Table of Contents

Chapter 20

 

Application Patrol .............................................................................................................................

127

20.1

Application Patrol Overview ..........................................................................................................

127

20.2

Application Patrol Commands Summary ......................................................................................

128

20.2.1 Pre-defined Application Commands ....................................................................................

128

20.2.2 Rule Commands for Pre-defined Applications .....................................................................

128

20.2.3 Exception Commands for Pre-defined Applications ............................................................

130

20.2.4 Other Application Commands ..............................................................................................

131

20.2.5 Rule Commands for Other Applications ..............................................................................

132

20.2.6 General Commands for Application Patrol ..........................................................................

133

Chapter 21

 

Anti-Virus...........................................................................................................................................

137

21.1

Anti-Virus Overview .......................................................................................................................

137

21.2

Anti-virus Commands ....................................................................................................................

137

21.2.1 General Anti-virus Commands ............................................................................................

138

21.2.2 Zone to Zone Anti-virus Rules .............................................................................................

138

21.2.3 White and Black Lists ..........................................................................................................

140

21.2.4 Signature Search Anti-virus Command ...............................................................................

142

21.3

Update Anti-virus Signatures ........................................................................................................

142

21.3.1 Update Signature Examples ................................................................................................

143

21.4

Anti-virus Statistics ........................................................................................................................

143

21.4.1 Anti-virus Statistics Example ...............................................................................................

144

Chapter 22

 

IDP Commands .................................................................................................................................

145

22.1

Overview .......................................................................................................................................

145

22.2 General IDP Commands ...............................................................................................................

145

22.2.1 IDP Activation ......................................................................................................................

145

22.3

IDP Profile Commands ..................................................................................................................

146

22.3.1 Global Profile Commands ....................................................................................................

146

22.3.2 IDP Zone to Zone Rules ......................................................................................................

147

22.3.3 Editing/Creating IDP Signature Profiles ...............................................................................

148

22.3.4 Editing/Creating Anomaly Profiles .......................................................................................

149

22.3.5 Editing System Protect ........................................................................................................

153

22.3.6 Signature Search .................................................................................................................

153

22.4

IDP Custom Signatures .................................................................................................................

156

22.4.1 Custom Signature Examples ...............................................................................................

157

22.5

Update IDP Signatures .................................................................................................................

160

22.5.1 Update Signature Examples ................................................................................................

161

22.6

IDP Statistics .................................................................................................................................

161

22.6.1 IDP Statistics Example ........................................................................................................

162

 

9

NXC CLI Reference Guide