Table of Contents
ZyWALL Series CLI Reference Guide
15
39.1 RTLS Overview ............................................................................................................................. 325
39.1.1 RTLS Configuration Commands ....................................................................................... 326
39.1.2 RTLS Configuration Examples ........................................................................................... 326
Chapter 40
Reputation Filter ...............................................................................................................................327
40.1 Overview ..................................................................................................................................... 327
40.1.1 Signature Database Priority .............................................................................................328
40.2 IP Reputation Commands ......................................................................................................... 328
40.2.1 Update IP Reputation Signatures .................................................................................... 330
40.2.2 IP Reputation Statistics ...................................................................................................... 330
40.2.3 IP Reputation External Black List ...................................................................................... 330
40.3 URL Threat Filter Commands ..................................................................................................... 332
40.3.1 URL Threat Filter Command Examples ............................................................................ 334
40.3.2 URL Threat Filter Profile Commands ............................................................................... 335
40.3.3 URL Threat Filter External Black List .................................................................................. 336
40.3.4 Update URL Threat Filter Signatures ................................................................................ 338
40.3.5 Update Signature Examples ............................................................................................ 339
40.3.6 URL Threat Filter Statistics .................................................................................................. 339
40.3.7 URL Threat Filter Statistics Example .................................................................................. 340
40.4 DNS Threat Filter Commands ..................................................................................................... 342
40.5 Blocking Secure DNS Query Packets Command Examples .................................................. 345
Chapter 41
Sandboxing ......................................................................................................................................346
41.1 Sandboxing Overview ................................................................................................................ 346
41.2 Sandbox Commands ................................................................................................................. 346
41.2.1 Sandbox Command Examples ....................................................................................... 348
Chapter 42
IDP Commands ................................................................................................................................349
42.1 Overview ..................................................................................................................................... 349
42.2 General IDP Commands ........................................................................................................... 350
42.2.1 IDP Activation .................................................................................................................... 350
42.3 IDP Profile Commands ............................................................................................................... 352
42.3.1 Global Profile Commands ............................................................................................... 352
42.3.2 Editing/Creating IDP Signature Profiles ........................................................................... 353
42.3.3 Editing Rate Based Signatures Profiles ............................................................................ 353
42.3.4 Signature Search ............................................................................................................... 355
42.4 IDP Custom Signatures ............................................................................................................... 356
42.4.1 Custom Signature Examples ............................................................................................ 357
42.5 Update IDP Signatures ............................................................................................................... 360
42.5.1 Update Signature Examples ............................................................................................ 361