Chapter 25 Secure Policy
ZyWALL / USG (ZLD) CLI Reference Guide
168
[no] sourceip6
address_object
Sets the source IP address(es). The
no
command resets
the source IP address(es) to the default (
any
).
any
means
all IP addresses.
[no] sourceport {tcp|udp} {eq <1..65535>|range
<1..65535> <1..65535>}
Sets the source port for a secure policy rule. The
no
command removes the source port from the rule.
[no] to {
zone_object
|ZyWALL}
Sets the zone to which the packets are sent. The
no
command removes the zone to which the packets are sent
and resets it to the default (any). any means all interfaces
or VPN tunnels.
[no] user
user_name
Sets a user-aware secure policy rule. The rule is activated
only when the specified user logs into the system. The
no
command resets the user name to the default (
any
).
any
means all users.
Subcommands cannot be used with secure-policy6.
secure-policy <
profile name
>
Creates a secure policy rule. You may use 1-31
alphanumeric characters, underscores(
_
), or dashes (-),
but the first character cannot be a number. This value is
case-sensitive.
[no] cf-profile <
profile name
> {[no log]|[log by-
profile]} {activate | deactivate}
Applies the (already-created) named anti- x profile to
traffic that matches the secure-policy rule.
Log by-
profile
generates a log for all traffic that matches criteria
in the anti- x profile.
no log
does turns off logging and
overrides the anti- x profile log setting. The
no
command
does not apply the named anti- x profile to traffic that
matches the secure-policy rule.
[no] as-profile <
profile name
> {[no log]|[log by-
profile]} {activate | deactivate}
Applies the (already-created) named anti- x profile to
traffic that matches the secure-policy rule.
Log by-
profile
generates a log for all traffic that matches criteria
in the anti- x profile.
no log
does turns off logging and
overrides the anti- x profile log setting. The
no
command
does not apply the named anti- x profile to traffic that
matches the secure-policy rule.
[no] av-profile <
profile name
>{[no log]|[log by-
profile]} {activate | deactivate}
Applies the (already-created) named anti- x profile to
traffic that matches the secure-policy rule.
Log by-
profile
generates a log for all traffic that matches criteria
in the anti- x profile.
no log
does turns off logging and
overrides the anti- x profile log setting. The
no
command
does not apply the named anti- x profile to traffic that
matches the secure-policy rule.
[no] idp-profile <
profile name
> {[no log]|[log by-
profile]} {activate | deactivate}
Applies the (already-created) named anti- x profile to
traffic that matches the secure-policy rule.
Log by-
profile
generates a log for all traffic that matches criteria
in the anti- x profile.
no log
does turns off logging and
overrides the anti- x profile log setting. The
no
command
does not apply the named anti- x profile to traffic that
matches the secure-policy rule.
Table 86
firewall Sub-commands (continued)
COMMAND
DESCRIPTION
Summary of Contents for ZyWALL USG Series
Page 19: ...19 PART I Introduction ...
Page 20: ...20 ...
Page 38: ...Chapter 2 User and Privilege Modes ZyWALL USG ZLD CLI Reference Guide 38 ...
Page 39: ...39 PART II Reference ...
Page 40: ...40 ...
Page 48: ...Chapter 4 Status ZyWALL USG ZLD CLI Reference Guide 48 ...
Page 52: ...Chapter 5 Registration ZyWALL USG ZLD CLI Reference Guide 52 ...
Page 128: ...Chapter 15 Route ZyWALL USG ZLD CLI Reference Guide 128 ...
Page 136: ...Chapter 17 Zones ZyWALL USG ZLD CLI Reference Guide 136 ...
Page 140: ...Chapter 18 DDNS ZyWALL USG ZLD CLI Reference Guide 140 ...
Page 148: ...Chapter 20 HTTP Redirect ZyWALL USG ZLD CLI Reference Guide 148 ...
Page 152: ...Chapter 21 ALG ZyWALL USG ZLD CLI Reference Guide 152 ...
Page 156: ...Chapter 22 UPnP ZyWALL USG ZLD CLI Reference Guide 156 ...
Page 159: ...Chapter 23 IP MAC Binding ZyWALL USG ZLD CLI Reference Guide 159 ...
Page 178: ...Chapter 25 Secure Policy ZyWALL USG ZLD CLI Reference Guide 178 ...
Page 218: ...Chapter 32 Application Patrol ZyWALL USG ZLD CLI Reference Guide 218 ...
Page 236: ...Chapter 34 IDP Commands ZyWALL USG ZLD CLI Reference Guide 236 ...
Page 246: ...Chapter 35 Content Filtering ZyWALL USG ZLD CLI Reference Guide 246 ...
Page 256: ...Chapter 36 Anti Spam ZyWALL USG ZLD CLI Reference Guide 256 ...
Page 262: ...Chapter 37 SSL Inspection ZyWALL USG ZLD CLI Reference Guide 262 ...
Page 268: ...Chapter 38 Device HA ZyWALL USG ZLD CLI Reference Guide 268 ...
Page 284: ...Chapter 41 Addresses ZyWALL USG ZLD CLI Reference Guide 284 ...
Page 288: ...Chapter 42 Services ZyWALL USG ZLD CLI Reference Guide 288 ...
Page 302: ...Chapter 46 Authentication Server ZyWALL USG ZLD CLI Reference Guide 302 ...
Page 338: ...Chapter 52 System Remote Management ZyWALL USG ZLD CLI Reference Guide 338 ...
Page 358: ...Chapter 53 File Manager ZyWALL USG ZLD CLI Reference Guide 358 ...
Page 372: ...Chapter 56 Session Timeout ZyWALL USG ZLD CLI Reference Guide 372 ...
Page 374: ...Chapter 57 Diagnostics ZyWALL USG ZLD CLI Reference Guide 374 ...
Page 384: ...Chapter 59 Maintenance Tools ZyWALL USG ZLD CLI Reference Guide 384 ...
Page 426: ...List of Commands Alphabetical ZyWALL USG ZLD CLI Reference Guide 426 ...