Figure 320 Routing Command Example; Log Command Example - ZyXEL Communications ZYWALL P1 User Manual

Internet security appliance
Hide thumbs Also See for ZYWALL P1:
Table of Contents

Advertisement

Log Command Example

This example shows how to set the ZyWALL to record the access logs and alerts and then
view the results.
ras> sys logs load
ras> sys logs category access 3
ras> sys logs save
ras> sys logs display access
#
.time
message
0|06/08/2004 05:58:21 |172.21.4.154
BLOCK
Firewall default policy: IGMP (W to W/ZW)
1|06/08/2004 05:58:20 |172.21.3.56
BLOCK
Firewall default policy: IGMP (W to W/ZW)
2|06/08/2004 05:58:20 |172.21.0.2
BLOCK
Firewall default policy: IGMP (W to W/ZW)
3|06/08/2004 05:58:20 |172.21.3.191
BLOCK
Firewall default policy: IGMP (W to W/ZW)
4|06/08/2004 05:58:20 |172.21.0.254
BLOCK
Firewall default policy: IGMP (W to W/ZW)
5|06/08/2004 05:58:20 |172.21.4.187:137
BLOCK
Firewall default policy: UDP (W to W/ZW)
Routing Command
Syntax:
ip nat routing [0:LAN] [0:no|1:yes]
Use this command to set the ZyWALL to route traffic that does not match a NAT rule through
a specific interface. An example of when you may want to use this is if you have servers with
public IP addresses connected to the LAN.
The following command example sets the ZyWALL to route traffic that does not match a
NAT rule through the LAN interface.

Figure 320 Routing Command Example

ras> ip nat routing 2 0
Routing can work in NAT when no NAT rule match.
-----------------------------------------------
LAN: yes
ZyWALL P1 User's Guide
source
Appendix H Command Interpreter
destination
|224.0.1.24
|239.255.255.250
|239.255.255.254
|224.0.1.22
|224.0.0.1
|172.21.255.255:137
notes
|ACCESS
|ACCESS
|ACCESS
|ACCESS
|ACCESS
|ACCESS
469

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents