Page 4
C o n t e n t s session ... 85 snmp... 86 ssh ... 88 syslog ... 90 system ... 92 tech-support ... 93 trace-route ... 94 transparent... 95 vpn ... 97 vrouter ... 101 zone ... 104 CLI Reference Guide Version 3R2...
REFACE Contents • About This Guide on page 6 • CLI Syntax on page 6 • Dependency Delimiters on page 6 • Object Name Conventions on page 6 • CLI Variables on page 6 Version 3R2 CLI Reference Guide...
Page 6
P R E F A C E About This Guide This guide describes the commands used to configure and manage the freeGuard Blaze 2100 from a management interface. CLI Syntax The CLI syntax may include options, switches, parameters, and other features. Some command descriptions use dependency delimiters.
Page 7
Variable Notation The variable notation used in this manual consists of italicized parameter identifiers. For example, the set arp command uses four identifiers, as shown here: set arp ip_addr mac_addr interface | age number where • ip_addr represents an IP address. •...
Page 8
P R E F A C E CLI Reference Guide Version 3R2...
C O M M A N D D E S C R I P T I O N S address address The address command is used to define entries in the address book of a security zone. An address book is a list containing all addresses, address groups, and domain names defined for a security zone.
Page 11
C O M M A N D D E S C R I P T I O N S address name name name_str The name of an individual address book entry. You can use an address group in a security policy definition to specify a single address.
The admin command is used to configure or display administrative parameters for the freeGuard Blaze 2100. There will be two accounts on the device: Read/Write Administrator (admin) and Read-Only Administrator (admin-r). The Read-only Administrator only has read privileges. The Read/Write Administrator will have full rights to create, modify and remove settings on the box.
Page 13
Example The following command configures the email address john@abc.com to receive updates concern- ing administrative issues: set admin mail mail-addr1 john@abc.com mail-addr2 set admin mail mail-addr2 name_str Example The following command configures the secondary email address pat@acme.com to receive up- dates concerning administrative issues: set admin mail mail-addr2 pat@acme.com password...
C O M M A N D D E S C R I P T I O N S The all command is used to return all configuration settings and software to the factory default settings. The configuration file, which stores the saved configuration settings of the box, is re- stored to factory default.
The MAC address of a network device for which you want to make a mac_addr static entry in the ARP table. The name of the interface through which the freeGuard Blaze 2100 can interface direct traffic to reach the network device with the specified IP address and MAC address.
C O M M A N D D E S C R I P T I O N S clock clock The clock commands are used to get and set the system time. Syntax get clock set clock {date time | dst-off | ntp | timezone number } unset unset clock {dst-off | ntp | timezone } Keywords and Variables...
Page 17
C O M M A N D D E S C R I P T I O N S clock timezone Sets the time zone value. This value indicates the time difference between GMT standard time and the current local time (when DST is OFF). When DST is ON and the clock is already set forward one hour, decrease the time difference by one hour and set the minutes accurately.
C O M M A N D D E S C R I P T I O N S config config Use the config command to display the configuration settings for the device. You can display a current configuration setting (stored in RAM), or saved configurations (stored in flash memory). The config file can be saved to flash memory with the save command.
console Use the console commands to define or list the CLI console parameters. The console parameters determine the following: • Whether the device displays messages in the active console window • The number of lines that may appear on a console window page •...
Page 20
C O M M A N D D E S C R I P T I O N S console Resize the console size to window size. timeout set console timeout number unset console timeout timeout Determines how many minutes the device waits before closing an inactive administrator session.
Use the counter commands to clear or display the values contained in traffic counters. Traffic counters provide processing information, which you can use to monitor traffic flow. The freeGuard Blaze 2100 maintains the following categories of counters: • Screen counters, for monitoring firewall behavior for the entire zone or for a particular interface •...
C O M M A N D D E S C R I P T I O N S delete delete Use delete to delete persistent information in flash memory. Syntax delete delete file filename | ssl certificate Keywords and Variables file delete file filename filename...
dhcp The dhcp command is used to configure the Dynamic Host Configuration Protocol. get dhcp relay-server set dhcp relay-server string interface interface unset unset dhcp relay-server string interface interface Keywords and Variables interface set dhcp relay-server string interface interface unset dhcp relay-server string interface interface Sets/unsets the relay server and interface.
C O M M A N D D E S C R I P T I O N S The dns command is used to configure Domain Name System (DNS) or to display DNS configu- ration information. DNS allows network devices to identify each other using domain names in- stead of IP addresses.
Page 25
Using the name option with set places an entry in the DNS table, representing a host device with a host name and IP address. This allows you to reach a host using the host name. For example, executing set dns host name MyHost 3.3.3.18 creates a DNS table entry for a host at address 3.3.3.18, with a host name of MyHost.
C O M M A N D D E S C R I P T I O N S domain domain The domain commands are used to set or get the domain name of the device. A domain name is a character string that identifies the security device. This domain name allows other devices to access the local device through a DNS server.
C O M M A N D D E S C R I P T I O N S exit exit The exit command is used to terminate and log out from a CLI session. Syntax exit Keywords and Variables None.
C O M M A N D D E S C R I P T I O N S file file The file command is used to clear or display information for files stored in the flash memory. Syntax get file [ filename | info ] Keywords and Variables Variable Parameters clear [ ...
group The group commands are used to group multiple addresses or multiple services together in one group. A group allows to reference a group of addresses or services by a single name in a policy. This eliminates the need for a separate policy for each address or service. [NOTE] Although a single policy might reference a service group with three members, the device generates multiple internal rules from that policy.
Page 30
C O M M A N D D E S C R I P T I O N S group address Performs the operation on an address group. The zone value specifies the zone to which the address group is bound. This zone is either a default security zone or a user-defined zone. Adds an address or service named mbr_name.
Page 31
C O M M A N D D E S C R I P T I O N S group • From the console, you can add only one member to a group at a time. service grp_name Performs the operation on a service group. CLI Reference Guide Version 3R2...
Page 32
C O M M A N D D E S C R I P T I O N S This command is used to set high availability parameters on a node in the group. Syntax get ha link set ha priority node-priority hb-interval interval-in-ms hb-threshold threshold...
Page 33
link Displays HA link information. peer-ip ip-address-of-peer The ip-address (destination) of the peers. preempt This command is permitted only the secondary and used to preempt the primary node and takeover the role of primary node. The existing primary will reboot and join the cluster as a secondary node.
C O M M A N D D E S C R I P T I O N S hostname hostname The hostname commands are used to define the device name. This name always appears in the console command prompt. The host name is a character string that identifies the device. If you define a host name for the device (such as MyGateWay) and a domain name for the device (such as “MyDomain,”...
• In Phase 2, the peer devices negotiate the IPSec SAs for encrypting and authenticating the ensuing exchanges of user data. The gateway commands identify the devices or remote users with which the freeGuard Blaze 2100 establishes the VPN tunnel. The NAT traversal command is used to enable and manage the NAT traversal feature.
Page 36
C O M M A N D D E S C R I P T I O N S Syntax get ike unset unset ike gateway [ name_str ] p1-proposal name_str | p2-proposal name_str | Phase 1 Proposal set ike p1-proposal name_str CLI Reference Guide cert | gateway [ name_str ] |...
Page 37
Phase 2 Proposal set ike p2-proposal name_str [ group1 | group2 | group5 | no-pfs ] esp [ 3des | des | aes128 | aes196 | aes256 | null ] Gateway Tunnel set ike gateway name_str [ aggressive | main ] [ local-id id_str ] [ outgoing-interface interface ] [ preshare key_str ] set ike gateway name_string dpd always-send...
Page 38
C O M M A N D D E S C R I P T I O N S address Defines the remote IKE gateway address either as an IP address or as a hostname. Use this option to set up a site-to-site VPN. Example The following command specifies mygateway.com as the address of a remote IKE gateway named mtt1, define the preshared key as aabbccd, and a security proposal named prop1:...
Page 39
Enables or disables IPsec NAT Traversal, a feature that allows transmission of encrypted traffic through a freeGuard Blaze 2100 configured for NAT. The NAT Traversal feature encapsulates ESP packets into UDP packets. This prevents the NAT device from altering ESP packet headers in transit, thus preventing authentication failure on the peer device.
Page 40
C O M M A N D D E S C R I P T I O N S esp Specifies Encapsulating Security Payload protocol, which provides encryption and authentication. des | 3des | aes128 | aes192 | aes256 Specifies the encryption algorithm. md5 | sha-1 Specifies the authentication (hashing) algorithm used in ESP protocol.
Page 41
The following parameters define the elapsed time between each attempt to renegotiate a security association. The minimum allowable lifetime is 180 seconds. The default lifetime is 28800 seconds. days number hours number minutes number seconds number Example The following command specifies Phase 2 proposal g2-esp-3des-null: •...
Page 42
C O M M A N D D E S C R I P T I O N S RADIUS server supports CHAP challenge to the remote access user, IKE will then forward the challenges to the remote user. Defaults •...
ike-cookie Use the ike-cookie command to remove IKE-related cookies from the device. Syntax clear clear ike-cookie { all | ip_addr } Keywords and Variables Variable Parameter clear ike-cookie ip_addr ip_addr Directs the device to remove cookies based on a IP address (ip_addr). Example The following command removes all cookies based on the IP address 10.1.10.10: clear ike-cookie 10.1.10.10...
C O M M A N D D E S C R I P T I O N S image image Use the image command to manage software images on the unit. After a software image is down- loaded onto the unit with the tftp command, the image command allows to set the downloaded image as active.
C O M M A N D D E S C R I P T I O N S interface interface Use the interface commands to define or display interface settings. Interfaces are physical or logical connections that handle network traffic. CLI Reference Guide Version 3R2...
Page 46
C O M M A N D D E S C R I P T I O N S interface Syntax get interface [ all | interface [ dip [ dip_num ] ] set interface interface dhcp-relay enable | dip dip_num ip_addr1 [ ip_addr2 ] [fix-port] | shift-from ip_addr3 to ip_addr4 [ ip_addr5 ] [fix-port] ip ip_addr/mask |...
Page 48
C O M M A N D D E S C R I P T I O N S interface set interface interface dip dip_num ip_addr1 [ ip_addr2 ] unset interface interface dip dip_num Sets a Dynamic IP (DIP) pool. Each DIP pool consists of a range of addresses. The device can use the pool to dynamically or deterministicaly allocate source addresses when the device applies source address translation (NAT-src) to packets traversing the specified interface.
Page 49
set interface interface ip ip_addr/mask unset interface interface ip ip_addr The IP address ip_addr and netmask mask for the specified interface or subinterface. Example The following commands create logical interface eth0.2, bind it to the Trust zone, and assign it IP address 10.1.1.23/24: set interface eth0.2 zone trust set interface eth0.2 ip 10.1.1.23/24...
Page 50
C O M M A N D D E S C R I P T I O N S interface set interface interface nat protocol set interface interface protocol protocol unset interface interface protocol set interface interface phy { ... } unset interface interface phy Defines the physical connection mode on the specified interface.
Page 51
zone set interface interface zone zone zone Binds the interface to specified security zone. Example The following command binds the interface eth1.1 to the “trust” zone: set interface eth1.1 zone trust Version 3R2 C O M M A N D D E S C R I P T I O N S interface CLI Reference Guide...
Page 52
Use the ip commands to set or display IP parameters for communication with a TFTP server. The freeGuard Blaze 2100 can use TFTP servers to save or import external files. These files can con- tain configuration settings, software versions, public keys, error messages, certificates, and other items.
Use the log commands to configure the device for message logging. The log commands allow you to perform the following: • Display the current log status according to severity level, policy, service, software module, source, destination, or duration. • Determine which log information to display or omit. •...
Page 54
C O M M A N D D E S C R I P T I O N S set log module arp level [*] destination [**] | cfg level [*] destination [**] | dhcrelay level [*] destination [**] | dos level [*] destination [**] | edk level [*] destination [**] | fup level [*] destination [**] |...
Page 56
C O M M A N D D E S C R I P T I O N S level set log module name_str level string destination string unset log module name_str level string destination string level Specifies the urgency level of the generated log messages. Starting with the most urgent, these levels are emergency, alert, critical, error, warning, notification, information, and debugging.
Use the ntp commands to configure the device for Simple Network Time Protocol (SNTP). SNTP is a simplified version of NTP, which is a protocol used for synchronizing computer clocks in the Internet. This version is adequate for devices that do not require a high level of synchronization and accuracy.
Page 58
C O M M A N D D E S C R I P T I O N S module ip_addr The IP address of the primary NTP server with which the device can synchronize its system clock time. dom_name The domain name of the primary NTP server with which the device can synchronize its system clock time.
ping Use the ping command to check the network connection to another system. Syntax ping [ ip_addr | name_str ] [ count number [ size number [ time-out number ] ] ] Keywords and Variables Variable Parameters ping [ ip_addr | name_str ] [ ... ] ip_addr | name_str Pings the host at address (ip_addr) or with name (name_str).
Page 60
C O M M A N D D E S C R I P T I O N S ping • Ping count of 4 • Packet size 1000 • Ping timeout of three seconds: ping 10.100.2.11 count 4 size 1000 time-out 3 CLI Reference Guide Version 3R2...
The PKI (Public Key Infrastructure) commands provide PKI and X509 certificate services to the configuration agent. Syntax get pki set pki Version 3R2 authority idnum | x509 [ pkcs10 number ] | [ cert number ] | [ dn ] | [ list ca-cert | cert |...
Page 62
C O M M A N D D E S C R I P T I O N S unset unset pki exec exec pki Keywords and Variables authority CA's authority references. get pki authority idnum set pki authority idnum | cert-path [ full | partial ] cert-path Sets the X509 certificate path validation level to full or partial.
Page 63
refresh The crl refresh interval. server-name The LDAP server name. The URL of CRL storage. cert-status, revocation-check Uses the CRL to check the certificate status. None Disable CRL checking. ldap Default LDAP server configuration. set pki ldap set pki ldap [ crl-url | server-name ] crl-url Set the default LDAP URL for CRL.
Page 64
C O M M A N D D E S C R I P T I O N S Set the IP address. local-name Set the locality. name Set the name in a common name field. org-name Set the organization name. org-unit-name Set the organization unit name.
C O M M A N D D E S C R I P T I O N S policy policy Use the policy commands to define policies to control network and VPN traffic. A policy is a set of rules that determines how traffic passes between security zones (interzone policy), between interfaces bound to the same zone (intrazone policy), and between addresses in the Global zone (global policy).
Page 66
C O M M A N D D E S C R I P T I O N S policy Syntax get policy set policy [ global ] [id pol_num1 ] [top | before pol_num2 ] nat [ src [ dip-id id_num ] deny | permit | reject |...
Page 67
unset unset policy { pol_num | id pol_num } disable unset policy default-permit-all unset policy global port-attack Keywords and Variables get policy all Displays information about all security policies. before set policy before pol_num1 { ... } before Specifies the position of the policy before another policy (pol_num) in the access control list (ACL).
Page 68
C O M M A N D D E S C R I P T I O N S policy deny | permit | reject set policy [ global ] { ... } permit | deny | reject [ ... ] deny | permit | reject deny Blocks the service at the firewall.
Page 69
get policy [ global ] id pol_num set policy [ global ] id pol_num1 { ... } unset policy id pol_num [ disable ] id pol_num Specifies an policy ID number. (The disable switch disables the policy.) Example The following command assigns the policy an ID value of 10 and permits FTP-GET traffic from any address in the Trust zone to any address in the Untrust zone: set policy id 10 from trust to untrust any any ftp-get permit move...
Page 70
C O M M A N D D E S C R I P T I O N S policy src Performs NAT-src on traffic to which the policy applies. The device can perform NAT-src using the egress interface IP address (in which case, you do not specify a DIP pool) or with addresses from a Dynamic IP (DIP) pool: dip-id id_num Specifies the ID number of a DIP pool.
Page 71
small-servers ini-killer Ini-Killer is a Trojan Horse attack that allows an attacker to destroy .ini files on a remote computer communicating over TCP port 9989. Netbus NetBus is a Trojan Horse attack for Windows 95/98/NT that, once executed on a remote computer, will allow an attacker to perform illicit activities such as opening and closing the CD-ROM, starting applications, showing different messages or even redirecting a web browser to a specific URL on the Internet Netspy NetSpy is a Trojan Horse attack that allows an attacker to perform illicit...
Page 72
C O M M A N D D E S C R I P T I O N S policy Example The following command: • Permits any kind of service from any address in the Trust zone to any address in the Untrust zone •...
pppoe Use the pppoe command to set/unset the ppp/pppoe configuration. Syntax get pppoe all | statistics set pppoe ac string | authentication [ any | chap | pap ] | enable | interface name | netmask sring | ppp [ lcp-echo-retries | lcp-echo-timeout ] | service string | static-ip | username string password string...
Page 74
C O M M A N D D E S C R I P T I O N S pppoe pap - Only pap is acceptable enable Enable the PPP/PPPoE link. interface set pppoe interface name name The interface to which to bind PPPoE. netmask set pppoe netmask string string...
reset Use the reset command to restart the device. Syntax reset reset no-prompt | save-config { no | yes } Keywords and Variables no-prompt reset no-prompt no-prompt Indicates no confirmation. save-config reset save-config [ no | yes ] save-config no Directs the device to not save the current configuration before resetting. yes Directs the device to save the current configuration before resetting.
C O M M A N D D E S C R I P T I O N S route route Use the route commands to display entries in the static route table and add entries to the static route table. The get route command displays: The IP address, netmask, interface, gateway, protocol, pref- erence, metric.
Page 77
route set route ip_addr/mask [ ...] unset route ip_addr/mask [ ... ] route Configures routes for the routing table. ip_addr/mask Specifies the IP address that appears in the routing table. gateway ip_addr Specifies the gateway for the next hop. id id_num Displays information for the route that matches the ID number. The ID number is a system-assigned number that you can see when you enter the get route command with no options interface interface Specifies the interface on which a packet for this route is to be...
Page 78
C O M M A N D D E S C R I P T I O N S Use the sa commands to display active or inactive security associations (SAs) or to clear a spec- ified SA. A security association (SA) is a unidirectional agreement between VPN participants regarding the methods and parameters to use while securing a communication channel.
save Use the save commands to save images to the device, and configuration settings to or from the device. Syntax save save save config save config from save software save software from flash to tftp ip_addr filename save software from tftp ip_addr filename boot { pri | sec } | mos { pri | sec } Keywords and Variables...
Page 80
C O M M A N D D E S C R I P T I O N S save on a TFTP server (192.168.0.3): save config from flash to tftp 192.168.0.3 output.txt tftp save config from tftp ip_addr filename to { ... } save software from tftp ip_addr filename to { ...
scheduler Applies the policy only at times defined in the specified schedule. Syntax get scheduler name name_string get scheduler once get scheduler recurrent set scheduler name_string unset unset scheduler name_string Example Create a schedule named “Mkt_Sched.” set schedule Mkt_Sched Version 3R2 C O M M A N D D E S C R I P T I O N S scheduler CLI Reference Guide...
C O M M A N D D E S C R I P T I O N S service service The service commands are used to create custom service definitions, modify existing service def- initions, or display the current entries in the service definition list. Use service definitions in pol- icies to specify how the device provides a service during a secure session.
Page 83
protocol - Defines the service by IP protocol. - Defines a protocol for the specified service. ptcl_num specifies the protocol by protocol number. tcp specifies a TCP-based service. udp specifies a UDP-based service. icmp specifies an ICMP-based service. Example The following command sets a service named “ipsec” that uses protocol 50: set service ipsec protocol 50 src-port | dst-port svc_name...
Page 84
C O M M A N D D E S C R I P T I O N S service user Displays all user-defined services. Defaults The default timeout for TCP connections is 30 minutes. The default timeout for UDP connections is 1 minute. Using the get service command without any arguments displays all pre-defined, user-defined, and service group information in the service book.
session Use the session commands to clear or display entries in the session table. The session table contains information about individual sessions between hosts that communicate through the device. Every time the device initiates a new session, it creates a session entry and uses the information in the entry while processing subsequent traffic between the hosts.
C O M M A N D D E S C R I P T I O N S snmp snmp Use the snmp command to manage SNMP network settings. Syntax get snmp community | settings | statistics set snmp community name_str [ host host_namestring ] | contact string | location string |...
Page 87
host set snmp community comm_string host hostname_string host Defines the community name string and the name of the SNMP management host. The mask value defines a SNMP community member as a subnet. location set snmp location string unset snmp location location Defines the physical location of the system.
C O M M A N D D E S C R I P T I O N S Use the ssh commands to configure the Secure Shell (SSH) server task. The SSH server task is an SSH-compatible server application that resides on the device. When you enable the SSH server task, SSH client applications can manage the device through a secure connection.
Page 89
C O M M A N D D E S C R I P T I O N S report get ssh report report Displays SSHv2 key and session information for the device on which SSH is currently enabled. CLI Reference Guide Version 3R2...
C O M M A N D D E S C R I P T I O N S syslog syslog Use the syslog commands to configure the device to send traffic and event messages to up to four syslog hosts, or to display the current syslog configuration. [NOTE] The syslog host must be enabled before you can enable syslog.
Page 91
enable Enables the device to send messages to the syslog host(s). facilities set syslog config { name_str | ip_addr } facility local0 | local1 | local2 | local3 | local4 | local5 | local6 | local7 facilities Defines the facility level for each syslog host that you specify. Example The following command sets the syslog host configuration to report all logs: set syslog config 172.16.20.249 facility local0...
C O M M A N D D E S C R I P T I O N S system system Use the get system command to display general system information. The information displayed by the get system command includes: •...
tech-support Use the tech-support command to display technical support information. Syntax get tech-support dump [ all | spu | memory | interrupts | pib_pob | dump parser ] | read { read* string string } * = 8,16,32,64 Keywords and Variables get tech-support get tech-support dump all dump...
C O M M A N D D E S C R I P T I O N S trace-route trace-route Use the trace-route command to display the route to a host. Syntax trace-route { ip_addr | name_str } [ hop number [ time-out number ] ] Keywords Variable Parameters trace-route ip_addr...
transparent The transparent command is used to enable or disable transparent mode configuration param- eters. The transparent mode feature enables a VPN-firewall device to function as a simple 2-port layer-2/bridge device so that it can be deployed as a bump-in-the-wire device with minimal changes to the existing network (especially from the routing point of view).
Page 96
C O M M A N D D E S C R I P T I O N S transparent bmcast Enable/disable bridging of non-IP (neither ARP nor MPLS) broadcast and multicast packets. The default setting is to NOT to bypass (allow) the bridging of non-IP broadcast and multicast packets.
The vpn command is used to create and delete a Virtual Private Network (VPN) tunnel, or to show VPN tunnel already configured. A VPN tunnel is a way to secure network traffic across a public network. A VPN tunnel consists of a pair of unidirectional security associations (SAs), one at each end of the tunnel, that specify the security parameter index (SPI), destination IP address, and security protocol (Authentication Header or Encapsulating Security Payload) used to exchange packets through the tunnel.
Page 98
C O M M A N D D E S C R I P T I O N S Example The following command displays a VPN tunnel named “TunnelA”: get vpn tunnnela set vpn tunn_str manual spi_num1 spi_num2 gateway ip_addr [ ... ] ah { ...
Page 99
or SHA-1. The key key_str value defines a 16-byte (MD5) or 20-byte (SHA-1) hexidecimal key. Example The following command creates a Manual Key VPN tunnel named “Mkt_vpn”. • Specifies local and remote SPI values 2002 and 3003 • Specifies the IP address of the remote gateway 2.2.2.2 •...
Page 100
C O M M A N D D E S C R I P T I O N S • The Phase 2 proposal consists of the following components: Diffie-Hellman group 2 to protect the keying information during Phase 2 key exchanges Encapsulating Security Payload (ESP) to provide both confidentiality through encryption and encapsulation of the original IP packet and integrity through...
vrouter Use the vrouter commands to control the virtual interface. Use the rip commands to specify and control the Routing Information Protocol (RIP). Syntax get vrouter name protocol rip advertise-def-route | reject-default-route interface name protocol rip enable | vrouter default rip enable | protocol rip reject-def-route unset...
Page 102
C O M M A N D D E S C R I P T I O N S vrouter set vrouter-id number To disable RIP instance: unset vrouter rip Enabling RIP on Interfaces By default, RIP is disabled on all interfaces and you must explicitly enable it on an interface. When you disable RIP at the interface level, RIP does not transmit or receive packets on the specified interface.
Page 103
set interface name protocol rip authentication mode [text | md5 <abcedef123>] set interface name protocol rip passive-mode Queries If a RIP-2 router receives a RIP-1 Request, it should respond with a RIP-1 Response. If the router is configured to send only RIP-2 messages, it should not respond to a RIP-1 Request. Get/Show Commands get protocol rip advertise-def-route get protocol rip default-metric...
C O M M A N D D E S C R I P T I O N S zone zone Use the zone commands to create, remove, or display a security zone, and to set screen options. A security zone is a method for sectioning the network into segments to which you can apply se- curity options.
Page 105
Syntax get zone id id_num | set zone name zone zone unset unset zone zone block | screen Keywords and Variables Variable Parameters get zone zone [ ... ] set zone zone { ... } unset zone zone { ... } zone The name of the zone.
Page 106
C O M M A N D D E S C R I P T I O N S zone get zone all [ ... ] Displays information on all existing zones. block set zone zone block unset zone zone block block Imposes intra-zone traffic blocking.
Page 107
Example The following command enables the icmp-fragments firewall service for the trust zone: set zone trust screen icmp-fragments Creating Interfaces Example The following example shows how to: • Create a new zone named marketing • Enable syn-flood screening • Bind interface eth0 to the zone: set zone name marketing set zone engineering screen syn-flood set interface eth0 zone marketing...
Page 108
C O M M A N D D E S C R I P T I O N S zone CLI Reference Guide Version 3R2...
Need help?
Do you have a question about the freeGuard Blaze 2100 and is the answer not in the manual?
Questions and answers