Chapter 34 IDP Commands
ZyWALL / USG (ZLD) CLI Reference Guide
228
Note: It is recommended you use the web configurator to search for signatures.
34.3.3.1 Search Parameter Tables
The following table displays the command line severity, platform and policy type equivalent values.
If you want to combine platforms in a search, then add their respective numbers together. For
example, to search for signatures for Windows NT, Windows XP and Windows 2000 computers, then
type “12” as the platform parameter.
Table 130
Signature Search Command
COMMAND
DESCRIPTION
idp search signature
my_profile
name
quoted_string
sid SID severity
severity_mask
platform
platform_mask
policytype
policytype_mask
service
service_mask
activate {any | yes | no} log {any | no | log | log-
alert} action
action_mask
Searches for signature(s) in a profile by the parameters
specified. The quoted string is any text within the
signature name in quotes, for example, [idp search
LAN_IDP name "WORM" sid 0 severity 0 platform 0
policytype 0 service 0 activate any log any action]
searches for all signatures in the LAN_IDP profile
containing the text “worm” within the signature name.
show idp search signature
my_profile
name
quoted_string
sid SID severity
severity_mask
platform
platform_mask
policytype
policytype_mask
service
service_mask
activate {any | yes | no} log {any | no
| log | log-alert} action
action_mask
Searches for signature(s) in a profile by the parameters
specified. The quoted string is any text within the
signature name in quotes, for example, [idp search
LAN_IDP name "WORM" sid 0 severity 0 platform 0
policytype 0 service 0 activate any log any action]
searches for all signatures in the LAN_IDP profile
containing the text “worm” within the signature name.
Table 131
Severity, Platform and Policy Type Command Values
SEVERITY
PLATFORM
POLICY TYPE
1 = Very Low
2 = Low
3 = Medium
4 = High
5 = Severe
1 = All
2 = Win95/98
4 = WinNT
8 = WinXP/2000
16 = Linux
32 = FreeBSD
64 = Solaris
128 = SGI
256 = Other-Unix
512 = Network-Device
1 = DoS
2 = Buffer-Overflow
3 = Access-Control
4 = Scan
5 = Backdoor/Trojan
6 = Others
7 = P2P
8 = IM
9 = Virtus/Worm
10 = Botnet
11 = Web-Attack
12 = Spam
Summary of Contents for ZyWALL USG Series
Page 19: ...19 PART I Introduction ...
Page 20: ...20 ...
Page 38: ...Chapter 2 User and Privilege Modes ZyWALL USG ZLD CLI Reference Guide 38 ...
Page 39: ...39 PART II Reference ...
Page 40: ...40 ...
Page 48: ...Chapter 4 Status ZyWALL USG ZLD CLI Reference Guide 48 ...
Page 52: ...Chapter 5 Registration ZyWALL USG ZLD CLI Reference Guide 52 ...
Page 128: ...Chapter 15 Route ZyWALL USG ZLD CLI Reference Guide 128 ...
Page 136: ...Chapter 17 Zones ZyWALL USG ZLD CLI Reference Guide 136 ...
Page 140: ...Chapter 18 DDNS ZyWALL USG ZLD CLI Reference Guide 140 ...
Page 148: ...Chapter 20 HTTP Redirect ZyWALL USG ZLD CLI Reference Guide 148 ...
Page 152: ...Chapter 21 ALG ZyWALL USG ZLD CLI Reference Guide 152 ...
Page 156: ...Chapter 22 UPnP ZyWALL USG ZLD CLI Reference Guide 156 ...
Page 159: ...Chapter 23 IP MAC Binding ZyWALL USG ZLD CLI Reference Guide 159 ...
Page 178: ...Chapter 25 Secure Policy ZyWALL USG ZLD CLI Reference Guide 178 ...
Page 218: ...Chapter 32 Application Patrol ZyWALL USG ZLD CLI Reference Guide 218 ...
Page 236: ...Chapter 34 IDP Commands ZyWALL USG ZLD CLI Reference Guide 236 ...
Page 246: ...Chapter 35 Content Filtering ZyWALL USG ZLD CLI Reference Guide 246 ...
Page 256: ...Chapter 36 Anti Spam ZyWALL USG ZLD CLI Reference Guide 256 ...
Page 262: ...Chapter 37 SSL Inspection ZyWALL USG ZLD CLI Reference Guide 262 ...
Page 268: ...Chapter 38 Device HA ZyWALL USG ZLD CLI Reference Guide 268 ...
Page 284: ...Chapter 41 Addresses ZyWALL USG ZLD CLI Reference Guide 284 ...
Page 288: ...Chapter 42 Services ZyWALL USG ZLD CLI Reference Guide 288 ...
Page 302: ...Chapter 46 Authentication Server ZyWALL USG ZLD CLI Reference Guide 302 ...
Page 338: ...Chapter 52 System Remote Management ZyWALL USG ZLD CLI Reference Guide 338 ...
Page 358: ...Chapter 53 File Manager ZyWALL USG ZLD CLI Reference Guide 358 ...
Page 372: ...Chapter 56 Session Timeout ZyWALL USG ZLD CLI Reference Guide 372 ...
Page 374: ...Chapter 57 Diagnostics ZyWALL USG ZLD CLI Reference Guide 374 ...
Page 384: ...Chapter 59 Maintenance Tools ZyWALL USG ZLD CLI Reference Guide 384 ...
Page 426: ...List of Commands Alphabetical ZyWALL USG ZLD CLI Reference Guide 426 ...