Chapter 22 Content Filtering
ZyWALL (ZLD) CLI Reference Guide
205
trust_hosts
The IP address or domain name of a trusted web site. Use a host name such
as www.good-site.com. Do not use the complete URL of the site – that is, do
not include “http://”. All subdomains are allowed. For example, entering
“zyxel.com” also allows “www.zyxel.com”, “partner.zyxel.com”,
“press.zyxel.com”, etc. Use up to 63 case-insensitive characters (0-9a-z-).
You can enter a single IP address in dotted decimal notation like 192.168.2.5.
You can enter a subnet by entering an IP address in dotted decimal notation
followed by a slash and the bit number of the subnet mask of an IP address.
The range is 0 to 32.
To find the bit number, convert the subnet mask to binary and add all of the
1’s together. Take “255.255.255.0” for example. 255 converts to eight 1’s in
binary. There are three 255’s, so add three eights together and you get the bit
number (24).
An example is 192.168.2.1/24
You can enter an IP address range by entering the start and end IP addresses
separated by a hyphen, for example 192.168.2.5-192.168.2.23.
forbid_hosts
The IP address or domain name of a forbidden web site.
Use a host name such as www.bad-site.com into this text field. Do not use the
complete URL of the site – that is, do not include “http://”. All subdomains are
also blocked. For example, entering “bad-site.com” also blocks “www.bad-
site.com”, “partner.bad-site.com”, “press.bad-site.com”, etc. Use up to 63
case-insensitive characters (0-9a-z-).
You can enter a single IP address in dotted decimal notation like 192.168.2.5.
You can enter a subnet by entering an IP address in dotted decimal notation
followed by a slash and the bit number of the subnet mask of an IP address.
The range is 0 to 32.
To find the bit number, convert the subnet mask to binary and add all of the
1’s together. Take “255.255.255.0” for example. 255 converts to eight 1’s in
binary. There are three 255’s, so add three eights together and you get the bit
number (24).
An example is 192.168.2.1/24
You can enter an IP address range by entering the start and end IP addresses
separated by a hyphen, for example 192.168.2.5-192.168.2.23.
keyword
A keyword or a numerical IP address to search URLs for and block access to
if they contain it. Use up to 63 case-insensitive characters (0-9a-zA-Z;/
?:@&=+$\.-_!~*'()%,) in double quotes. For example enter “Bad_Site” to block
access to any web page that includes the exact phrase “Bad_Site”. This does
not block access to web pages that only include part of the phrase (such as
“Bad” in this example).
message
The message to display when a web site is blocked. Use up to 255 characters
(0-9a-zA-Z;/?:@&=+$\.-_!~*'()%,) in quotes. For example, “Access to this web
page is not allowed. Please contact the network administrator.”
redirect_url
The URL of the web page to which you want to send users when their web
access is blocked by content filtering. The web page you specify here opens
in a new frame below the denied access message.
Use “http://” followed by up to 255 characters (0-9a-zA-Z;/?:@&=+$\.-
_!~*'()%) in quotes. For example, “http://192.168.1.17/blocked access”.
license
The license key (up to 15 characters) for the external web filtering service.
service_timeout
The value specifies the maximum querying time in seconds <1…60>
_timeout
The value specifies the maximum life time in hours <1..720>.
url
The URL of a web site.
Table 108
Content Filter Command Input Values (continued)
LABEL
DESCRIPTION
Summary of Contents for ZyWall
Page 2: ......
Page 6: ...Document Conventions ZyWALL ZLD CLI Reference Guide 6 ...
Page 10: ...10 ...
Page 26: ...Chapter 1 Command Line Interface ZyWALL ZLD CLI Reference Guide 26 ...
Page 46: ...46 ...
Page 84: ...Chapter 6 Interfaces ZyWALL ZLD CLI Reference Guide 84 ...
Page 98: ...Chapter 8 Route ZyWALL ZLD CLI Reference Guide 98 ...
Page 106: ...Chapter 10 Zones ZyWALL ZLD CLI Reference Guide 106 ...
Page 110: ...Chapter 11 DDNS ZyWALL ZLD CLI Reference Guide 110 ...
Page 116: ...Chapter 12 Virtual Servers ZyWALL ZLD CLI Reference Guide 116 ...
Page 120: ...Chapter 13 HTTP Redirect ZyWALL ZLD CLI Reference Guide 120 ...
Page 124: ...Chapter 14 ALG ZyWALL ZLD CLI Reference Guide 124 ...
Page 125: ...125 PART III Firewall Firewall 127 ...
Page 126: ...126 ...
Page 134: ...Chapter 15 Firewall ZyWALL ZLD CLI Reference Guide 134 ...
Page 135: ...135 PART IV VPN IPSec VPN 137 SSL VPN 147 L2TP VPN 153 ...
Page 136: ...136 ...
Page 146: ...Chapter 16 IPSec VPN ZyWALL ZLD CLI Reference Guide 146 ...
Page 152: ...Chapter 17 SSL VPN ZyWALL ZLD CLI Reference Guide 152 ...
Page 160: ...Chapter 18 L2TP VPN ZyWALL ZLD CLI Reference Guide 160 ...
Page 161: ...161 PART V Application Patrol Application Patrol 163 ...
Page 162: ...162 ...
Page 174: ...Chapter 19 Application Patrol ZyWALL ZLD CLI Reference Guide 174 ...
Page 175: ...175 PART VI Anti X Anti Virus 177 IDP Commands 185 Content Filtering 203 Anti Spam 215 ...
Page 176: ...176 ...
Page 202: ...Chapter 21 IDP Commands ZyWALL ZLD CLI Reference Guide 202 ...
Page 214: ...Chapter 22 Content Filtering ZyWALL ZLD CLI Reference Guide 214 ...
Page 224: ...Chapter 23 Anti Spam ZyWALL ZLD CLI Reference Guide 224 ...
Page 225: ...225 PART VII Device HA Device HA 227 ...
Page 226: ...226 ...
Page 236: ...236 ...
Page 248: ...Chapter 26 Addresses ZyWALL ZLD CLI Reference Guide 248 ...
Page 252: ...Chapter 27 Services ZyWALL ZLD CLI Reference Guide 252 ...
Page 262: ...Chapter 29 AAA Server ZyWALL ZLD CLI Reference Guide 262 ...
Page 266: ...Chapter 30 Authentication Objects ZyWALL ZLD CLI Reference Guide 266 ...
Page 272: ...Chapter 31 Certificates ZyWALL ZLD CLI Reference Guide 272 ...
Page 276: ...Chapter 32 ISP Accounts ZyWALL ZLD CLI Reference Guide 276 ...
Page 280: ...Chapter 33 SSL Application ZyWALL ZLD CLI Reference Guide 280 ...
Page 288: ...Chapter 34 Endpoint Security ZyWALL ZLD CLI Reference Guide 288 ...
Page 289: ...289 PART IX System System 291 System Remote Management 299 ...
Page 290: ...290 ...
Page 298: ...Chapter 35 System ZyWALL ZLD CLI Reference Guide 298 ...
Page 314: ...314 ...
Page 332: ...Chapter 37 File Manager ZyWALL ZLD CLI Reference Guide 332 Figure 55 Startup Complete ...
Page 344: ...Chapter 39 Reports and Reboot ZyWALL ZLD CLI Reference Guide 344 ...
Page 346: ...Chapter 40 Session Timeout ZyWALL ZLD CLI Reference Guide 346 ...
Page 348: ...Chapter 41 Diagnostics ZyWALL ZLD CLI Reference Guide 348 ...
Page 362: ...Chapter 44 Watchdog Timer ZyWALL ZLD CLI Reference Guide 362 ...
Page 363: ...363 PART XI Command List List of Commands Alphabetical 365 ...
Page 364: ...364 ...
Page 394: ...List of Commands Alphabetical ZyWALL ZLD CLI Reference Guide 394 ...