ZyXEL Communications ZyWALL 10 User Manual page 235

Internet security gateway
Hide thumbs Also See for ZyWALL 10:
Table of Contents

Advertisement

Function
config edit firewall set <set #>
default-permit <forward | block>
config edit firewall set <set #>
icmp-timeout <seconds>
config edit firewall set <set #>
udp-idle-timeout <seconds>
config edit firewall set <set #>
connection-timeout <seconds>
config edit firewall set <set #>
fin-wait-timeout <seconds>
config edit firewall set <set #>
tcp-idle-timeout <seconds>
config edit firewall set <set #>
log <yes | no>
R
R
u
u
l
l
e
e
s
s
config edit firewall set <set #>
rule
<rule #> permit <forward | block>
config edit firewall set <set #>
rule
<rule #> active <yes | no>
config edit firewall set <set #>
rule
<rule #> protocol <integer
protocol value >
config edit firewall set <set #>
rule
<rule #> log <none | match | not-
match | both>
config edit firewall set <set #>
rule
<rule #> alert <yes | no>
config edit firewall set <set #>
rule
<rule #> srcaddr-single <ip
address>
CLI Commands
CLI Syntax
ZyWALL 10 Internet Security Gateway
Description
Edits whether a packet is dropped or allowed through, when
it does not meet a rule within the set
Edits the time limit, in seconds, for an idle ICMP session,
before it is terminated
Edits the time limit, in seconds, for an idle UDP session,
before it is terminated
Edits the wait time, in seconds, for the SYN traffic in initiating
a TCP session, before it is terminated
Edits the wait time, in seconds, for the FIN traffic in
concluding a TCP session, before it is terminated
Edits the time limit, in seconds, for an idle TCP session,
before it is terminated
Switches on/off the logs for matching default permit
Edits whether a packet is dropped or allowed through, when
it meets this rule
Edits whether a rule is enabled or not
Edits the protocol specification number made in this rule for
ICMP currently
Edits whether traffic that does match the rule, doesn't match,
both or neither is logged.
Activates or deactivates the notification function, for when a
DOS attack occurs or there is a violation of any alert settings.
In case of such instances, the function will send an e-mail to
the SMTP destination address and log an alert.
Selects and edits a source address of the traffic which
comply to this rule
I

Advertisement

Table of Contents
loading

Table of Contents