normal | level all} .... 334
logging usb-storage category category disable .................................... 73
logging usb-storage category category level <all|normal> ......................... 73
logging usb-storage flushThreshold <1..100> ...................................... 74
login-page background-color {color-rgb | color-name | color-number} ............. 292
login-page message-color {color-rgb | color-name | color-number} ................ 292
login-page title title .......................................................... 293
login-page title-color {color-rgb | color-name | color-number} .................. 293
login-page window-color {color-rgb | color-name | color-number} ................. 293
logo background-color {color-rgb | color-name | color-number} ................... 293
mac mac .......................................................................... 63
matching-criteria {any | all} ................................................... 284
mode {main | aggressive} ........................................................ 139
mode {normal|trunk} .............................................................. 87
move <1..8> to <1..8> ............................................................ 87
mtu <576..1492> .................................................................. 67
mtu <576..1492> .................................................................. 70
network ip mask .................................................................. 56
network IP/<1..32> ............................................................... 56
no address-object object_name ................................................... 246
no anti-spam dnsbl domain dnsbl_domain .......................................... 220
no app other rule_number ........................................................ 168
no app protocol_name rule rule_number ........................................... 165
no area IP virtual-link IP message-digest-key <1..255> .......................... 102
no arp ip ....................................................................... 356
no authentication key ........................................................... 100
no bind ......................................................................... 187
no budget log [recursive] ........................................................ 69
no budget log-percentage [recursive] ............................................. 70
no ca category {local|remote} certificate_name .................................. 270
no ca validation name ........................................................... 270
no device-ha link-monitoring .................................................... 234
no device-ha stop-stub-interface ................................................ 234
no dscp-marking .................................................................. 93
no http-inspection {http-xxx} log ............................................... 190
no icmp-decoder {truncated-header | truncated-timestamp-header | truncated-address-header} action ............................................................... 191
no icmp-decoder {truncated-header | truncated-timestamp-header | truncated-address-header} log .................................................................. 191
no idp {signature | anomaly} profile3 ........................................... 186
no idp {signature| anomaly } rule <1..32> ....................................... 187
no idp customize signature custom_sid ........................................... 196
no ip dns server rule <1..32> ................................................... 297
no ip ftp server rule rule_number ............................................... 306
no ip http secure-server cipher-suite {cipher_algorithm} ........................ 301
no ip http secure-server table {admin|user} rule rule_number .................... 301
no ip http server table {admin|user} rule rule_number ........................... 301
no ip http-redirect description ................................................. 118
no ip ospf authentication ........................................................ 60
no ip ospf message-digest-key .................................................... 61
no ip ssh server rule rule_number ............................................... 303
no ip telnet server rule rule_number ............................................ 304
no ip virtual-server profile_name ............................................... 112
no l2tp-over-ipsec session tunnel-id <0..65535> ................................. 156
no mac ........................................................................... 63
ZyWALL (ZLD) CLI Reference Guide
383
List of Commands (Alphabetical)
no network ....................................................................... 56
no packet-trace .................................................................. 28
no port <1..x> ................................................................... 64
no sa spi spi ................................................................... 145
no sa tunnel-name map_name ...................................................... 145
no scan-detection sensitivity ................................................... 189
no schedule-object object_name .................................................. 254
no security {none | wep | wpa | wpa-wpa2 | wpa2} ................................. 78
no server-type .................................................................. 278
no service-object object_name ................................................... 249
no signature sid action ......................................................... 188
no signature SID action ......................................................... 193
no signature sid log ............................................................ 188
no signature sid log ............................................................ 193
no snmp-server rule rule_number ................................................. 308
no sslvpn policy profile_name ................................................... 149
no tcp-decoder {tcp-xxx} log .................................................... 190
no udp-decoder {truncated-header | undersize-len | oversize-len} action ......... 190
no udp-decoder {truncated-header | undersize-len | oversize-len} log ............ 190
no use-defined-mac ............................................................... 64
no username username ............................................................ 238
nslookup ......................................................................... 28
ntp sync ........................................................................ 294
object-group address rename group_name group_name ............................... 247
object-group service rename group_name group_name ............................... 251
ocsp {activate|deactivate} ...................................................... 269
ocsp url url [id name password password] [deactivate] ........................... 270
or .............................................................................. 165
or .............................................................................. 165
or .............................................................................. 166
or .............................................................................. 166
os-type {windows | linux | mac-osx | others} .................................... 284
output-power [100% | 50% | 25% | 12.5%] .......................................... 75
out-snat source address_name destination address_name snat address_name ......... 142
packet-capture configure ........................................................ 353
packet-trace ..................................................................... 28
packet-trace [interface interface_name] [ip-proto {<0..255> | protocol_name | any}] [srchost {ip | hostname | any}] [dst-host {ip | hostname | any}] [port {<1..65535> |
any}] [file] [duration <1..3600>] [extension-filter filter_extension] .... 353
peer-id type {any | ip ip | fqdn domain_name | mail e_mail | dn distinguished_name}
140
peer-ip {ip | domain_name} [ip | domain_name] ................................... 140
peer-ip ip ...................................................................... 144
ping ............................................................................. 28
ping-check {domain_name | ip | default-gateway} .................................. 62
ping-check {domain_name | ip | default-gateway} fail-tolerance <1..10> ........... 62
ping-check {domain_name | ip | default-gateway} method {icmp | tcp} .............. 62
ping-check {domain_name | ip | default-gateway} period <5..30> ................... 62
ping-check {domain_name | ip | default-gateway} port <1..65535> .................. 62
ping-check {domain_name | ip | default-gateway} timeout <1..10> .................. 62
policy {policy_number | append | insert policy_number} ........................... 92
policy default-route ............................................................. 94
policy delete policy_number ...................................................... 94
policy flush ..................................................................... 94
policy list table ................................................................ 94
policy move policy_number to policy_number ....................................... 94
port status Port<1..x> ........................................................... 64
port <0..65535> ................................................................. 166
port <0..65535> ................................................................. 167
384
ZyWALL (ZLD) CLI Reference Guide
List of Commands (Alphabetical)
port <1..65535> ending-port <1..65535>] ........................................ 278
port <1..65535> ending-port <1..65535>] [program-path program-path] ............ 278
port-grouping representative_interface port <1..x> ............................... 64
psm .............................................................................. 28
qos [none | wmm} ................................................................. 75
reauth <30..30000> ............................................................... 77
reboot ........................................................................... 28
redistribute {static | ospf} metric <0..16> ..................................... 100
release .......................................................................... 28
release dhcp interface-name ...................................................... 57
remote-policy address_name ...................................................... 142
rename ........................................................................... 28
rename /script/old-file_name /script/new-file_name .............................. 319
rename {/cert | /conf | /idp | /packet_trace | /script | /tmp}/old-file_name {/cert | /
conf | /idp | /packet_trace | /script | /tmp}/new-file_name .............. 319
renew ............................................................................ 28
renew dhcp interface-name ........................................................ 57
ring-buffer <enable|disable> .................................................... 354
role ap .......................................................................... 75
router ospf ..................................................................... 100
router ospf ..................................................................... 101
router ospf ..................................................................... 101
router ospf ...................................................................... 60
router rip ...................................................................... 100
router rip ....................................................................... 59
run .............................................................................. 28
run /script/file_name.zysh ...................................................... 320
scan-detection block-period <1..3600> ........................................... 189
scan-detection sensitivity {low | medium | high} ................................ 189
scenario {site-to-site-static|site-to-site-dynamic|remote-access-server|remote-accessclient} .................................................................. 142
schedule-object object_name date time date time ................................. 254
schedule-object object_name time time [day] [day] [day] [day] [day] [day] [day] . 254
security mode {none | wep | wpa | wpa-wpa2 | wpa2} ............................... 77
security wep mode <open | share> ................................................. 77
security wep <64 | 128> default-key <1..4> ....................................... 77
security wpa <tkip | aes> eap external ........................................... 77
security wpa <tkip | aes> eap internal profile-name tls-cert certificate name ... 77
security wpa <tkip | aes> psk key psk-key ........................................ 77
security wpa2 <tkip | aes> eap external .......................................... 77
security wpa2 <tkip | aes> eap internal profile-name tls-cert certificate name .. 77
security wpa2 <tkip | aes> psk key psk-key ....................................... 77
security wpa-wpa2 <tkip | aes> eap external ...................................... 77
security wpa-wpa2 <tkip | aes> eap internal profile-name tls-cert certificate name 77
security wpa-wpa2 <tkip | aes> psk key psk-key ................................... 77
server-type {file-sharing | owa | web-server} url URL [entry-point entry_point] . 277
server-type file-sharing share-path share-path .................................. 278
server-type rdp server-address server-address [starting- ........................ 278
server-type vnc server-address server-address [starting- ........................ 278
server-type weblink url url ..................................................... 278
service-object object_name {tcp | udp} {eq <1..65535> | range <1..65535> <1..65535>}
249
service-object object_name icmp icmp_value ...................................... 250
service-object object_name protocol <1..255> .................................... 250
service-object rename object_name object_name ................................... 250
service-register checkexpire ..................................................... 39
service-register service-type standard license-key key_value ..................... 39
service-register service-type trial av-engine {kav|zav} .......................... 39
service-register service-type trial service {content-filter|idp} ................. 39
ZyWALL (ZLD) CLI Reference Guide
385
List of Commands (Alphabetical)
service-register service-type trial service all {kav|zav} ........................ 39
service-register service-type trial service av {kav|zav} ......................... 39
session timeout {udp-connect <1..300> | udp-deliver <1..300> | icmp <1..300>} ... 345
session timeout session {tcp-established | tcp-synrecv | tcp-close | tcp-finwait | tcpsynsent | tcp-closewait | tcp-lastack | tcp-timewait} <1..300> .......... 345
session-limit append ............................................................ 133
session-limit delete rule_number ................................................ 133
session-limit flush ............................................................. 133
session-limit insert rule_number ................................................ 133
session-limit limit <0..8192> ................................................... 133
session-limit move rule_number to rule_number ................................... 133
session-limit rule_number ....................................................... 133
set pfs {group1 | group2 | group5 | none} ....................................... 142
set security-association lifetime seconds <180..3000000> ........................ 142
set session-key {ah <256..4095> auth_key | esp <256..4095> [cipher enc_key] authenticator
auth_key} ................................................................ 144
setenv ........................................................................... 28
setenv-startup stop-on-error off ................................................ 320
show ............................................................................ 166
show ............................................................................ 167
show ............................................................................ 169
show ............................................................................ 216
show ............................................................................ 239
show ............................................................................ 243
show ............................................................................. 28
show ............................................................................. 55
show [all] ...................................................................... 179
show aaa authentication {group-name|default} .................................... 263
show aaa group server ad group-name ............................................. 258
show aaa group server ldap group-name ........................................... 259
show aaa group server radius group-name ......................................... 260
show access-page settings ....................................................... 293
show account [pppoe profile_name | pptp profile_name] ........................... 273
show account cellular profile_name .............................................. 274
show address-object [object_name] ............................................... 246
show ad-server .................................................................. 256
show anti-spam activation ....................................................... 215
show anti-spam black-list [status] .............................................. 219
show anti-spam dnsbl domain ..................................................... 220
show anti-spam dnsbl ip-check-order ............................................. 220
show anti-spam dnsbl max-query-ip ............................................... 220
show anti-spam dnsbl query-timeout {smtp | pop3} ................................ 220
show anti-spam dnsbl query-timeout time ......................................... 221
show anti-spam dnsbl statistics ................................................. 221
show anti-spam dnsbl status ..................................................... 220
show anti-spam rule [rule_number] ............................................... 216
show anti-spam statistics collect ............................................... 223
show anti-spam statistics ranking {source | mail-address} ....................... 223
show anti-spam statistics summary ............................................... 222
show anti-spam tag {dnsbl | dnsbl-timeout} ...................................... 221
show anti-spam tag black-list ................................................... 219
show anti-spam white-list [status] .............................................. 218
show anti-virus activation ...................................................... 178
show anti-virus eicar activation ................................................ 178
show anti-virus signatures status ............................................... 182
show anti-virus skip-unknown-file-type activation ............................... 178
show anti-virus statistics collect .............................................. 183
show anti-virus statistics ranking {destination | source | virus-name} .......... 183
show anti-virus statistics summary .............................................. 183
386
ZyWALL (ZLD) CLI Reference Guide
List of Commands (Alphabetical)
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
anti-virus update .......................................................... 182
anti-virus update status ................................................... 182
app {general|im|p2p|stream} ................................................ 170
app all .................................................................... 170
app all defaultport ........................................................ 170
app all statistics ......................................................... 170
app config ................................................................. 170
app highest sip bandwidth priority ......................................... 171
app im support action ...................................................... 170
app other config ........................................................... 170
app other rule all ......................................................... 170
app other rule all statistics .............................................. 170
app other rule default ..................................................... 170
app other rule default statistics .......................................... 170
app other rule rule_number ................................................. 170
app other rule rule_number statistics ...................................... 170
app other statistics ....................................................... 170
app protocol_name config ................................................... 170
app protocol_name defaultport .............................................. 170
app protocol_name rule all ................................................. 170
app protocol_name rule all statistics ...................................... 170
app protocol_name rule default ............................................. 170
app protocol_name rule default statistics .................................. 170
app protocol_name rule rule_number ......................................... 170
app protocol_name rule rule_number statistics .............................. 170
app protocol_name statistics ............................................... 170
app-watch-dog config ....................................................... 360
app-watch-dog monitor-list ................................................. 360
arp-table .................................................................. 356
boot status ................................................................. 33
bridge available member ..................................................... 81
bwm activation ............................................................. 171
bwm activation .............................................................. 94
bwm-usage < [policy-route policy_number] | [interface interface_name] ...... 94
ca category {local|remote} [name certificate_name format {text|pem}] ....... 270
ca category {local|remote} name certificate_name certpath .................. 270
ca spaceusage .............................................................. 270
ca validation name name .................................................... 270
clock date ................................................................. 294
clock status ............................................................... 294
clock time ................................................................. 294
cnm-agent configuration .................................................... 311
comport status .............................................................. 33
conn [user {username|any|unknown}] [service {service-name|any|unknown}] [source
{ip|any}] [destination {ip|any}] [begin <1..128000>] [end <1..128000>] ... 340
conn ip-traffic destination ................................................ 340
conn ip-traffic source ..................................................... 340
conn status ................................................................ 340
connectivity-check continuous-log status ................................... 334
connectivity-check continuous-log status .................................... 62
connlimit max-per-host ..................................................... 129
console .................................................................... 295
content-filter passed warning .............................................. 208
content-filter policy ...................................................... 208
content-filter profile [filtering_profile] ................................. 210
content-filter settings .................................................... 208
content-filter statistics collect .......................................... 210
content-filter statistics summary .......................................... 210
content-filter statistics summary .......................................... 210
ZyWALL (ZLD) CLI Reference Guide
387
List of Commands (Alphabetical)
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
content-filter url- ........................................................ 208
content-filter url- ........................................................ 210
corefile copy usb-storage ................................................... 74
cpu status .................................................................. 33
crypto map [map_name] ...................................................... 141
daily-report status ........................................................ 341
ddns [profile_name] ........................................................ 108
device-ha ap-mode backup sync .............................................. 231
device-ha ap-mode backup sync status ....................................... 231
device-ha ap-mode backup sync summary ...................................... 231
device-ha ap-mode forwarding-port interface_name ........................... 231
device-ha ap-mode interfaces ............................................... 231
device-ha ap-mode master sync .............................................. 231
device-ha ap-mode next-sync-time ........................................... 231
device-ha ap-mode status ................................................... 231
device-ha link-monitoring .................................................. 234
device-ha status ........................................................... 228
device-ha stop-stub-interface .............................................. 234
device-ha sync ............................................................. 233
device-ha sync backup next-sync-time ....................................... 233
device-ha sync status ...................................................... 233
device-ha vrrp-group ....................................................... 232
device-register status ...................................................... 39
diag-info .................................................................. 347
diag-info copy usb-storage .................................................. 74
dial-in .................................................................... 310
disk ........................................................................ 33
eps failure-messages ....................................................... 282
eps profile [profile_name] ................................................. 284
eps profile profile_name signature {anti-virus | personal-firewall} ........ 284
eps signature {anti-virus | personal-firewall | status} .................... 285
extension-slot .............................................................. 33
fan-speed ................................................................... 33
firewall ................................................................... 129
firewall rule_number ....................................................... 129
firewall status ............................................................ 129
firewall zone_object {zone_object|ZyWALL} .................................. 129
firewall zone_object {zone_object|ZyWALL} rule_number ...................... 129
force-auth activation ...................................................... 241
force-auth exceptional-service ............................................. 241
force-auth policy {<1..1024> | all} ........................................ 241
fqdn ....................................................................... 293
groupname [groupname] ...................................................... 239
hardware-watchdog-timer status ............................................. 359
idp ........................................................................ 186
idp {signature | anomaly} base profile ..................................... 186
idp {signature | system-protect} signatures {version | date | number} ...... 200
idp {signature | system-protect} update .................................... 200
idp {signature | system-protect} update status ............................. 200
idp {signature| anomaly } rules ............................................ 187
idp anomaly profile flood-detection [all details] .......................... 191
idp anomaly profile flood-detection {tcp-flood | udp-flood | ip-flood | icmp-flood}
details .................................................................. 191
show idp anomaly profile http-inspection {ascii-encoding | u-encoding | bare-byte-unicode-encoding | base36-encoding | utf-8-encoding | iis-unicode-codepoint-encoding
| multi-slash-encoding | iis-backslash-evasion | self-directory-traversal | directory-traversal | apache-whitespace | non-rfc-http-delimiter | non-rfc-definedchar | oversize-request-uri-directory | oversize-chunk-encoding | webroot-directory-traversal} details .................................................. 192
388
ZyWALL (ZLD) CLI Reference Guide
List of Commands (Alphabetical)
show idp anomaly profile http-inspection all details ............................ 191
show idp anomaly profile icmp-decoder {truncated-header | truncated-timestamp-header |
truncated-address-header} details ........................................ 192
show idp anomaly profile icmp-decoder all details ............................... 192
show idp anomaly profile scan-detection [all details] ........................... 191
show idp anomaly profile scan-detection {icmp-sweep | icmp-filtered-sweep | open-port}
details .................................................................. 191
show idp anomaly profile scan-detection {ip-protocol-scan | ip-decoy-protocol-scan | ipprotocol-sweep | ip-distributed-protocol-scan | ip-filtered-protocol-scan | ipfiltered-decoy-protocol-scan | ip-filtered-distributed-protocol-scan | ip-filtered-protocol-sweep} details ............................................ 191
show idp anomaly profile scan-detection {tcp-portscan | tcp-decoy-portscan | tcp-portsweep | tcp-distributed-portscan | tcp-filtered-portscan | tcp-filtered-decoyportscan | tcp-filtered-distributed-portscan | tcp-filtered-portsweep} details
191
show idp anomaly profile scan-detection {udp-portscan | udp-decoy-portscan | udp-portsweep | udp-distributed-portscan | udp-filtered-portscan | udp-filtered-decoyportscan | ............................................................... 191
show idp anomaly profile tcp-decoder {undersize-len | undersize-offset | oversize-offset
| bad-length-options | truncated-options | ttcp-detected | obsolete-options | experimental-options} details .............................................. 192
show idp anomaly profile tcp-decoder all details ................................ 192
show idp anomaly profile udp-decoder {truncated-header | undersize-len | oversize-len}
details .................................................................. 192
show idp anomaly profile udp-decoder all details ................................ 192
show idp profile signature {all | custom-signature} details ..................... 188
show idp profile signature sid details .......................................... 188
show idp profiles ............................................................... 187
show idp search signature my_profile name quoted_string sid SID severity severity_mask
platform platform_mask policytype policytype_mask service service_mask activate
{any | yes | no} log {any | no | log | log-alert} action action_mask ..... 194
show idp search system-protect my_profile name quoted_string sid SID severity
severity_mask platform platform_mask policytype policytype_mask service
service_mask activate {any | yes | no} log {any | no | log | log-alert} action
action_mask .............................................................. 194
show idp signature all details .................................................. 186
show idp signature base profile {all|none|wan|lan|dmz} settings ................. 187
show idp signature profile signature all details ................................ 186
show idp signatures custom-signature all details ................................ 196
show idp signatures custom-signature custom_sid {details | contents | non-contents}
196
show idp signatures custom-signature number ..................................... 196
show idp statistics collect ..................................................... 201
show idp statistics ranking {signature-name | source | destination} ............. 201
show idp statistics summary ..................................................... 200
show idp system-protect all details ............................................. 193
show interface {ethernet | vlan | bridge | ppp | auxiliary} status ............... 51
show interface {interface_name | ethernet | vlan | bridge | ppp | virtual ethernet |
virtual vlan | virtual bridge | auxiliary | all} .......................... 51
show interface cellular [corresponding-slot|device-status|support-device] ........ 70
show interface cellular budget-auto-save ......................................... 70
show interface cellular corresponding-slot ....................................... 70
show interface cellular device-status ............................................ 70
show interface cellular status ................................................... 70
show interface cellular support-device ........................................... 70
show interface interface_name [budget] ........................................... 70
show interface interface_name device profile ..................................... 70
show interface interface_name device status ...................................... 70
show interface ppp system-default ................................................ 67
ZyWALL (ZLD) CLI Reference Guide
389
List of Commands (Alphabetical)
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
390
interface ppp user-define ................................................... 67
interface send statistics interval .......................................... 51
interface summary all ....................................................... 51
interface summary all status ................................................ 51
interface-group {system-default|user-define|group-name} ..................... 86
interface-name .............................................................. 53
ip dhcp binding [ip] ........................................................ 57
ip dhcp pool [profile_name] ................................................. 55
ip dns server .............................................................. 297
ip dns server database ..................................................... 297
ip dns server status ....................................................... 297
ip ftp server status ....................................................... 306
ip http server secure status ............................................... 301
ip http server status ...................................................... 301
ip http-redirect [description] ............................................. 118
ip load-balancing link-sticking status ...................................... 90
ip route [kernel | connected | static | ospf | rip | bgp] .................. 102
ip route static-dynamic .................................................... 349
ip route-settings ........................................................... 97
ip ssh server status ....................................................... 303
ip telnet server status .................................................... 304
ip virtual-server [profile_name] ........................................... 112
isakmp keepalive ........................................................... 139
isakmp policy [policy_name] ................................................ 139
isakmp sa .................................................................. 145
l2tp-over-ipsec ............................................................ 156
l2tp-over-ipsec session .................................................... 156
language {setting | all} ................................................... 312
ldap-server ................................................................ 256
led status .................................................................. 33
lockout-users .............................................................. 243
logging debug entries [priority pri] [category module_name] [srcip ip] [dstip ip]
[service service_name] [begin <1..512> end <1..512>] [keyword keyword] ... 335
logging debug entries field field [begin <1..1024> end <1..1024>] .......... 335
logging debug status ....................................................... 335
logging entries [priority pri] [category module_name] [srcip ip] [dstip ip] [service
service_name] [begin <1..512> end <1..512>] [keyword keyword] ............ 333
logging entries field field [begin <1..512> end <1..512>] .................. 333
logging status console ..................................................... 337
logging status mail ........................................................ 336
logging status syslog ...................................................... 335
logging status system-log .................................................. 334
logging status usb-storage .................................................. 73
login-page default-title ................................................... 293
login-page settings ........................................................ 293
logo settings .............................................................. 293
mac ......................................................................... 33
mem status .................................................................. 33
ntp server ................................................................. 294
object-group address [group_name] .......................................... 247
object-group service group_name ............................................ 250
ospf area IP virtual-link .................................................. 101
packet-capture config ...................................................... 355
packet-capture status ...................................................... 355
page-customization ......................................................... 293
ping-check [interface_name | status] ........................................ 62
ping-check [interface_name] ................................................. 62
policy-route [policy_number] ................................................ 94
policy-route begin <1..200> end <1..200> .................................... 95
ZyWALL (ZLD) CLI Reference Guide
List of Commands (Alphabetical)
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
policy-route controll-ipsec-dynamic-rules ................................... 95
policy-route override-direct-route .......................................... 95
policy-route rule_count ..................................................... 95
policy-route underlayer-rules ............................................... 95
port setting ................................................................ 65
port status ................................................................. 65
port vlanid ................................................................. 80
port-grouping ............................................................... 64
radius-server .............................................................. 257
ram-size .................................................................... 33
redundant-power status ...................................................... 33
reference object aaa authentication [default | auth_method] ................. 31
reference object account pppoe [profile] .................................... 31
reference object account pptp [profile] ..................................... 31
reference object address [profile] .......................................... 31
reference object ca category {local|remote} [cert_name] ..................... 31
reference object crypto map [crypto_name] ................................... 31
reference object eps [profile] .............................................. 31
reference object interface [interface_name | virtual_interface_name] ........ 31
reference object isakmp policy [isakmp_name] ................................ 32
reference object schedule [profile] ......................................... 31
reference object service [profile] .......................................... 31
reference object sslvpn application [profile] ............................... 31
reference object sslvpn policy [profile] .................................... 32
reference object username [username] ........................................ 31
reference object zone [profile] ............................................. 32
reference object-group aaa ad [group_name] .................................. 32
reference object-group aaa ldap [group_name] ................................ 32
reference object-group aaa radius [group_name] .............................. 32
reference object-group address [profile] .................................... 32
reference object-group interface [profile] .................................. 32
reference object-group service [profile] .................................... 32
reference object-group username [username] .................................. 32
report [interface_name {ip | service | url}] ............................... 339
report status .............................................................. 339
rip {global | interface {all | interface_name}} ............................ 60
route order ................................................................ 349
running-config ............................................................. 320
sa monitor [{begin <1..1000>} | {end <1..1000>} | {crypto-map regexp} | {policy
regexp} |{rsort sort_order} | {sort sort_order}] ........................ 145
schedule-object ............................................................ 254
serial-number ............................................................... 33
service-object [object_name] ............................................... 249
service-register reseller-info .............................................. 39
service-register server-type ................................................ 39
service-register status {all|content-filter|idp|sslvpn|av} .................. 39
session timeout {icmp | tcp-timewait | udp} ................................ 345
session-limit .............................................................. 133
session-limit begin rule_number end rule_number ............................ 133
session-limit rule_number .................................................. 133
session-limit status ....................................................... 133
setenv-startup ............................................................. 320
snmp status ................................................................ 308
socket listen ............................................................... 33
socket open ................................................................. 33
software-watchdog-timer log ................................................ 360
software-watchdog-timer status ............................................. 360
sslvpn application [application_object] .................................... 277
sslvpn monitor ............................................................. 148
ZyWALL (ZLD) CLI Reference Guide
391
List of Commands (Alphabetical)
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
show
ssl-vpn network-extension local-ip ......................................... 148
sslvpn policy [profile_name] ............................................... 148
system default-interface-group .............................................. 87
system default-snat ......................................................... 87
system route default-wan-trunk ............................................. 349
system route dynamic-vpn ................................................... 349
system route nat-1-1 ....................................................... 349
system route policy-route .................................................. 349
system route site-to-site-vpn .............................................. 349
system snat default-snat ................................................... 350
system snat nat-1-1 ........................................................ 350
system snat nat-loopback ................................................... 350
system snat order .......................................................... 349
system snat policy-route ................................................... 349
system uptime ............................................................... 33
usb-storage ................................................................. 73
username [username] ........................................................ 238
users {username | all | current} ........................................... 243
users default-setting {all | user-type {admin|user|guest|limited-admin|ext-user}}
239
show users idle-detection-settings .............................................. 240
show users retry-settings ....................................................... 240
show users simultaneous-logon-settings .......................................... 240
show users update-lease-settings ................................................ 240
show version ..................................................................... 33
show vpn-concentrator [profile_name] ............................................ 144
show vpn-counters ............................................................... 145
show vrpt send device information interval ...................................... 336
show vrpt send interface statistics interval .................................... 336
show vrpt send system status interval ........................................... 336
show wlan mac-filter ............................................................. 79
show wlan mac-filter status ...................................................... 79
show workspace application ...................................................... 149
show workspace cifs ............................................................. 149
show zone [profile_name] ........................................................ 104
show zone binding-iface ......................................................... 104
show zone default-binding ....................................................... 104
show zone none-binding .......................................................... 104
show zone system-default ........................................................ 104
show zone user-define ........................................................... 104
shutdown ......................................................................... 28
signature sid action {drop | reject-sender | reject-receiver | reject-both} ..... 188
signature sid action {drop | reject-sender | reject-receiver | reject-both} ..... 193
signature sid log [alert] ....................................................... 188
signature sid log [alert] ....................................................... 193
snaplen <68..1512> .............................................................. 354
snmp-server rule {rule_number|append|insert rule_number} access-group
{ALL|address_object} zone {ALL|zone_object} action {accept|deny} ......... 308
snmp-server rule move rule_number to rule_number ................................ 308
split-size <1..2048> ............................................................ 354
ssid ssid ........................................................................ 78
sslvpn network-extension local-ip ip ............................................ 148
sslvpn no connection username user_name ......................................... 149
sslvpn policy {profile_name | profile_name append | profile_name insert <1..16>} 148
sslvpn policy move <1..16> to <1..16> ........................................... 149
sslvpn policy rename profile_name profile_name .................................. 149
station-limit <1..255> ........................................................... 78
storage <internal|usbstorage> ................................................... 354
system default-interface-group group-name ........................................ 87
392
ZyWALL (ZLD) CLI Reference Guide
List of Commands (Alphabetical)
tcp-decoder {tcp-xxx} log [alert] ............................................... 190
telnet ........................................................................... 28
test aaa ......................................................................... 28
test aaa {server|secure-server} {ad|ldap} host {hostname|ipv4-address} [host {hostname|ipv4-address}] port <1..65535> base-dn base-dn-string [bind-dn bind-dnstring password password] login-name-attribute attribute [alternative-login-nameattribute attribute] account account-name ................................ 265
traceroute ....................................................................... 28
traceroute {ip | hostname} ...................................................... 353
traceroute {ip | hostname} ...................................................... 353
traffic-prioritize {tcp-ack|content-filter|dns|ipsec-vpn|ssl-vpn} bandwidth
<0..1048576> priority <1..7> [maximize-bandwidth-usage]; .................. 52
traffic-prioritize {tcp-ack|content-filter|dns|ipsec-vpn|ssl-vpn} deactivate ..... 52
transform-set {ah-md5 | ah-sha} [{ah-md5 | ah-sha} [{ah-md5 | ah-sha}]] ......... 141
transform-set esp_crypto_algo [esp_crypto_algo [esp_crypto_algo]] ............... 141
transform-set isakmp-algo [isakmp_algo [isakmp_algo]] ........................... 140
trigger append incoming service_name trigger service_name ........................ 94
trigger delete <1..8> ............................................................ 94
trigger insert <1..8> incoming service_name trigger service_name ................. 94
trigger move <1..8> to <1..8> .................................................... 94
type {internal|external|general} ................................................. 64
udp-decoder {truncated-header | undersize-len | oversize-len} action {drop | reject-sender | reject-receiver | reject-both} ...................................... 190
udp-decoder {truncated-header | undersize-len | oversize-len} log [alert] ....... 190
udp-filtered-distributed-portscan | udp-filtered-portsweep} details ............. 191
unlock lockout-users ip | console ............................................... 243
usb-storage mount ................................................................ 73
usb-storage umount ............................................................... 73
usb-storage warn number <percentage|megabyte> .................................... 73
use-defined-mac .................................................................. 64
username rename username username ............................................... 238
username username [no] description description .................................. 238
username username [no] logon-lease-time <0..1440> ............................... 239
username username [no] logon-re-auth-time <0..1440> ............................. 239
username username [no] logon-time-setting <default | manual> .................... 238
username username nopassword user-type {admin | guest | limited-admin | user} ... 238
username username password password user-type {admin | guest | limited-admin | user}
238
username username user-type ext-user ............................................ 238
users default-setting [no] logon-lease-time <0..1440> ........................... 239
users default-setting [no] logon-re-auth-time <0..1440> ......................... 239
users default-setting [no] user-type <admin |ext-user|guest|limited-admin|user> . 240
users force-logout ip | username ................................................ 243
vpn-concentrator rename profile_name profile_name ............................... 145
vrpt send device information interval <15..3600> ................................ 336
vrpt send interface statistics interval <15..3600> .............................. 336
vrpt send system status interval <15..3600> ..................................... 336
wep-key <1..4> key ............................................................... 78
windows-version {windows-2000 | windows-xp | windows-2003 | windows-2008 | windows-vista
| windows-7 | windows-2008r2} ............................................ 284
wlan mac-filter associate <allow | deny> ......................................... 79
wlan slot_name ................................................................... 75
write ............................................................................ 28
write ........................................................................... 320
zone profile_name ............................................................... 104
ZyWALL (ZLD) CLI Reference Guide
393
List of Commands (Alphabetical)
394
ZyWALL (ZLD) CLI Reference Guide
Was this manual useful for you? yes no
Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Download PDF

advertising