Chapter 21
21.2.2.1 Zone to Zone Anti-virus Rule Example
This example shows how to configure (and display) a WAN to LAN antivirus rule to scan HTTP traffic and destroy infected files. The white and black lists are ignored and zipped files are decompressed. Any zipped files that cannot be decompressed are destroyed.
Router(config)#
Router(config)# show
active: yes
log: log
from zone: WAN
to zone: LAN scan protocols:
http: yes
ftp : yes
smtp: yes
pop3: yes
imap4: yes infected action:
destroy: yes
send windows message: yes bypass white list: yes bypass black list: no file decompression: yes
destroy unsupported compressed file: no
21.2.3 White and Black Lists
The following table describes the commands for configuring the white list and black list. You must use the configure terminal command to enter the configuration mode before you can use these commands.
Table 94 Commands for
COMMAND | DESCRIPTION |
[no] | Turn on the white list to have the ZyWALL not perform the |
| on files with names that match the white list patterns. |
|
|
[no] | Adds or removes a white list file pattern. Turns a file pattern on or off. |
av_file_pattern {activatedeactivate} |
|
Replaces the specified white list file pattern with a new file pattern. | |
old_av_file_pattern new_av_file_pattern |
|
{activatedeactivate} |
|
[no] | Turn on the black list to log and delete files with names that match the |
| black list patterns. |
|
|
176 |
|
ZyWALL (ZLD) CLI Reference Guide | |
|
|