ZyXEL Communications 3.1 Security Camera User Manual


 
Table of Contents
ZyWALL (ZLD) CLI Reference Guide
10
Chapter 20
Application Patrol.............................................................................................................................163
20.1 Application Patrol Overview ..........................................................................................................163
20.2 Application Patrol Commands Summary ......................................................................................163
20.2.1 Pre-defined Application Commands ....................................................................................164
20.2.2 Rule Commands for Pre-defined Applications .....................................................................164
20.2.3 Exception Commands for Pre-defined Applications ............................................................166
20.2.4 Other Application Commands ..............................................................................................167
20.2.5 Rule Commands for Other Applications ..............................................................................167
20.2.6 General Commands for Application Patrol ..........................................................................168
Chapter 21
Anti-Virus...........................................................................................................................................173
21.1 Anti-Virus Overview .......................................................................................................................173
21.2 Anti-virus Commands ....................................................................................................................173
21.2.1 General Anti-virus Commands ............................................................................................174
21.2.2 Zone to Zone Anti-virus Rules .............................................................................................174
21.2.3 White and Black Lists ..........................................................................................................176
21.2.4 Signature Search Anti-virus Command ...............................................................................177
21.3 Update Anti-virus Signatures ........................................................................................................178
21.3.1 Update Signature Examples ................................................................................................179
21.4 Anti-virus Statistics ........................................................................................................................179
21.4.1 Anti-virus Statistics Example ...............................................................................................180
Chapter 22
IDP Commands .................................................................................................................................181
22.1 Overview .......................................................................................................................................181
22.2 General IDP Commands ...............................................................................................................181
22.2.1 IDP Activation ......................................................................................................................181
22.3 IDP Profile Commands ..................................................................................................................182
22.3.1 Global Profile Commands ....................................................................................................182
22.3.2 IDP Zone to Zone Rules ......................................................................................................183
22.3.3 Editing/Creating IDP Signature Profiles ...............................................................................184
22.3.4 Editing/Creating Anomaly Profiles .......................................................................................184
22.3.5 Editing System Protect ........................................................................................................188
22.3.6 Signature Search .................................................................................................................188
22.4 IDP Custom Signatures .................................................................................................................191
22.4.1 Custom Signature Examples ...............................................................................................192
22.5 Update IDP Signatures .................................................................................................................195
22.5.1 Update Signature Examples ................................................................................................196
22.6 IDP Statistics .................................................................................................................................196
22.6.1 IDP Statistics Example ........................................................................................................197