P-662H/HW-D Series User’s Guide

Table 167 Firewall Commands (continued)

FUNCTION

COMMAND

DESCRIPTION

 

 

 

 

 

 

 

Config edit firewall set <set

This command sets how long ZyXEL Device

 

#> tcp-idle-timeout <seconds>

lets an inactive TCP connection remain open

 

 

before considering it closed.

 

 

 

 

 

 

 

Config edit firewall set <set

This command sets whether or not the ZyXEL

 

#> log <yes no>

Device creates logs for packets that match the

 

 

firewall’s default rule set.

 

 

 

Rules

Config edit firewall set <set

This command sets whether packets that

 

#> rule <rule #> permit

match this rule are dropped or allowed

 

<forward block>

through.

 

 

 

 

Config edit firewall set <set

This command sets whether a rule is enabled

 

#> rule <rule #> active <yes

or not.

 

no>

 

 

 

 

 

Config edit firewall set <set

This command sets the protocol specification

 

#> rule <rule #> protocol

number made in this rule for ICMP.

 

<integer protocol value >

 

 

 

 

 

Config edit firewall set <set

This command sets the ZyXEL Device to log

 

#> rule <rule #> log <none

traffic that matches the rule, doesn't match,

 

match not-match both>

both or neither.

 

 

 

 

Config edit firewall set <set

This command sets whether or not the ZyXEL

 

#> rule <rule #> alert <yes

Device sends an alert e-mail when a DOS

 

no>

attack or a violation of a particular rule occurs.

 

 

 

 

config edit firewall set <set

This command sets the rule to have the

 

#> rule <rule #> srcaddr-

ZyXEL Device check for traffic with this

 

single <ip address>

individual source address.

 

 

 

 

config edit firewall set <set

This command sets a rule to have the ZyXEL

 

#> rule <rule #> srcaddr-

Device check for traffic from a particular

 

subnet <ip address> <subnet

subnet (defined by IP address and subnet

 

mask>

mask).

 

 

 

 

 

 

config edit firewall set <set

This command sets a rule to have the ZyXEL

 

#> rule <rule #> srcaddr-range

Device check for traffic from this range of

 

<start ip address> <end ip

addresses.

 

address>

 

 

 

 

430

Appendix K Firewall Commands