202
mostly of management services.
loglocaldeny {disable |
enable}
Enable or disable logging of failedconnection attempts to the
freeGuard 100 that use TCP/IP ports other than the TCP/IP
ports configured for management access (443 for https, 22 for
ssh, 23 for telnet, and 80 for HTTP).
disable
management-vdom
Select a management virtual domain. Whenyou select a
management virtual domain,the routing and interfaces of the
selectedvirtual domain are used for management functions
such as remote logging and SNMP.
root
mc-ttl_notchange
Enable to alter multicast forwarding so that it does not
decrement the TTL in the packet header. Disable for normal
multicast forwarding behavior.
disable
multicast-forward
{disable | enable}
Enable or disable multicast forwarding to forward any multicast
IP packets in which the TTL is 2 or higher to all interfaces
andVLAN interfaces except the receiving interface. The TTL in
the IP header will be reduced by 1.
disable
ntpserver {<name_str>
| <address_ipv4>}
Enter the domain name or IP address of a Network Time
Protocol (NTP) server.
132.246.16
8.148
ntpsync {disable |
enable}
Enable or disable automatically updating the system date and
time by connecting to aNetwork Time Protocol (NTP) server.
Formore information about NTP and to find the IP address of
an NTP server that you can use, see http://www.ntp.org.
disable
opmode {nat |
transparent}
Change the freeGuard 100 operation mode to NAT/Route or
Transparent mode.
nat
phase1-rekey {enable
| disable}
Enable or disable automatic rekeyingbetween IKE peers before
the phase 1 keylife expires.
enable
radius_port<port_integ
er>
Change the default RADIUS port. The default port for RADIUS
traffic is 1812. If your RADIUS server is using port 1645 you
can use the CLI to change the default RADIUS port.
1812
refresh
<seconds_integer>
Set the Automatic Refresh Interval, in seconds, for the web-
based manager System Status Monitor. Enter 0 for noautomatic
refresh.
0
reset_sessionless_tcp
{enable | disable}
Enabling this option may help resolveissues with a problematic
server, but it can make the freeGuard 100 more vulnerable to
denial of service attacks. In most cases you should leave
reset_sessionless_tcp disabled. The reset_sessionless_tcp
command determines what the freeGuard 100 does if it
receives a TCP packet but cannot find a corresponding session
in its session table. This happens most often because the
session has timed out. If you disable reset_sessionless_tcp,
the freeGuard 100 silently drops the packet. The packet
originator does not know that the session has expired and
might retransmit the packet several times before attempting to
start a new session. This is normal network operation. If you
enable reset_sessionless_tcp, the freeGuard 100 sends a
RESET packet tothe packet originator. The packet originator
disable
Summary of Contents for freeGuard 100
Page 1: ...freeGuard 100 UTM Firewall CLI USER S MANUAL P N F0025000 Rev 1 1...
Page 3: ......
Page 7: ......
Page 87: ...80 The config ips anomaly command has 1 subcommand config limit...
Page 183: ...176...