Chapter 23 Content Filtering
23.5 Content Filter Command Input Values
The following table explains the values you can input with the
Table 111 Content Filter Command Input Values
LABEL | DESCRIPTION |
policy_number | The number of the policy <0 - X > where X depends on the number of content filtering |
| policies the ZyWALL model supports. See the CLI help for details. |
|
|
address | The name (up to 63 characters) of an existing address object or group to which the |
| policy should be applied. |
|
|
schedule | The name (up to 63 characters) of an existing schedule to control when the policy |
| should be applied. |
|
|
filtering_profile | The filtering profile defines how to filter web URLs or content. You may use |
| alphanumeric characters, underscores(_), or dashes |
| be a number. This value is |
category_name | The name of a web category. |
| |
| nudity |
| weapons abortion hacking phishing |
| |
| organization |
| military |
| |
| |
| messaging email |
| |
| |
| vehicles |
| |
| alcohol tobacco |
| |
|
|
trust_hosts | The IP address or domain name of a trusted web site. Use a host name such as |
| |
| “http://”. All subdomains are allowed. For example, entering “zyxel.com” also allows |
| “www.zyxel.com”, “partner.zyxel.com”, “press.zyxel.com”, etc. Use up to 63 case- |
| insensitive characters |
| You can enter a single IP address in dotted decimal notation like 192.168.2.5. |
| You can enter a subnet by entering an IP address in dotted decimal notation followed by |
| a slash and the bit number of the subnet mask of an IP address. The range is 0 to 32. |
| To find the bit number, convert the subnet mask to binary and add all of the 1’s |
| together. Take “255.255.255.0” for example. 255 converts to eight 1’s in binary. There |
| are three 255’s, so add three eights together and you get the bit number (24). |
| An example is 192.168.2.1/24 |
| You can enter an IP address range by entering the start and end IP addresses |
| separated by a hyphen, for example |
|
|
200 |
|
ZyWALL (ZLD) CLI Reference Guide | |
|
|