Chapter 21 IDP Commands
ZyWALL (ZLD) CLI Reference Guide
194
21.3.6.1 Search Parameter Tables
The following table displays the command line severity, platform and policy type equivalent
values. If you want to combine platforms in a search, then add their respective numbers
together. For example, to search for signatures for Windows NT, Windows XP and Windows
2000 computers, then type “12” as the platform parameter.
show idp search signature
my_profile
name
quoted_string
sid SID severity
severity_mask
platform
platform_mask
policytype
policytype_mask
service
service_mask
activate {any | yes | no}
log {any | no | log | log-alert} action
action_mask
Searches for signature(s) in a profile by the
parameters specified. The quoted string is any
text within the signature name in quotes, for
example, [idp search LAN_IDP name "WORM"
sid 0 severity 0 platform 0 policytype 0 service
0 activate any log any action] searches for all
signatures in the LAN_IDP profile containing
the text “worm” within the signature name.
show idp search system-protect
my_profile
name
quoted_string
sid SID severity
severity_mask
platform
platform_mask
policytype
policytype_mask
service
service_mask
activate {any | yes | no}
log {any | no | log | log-alert} action
action_mask
Searches for signature(s) in a system-protect
profile by the parameters specified. The quoted
string is any text within the signature name in
quotes, for example, [idp search LAN_IDP
name "WORM" sid 0 severity 0 platform 0
policytype 0 service 0 activate any log any
action] searches for all signatures in the
LAN_IDP profile containing the text “worm”
within the signature name.
Table 102
Signature Search Command
COMMAND
DESCRIPTION
Table 103
Severity, Platform and Policy Type Command Values
SEVERITY
PLATFORM
POLICY TYPE
1 = Very Low
2 = Low
3 = Medium
4 = High
5 = Severe
1 = All
2 = Win95/98
4 = WinNT
8 = WinXP/2000
16 = Linux
32 = FreeBSD
64 = Solaris
128 = SGI
256 = Other-Unix
512 = Network-Device
1 = DoS
2 = Buffer-Overflow
3 = Access-Control
4 = Scan
5 = Backdoor/Trojan
6 = Others
7 = P2P
8 = IM
9 = Virtus/Worm
10 = Porn
11 = Web-Attack
12 = Spam
Summary of Contents for ZyWall
Page 2: ......
Page 6: ...Document Conventions ZyWALL ZLD CLI Reference Guide 6 ...
Page 10: ...10 ...
Page 26: ...Chapter 1 Command Line Interface ZyWALL ZLD CLI Reference Guide 26 ...
Page 46: ...46 ...
Page 84: ...Chapter 6 Interfaces ZyWALL ZLD CLI Reference Guide 84 ...
Page 98: ...Chapter 8 Route ZyWALL ZLD CLI Reference Guide 98 ...
Page 106: ...Chapter 10 Zones ZyWALL ZLD CLI Reference Guide 106 ...
Page 110: ...Chapter 11 DDNS ZyWALL ZLD CLI Reference Guide 110 ...
Page 116: ...Chapter 12 Virtual Servers ZyWALL ZLD CLI Reference Guide 116 ...
Page 120: ...Chapter 13 HTTP Redirect ZyWALL ZLD CLI Reference Guide 120 ...
Page 124: ...Chapter 14 ALG ZyWALL ZLD CLI Reference Guide 124 ...
Page 125: ...125 PART III Firewall Firewall 127 ...
Page 126: ...126 ...
Page 134: ...Chapter 15 Firewall ZyWALL ZLD CLI Reference Guide 134 ...
Page 135: ...135 PART IV VPN IPSec VPN 137 SSL VPN 147 L2TP VPN 153 ...
Page 136: ...136 ...
Page 146: ...Chapter 16 IPSec VPN ZyWALL ZLD CLI Reference Guide 146 ...
Page 152: ...Chapter 17 SSL VPN ZyWALL ZLD CLI Reference Guide 152 ...
Page 160: ...Chapter 18 L2TP VPN ZyWALL ZLD CLI Reference Guide 160 ...
Page 161: ...161 PART V Application Patrol Application Patrol 163 ...
Page 162: ...162 ...
Page 174: ...Chapter 19 Application Patrol ZyWALL ZLD CLI Reference Guide 174 ...
Page 175: ...175 PART VI Anti X Anti Virus 177 IDP Commands 185 Content Filtering 203 Anti Spam 215 ...
Page 176: ...176 ...
Page 202: ...Chapter 21 IDP Commands ZyWALL ZLD CLI Reference Guide 202 ...
Page 214: ...Chapter 22 Content Filtering ZyWALL ZLD CLI Reference Guide 214 ...
Page 224: ...Chapter 23 Anti Spam ZyWALL ZLD CLI Reference Guide 224 ...
Page 225: ...225 PART VII Device HA Device HA 227 ...
Page 226: ...226 ...
Page 236: ...236 ...
Page 248: ...Chapter 26 Addresses ZyWALL ZLD CLI Reference Guide 248 ...
Page 252: ...Chapter 27 Services ZyWALL ZLD CLI Reference Guide 252 ...
Page 262: ...Chapter 29 AAA Server ZyWALL ZLD CLI Reference Guide 262 ...
Page 266: ...Chapter 30 Authentication Objects ZyWALL ZLD CLI Reference Guide 266 ...
Page 272: ...Chapter 31 Certificates ZyWALL ZLD CLI Reference Guide 272 ...
Page 276: ...Chapter 32 ISP Accounts ZyWALL ZLD CLI Reference Guide 276 ...
Page 280: ...Chapter 33 SSL Application ZyWALL ZLD CLI Reference Guide 280 ...
Page 288: ...Chapter 34 Endpoint Security ZyWALL ZLD CLI Reference Guide 288 ...
Page 289: ...289 PART IX System System 291 System Remote Management 299 ...
Page 290: ...290 ...
Page 298: ...Chapter 35 System ZyWALL ZLD CLI Reference Guide 298 ...
Page 314: ...314 ...
Page 332: ...Chapter 37 File Manager ZyWALL ZLD CLI Reference Guide 332 Figure 55 Startup Complete ...
Page 344: ...Chapter 39 Reports and Reboot ZyWALL ZLD CLI Reference Guide 344 ...
Page 346: ...Chapter 40 Session Timeout ZyWALL ZLD CLI Reference Guide 346 ...
Page 348: ...Chapter 41 Diagnostics ZyWALL ZLD CLI Reference Guide 348 ...
Page 362: ...Chapter 44 Watchdog Timer ZyWALL ZLD CLI Reference Guide 362 ...
Page 363: ...363 PART XI Command List List of Commands Alphabetical 365 ...
Page 364: ...364 ...
Page 394: ...List of Commands Alphabetical ZyWALL ZLD CLI Reference Guide 394 ...