Table of Contents

Chapter

20

 

Application Patrol .............................................................................................................................

163

20.1

Application Patrol Overview ..........................................................................................................

163

20.2

Application Patrol Commands Summary ......................................................................................

163

 

20.2.1 Pre-defined Application Commands ....................................................................................

164

 

20.2.2 Rule Commands for Pre-defined Applications .....................................................................

164

 

20.2.3 Exception Commands for Pre-defined Applications ............................................................

166

 

20.2.4 Other Application Commands ..............................................................................................

167

 

20.2.5 Rule Commands for Other Applications ..............................................................................

167

 

20.2.6 General Commands for Application Patrol ..........................................................................

168

Chapter

21

 

Anti-Virus...........................................................................................................................................

173

21.1

Anti-Virus Overview .......................................................................................................................

173

21.2

Anti-virus Commands ....................................................................................................................

173

 

21.2.1 General Anti-virus Commands ............................................................................................

174

 

21.2.2 Zone to Zone Anti-virus Rules .............................................................................................

174

 

21.2.3 White and Black Lists ..........................................................................................................

176

 

21.2.4 Signature Search Anti-virus Command ...............................................................................

177

21.3

Update Anti-virus Signatures ........................................................................................................

178

 

21.3.1 Update Signature Examples ................................................................................................

179

21.4

Anti-virus Statistics ........................................................................................................................

179

 

21.4.1 Anti-virus Statistics Example ...............................................................................................

180

Chapter

22

 

IDP Commands .................................................................................................................................

181

22.1

Overview .......................................................................................................................................

181

22.2 General IDP Commands ...............................................................................................................

181

 

22.2.1 IDP Activation ......................................................................................................................

181

22.3

IDP Profile Commands ..................................................................................................................

182

 

22.3.1 Global Profile Commands ....................................................................................................

182

 

22.3.2 IDP Zone to Zone Rules ......................................................................................................

183

 

22.3.3 Editing/Creating IDP Signature Profiles ...............................................................................

184

 

22.3.4 Editing/Creating Anomaly Profiles .......................................................................................

184

 

22.3.5 Editing System Protect ........................................................................................................

188

 

22.3.6 Signature Search .................................................................................................................

188

22.4

IDP Custom Signatures .................................................................................................................

191

 

22.4.1 Custom Signature Examples ...............................................................................................

192

22.5

Update IDP Signatures .................................................................................................................

195

 

22.5.1 Update Signature Examples ................................................................................................

196

22.6

IDP Statistics .................................................................................................................................

196

 

22.6.1 IDP Statistics Example ........................................................................................................

197

10

 

ZyWALL (ZLD) CLI Reference Guide