Chapter 21 IDP Commands
ZyWALL (ZLD) CLI Reference Guide
193
21.3.5 Editing System Protect
Use these commands to edit the system protect profiles.
21.3.6 Signature Search
Use this command to search for signatures in the named profile.
"
It is recommended you use the web configurator to search for signatures.
Table 101
Editing System Protect Profiles
COMMAND
DESCRIPTION
idp system-protect
Configure the system protect profile. Enters
sub-command mode. All the following
commands relate to the new profile. Use
exit
to quit sub-command mode.
[no] signature
sid
activate
Activates or deactivates an IDP signature.
signature
sid
log [alert]
Sets log or alert options for an IDP signature
no signature
sid
log
Deactivates log options for an IDP signature
signature
sid
action {drop | reject-sender |
reject-receiver | reject-both}
Sets an action for an IDP signature
no signature
SID
action
Deactivates an action for an IDP signature.
show idp system-protect all details
Displays the system protect profile details.
Table 102
Signature Search Command
COMMAND
DESCRIPTION
idp search signature
my_profile
name
quoted_string
sid SID severity
severity_mask
platform
platform_mask
policytype
policytype_mask
service
service_mask
activate {any | yes | no}
log {any | no | log | log-alert} action
action_mask
Searches for signature(s) in a profile by the
parameters specified. The quoted string is any
text within the signature name in quotes, for
example, [idp search LAN_IDP name "WORM"
sid 0 severity 0 platform 0 policytype 0 service
0 activate any log any action] searches for all
signatures in the LAN_IDP profile containing
the text “worm” within the signature name.
idp search system-protect
my_profile
name
quoted_string
sid SID severity
severity_mask
platform
platform_mask
policytype
policytype_mask
service
service_mask
activate {any | yes | no}
log {any | no | log | log-alert} action
action_mask
Searches for signature(s) in a system-protect
profile by the parameters specified. The quoted
string is any text within the signature name in
quotes, for example, [idp search LAN_IDP
name "WORM" sid 0 severity 0 platform 0
policytype 0 service 0 activate any log any
action] searches for all signatures in the
LAN_IDP profile containing the text “worm”
within the signature name.
Summary of Contents for ZyWall
Page 2: ......
Page 6: ...Document Conventions ZyWALL ZLD CLI Reference Guide 6 ...
Page 10: ...10 ...
Page 26: ...Chapter 1 Command Line Interface ZyWALL ZLD CLI Reference Guide 26 ...
Page 46: ...46 ...
Page 84: ...Chapter 6 Interfaces ZyWALL ZLD CLI Reference Guide 84 ...
Page 98: ...Chapter 8 Route ZyWALL ZLD CLI Reference Guide 98 ...
Page 106: ...Chapter 10 Zones ZyWALL ZLD CLI Reference Guide 106 ...
Page 110: ...Chapter 11 DDNS ZyWALL ZLD CLI Reference Guide 110 ...
Page 116: ...Chapter 12 Virtual Servers ZyWALL ZLD CLI Reference Guide 116 ...
Page 120: ...Chapter 13 HTTP Redirect ZyWALL ZLD CLI Reference Guide 120 ...
Page 124: ...Chapter 14 ALG ZyWALL ZLD CLI Reference Guide 124 ...
Page 125: ...125 PART III Firewall Firewall 127 ...
Page 126: ...126 ...
Page 134: ...Chapter 15 Firewall ZyWALL ZLD CLI Reference Guide 134 ...
Page 135: ...135 PART IV VPN IPSec VPN 137 SSL VPN 147 L2TP VPN 153 ...
Page 136: ...136 ...
Page 146: ...Chapter 16 IPSec VPN ZyWALL ZLD CLI Reference Guide 146 ...
Page 152: ...Chapter 17 SSL VPN ZyWALL ZLD CLI Reference Guide 152 ...
Page 160: ...Chapter 18 L2TP VPN ZyWALL ZLD CLI Reference Guide 160 ...
Page 161: ...161 PART V Application Patrol Application Patrol 163 ...
Page 162: ...162 ...
Page 174: ...Chapter 19 Application Patrol ZyWALL ZLD CLI Reference Guide 174 ...
Page 175: ...175 PART VI Anti X Anti Virus 177 IDP Commands 185 Content Filtering 203 Anti Spam 215 ...
Page 176: ...176 ...
Page 202: ...Chapter 21 IDP Commands ZyWALL ZLD CLI Reference Guide 202 ...
Page 214: ...Chapter 22 Content Filtering ZyWALL ZLD CLI Reference Guide 214 ...
Page 224: ...Chapter 23 Anti Spam ZyWALL ZLD CLI Reference Guide 224 ...
Page 225: ...225 PART VII Device HA Device HA 227 ...
Page 226: ...226 ...
Page 236: ...236 ...
Page 248: ...Chapter 26 Addresses ZyWALL ZLD CLI Reference Guide 248 ...
Page 252: ...Chapter 27 Services ZyWALL ZLD CLI Reference Guide 252 ...
Page 262: ...Chapter 29 AAA Server ZyWALL ZLD CLI Reference Guide 262 ...
Page 266: ...Chapter 30 Authentication Objects ZyWALL ZLD CLI Reference Guide 266 ...
Page 272: ...Chapter 31 Certificates ZyWALL ZLD CLI Reference Guide 272 ...
Page 276: ...Chapter 32 ISP Accounts ZyWALL ZLD CLI Reference Guide 276 ...
Page 280: ...Chapter 33 SSL Application ZyWALL ZLD CLI Reference Guide 280 ...
Page 288: ...Chapter 34 Endpoint Security ZyWALL ZLD CLI Reference Guide 288 ...
Page 289: ...289 PART IX System System 291 System Remote Management 299 ...
Page 290: ...290 ...
Page 298: ...Chapter 35 System ZyWALL ZLD CLI Reference Guide 298 ...
Page 314: ...314 ...
Page 332: ...Chapter 37 File Manager ZyWALL ZLD CLI Reference Guide 332 Figure 55 Startup Complete ...
Page 344: ...Chapter 39 Reports and Reboot ZyWALL ZLD CLI Reference Guide 344 ...
Page 346: ...Chapter 40 Session Timeout ZyWALL ZLD CLI Reference Guide 346 ...
Page 348: ...Chapter 41 Diagnostics ZyWALL ZLD CLI Reference Guide 348 ...
Page 362: ...Chapter 44 Watchdog Timer ZyWALL ZLD CLI Reference Guide 362 ...
Page 363: ...363 PART XI Command List List of Commands Alphabetical 365 ...
Page 364: ...364 ...
Page 394: ...List of Commands Alphabetical ZyWALL ZLD CLI Reference Guide 394 ...