Table of Contents
ZyWALL Series CLI Reference Guide
11
Chapter 24
Redirect Service...............................................................................................................................207
24.1 HTTP Redirect ............................................................................................................................... 207
24.2 SMTP Redirect ............................................................................................................................. 207
24.3 Redirect Commands .................................................................................................................. 208
24.3.1 Redirect Command Example .......................................................................................... 210
Chapter 25
ALG....................................................................................................................................................211
25.1 ALG Introduction ........................................................................................................................ 211
25.2 ALG Commands ......................................................................................................................... 212
25.3 ALG Commands Example ......................................................................................................... 213
Chapter 26
UPnP...................................................................................................................................................214
26.1 UPnP and NAT-PMP Overview ................................................................................................... 214
26.2 UPnP and NAT-PMP Commands ............................................................................................... 214
26.3 UPnP & NAT-PMP Commands Example ................................................................................... 215
Chapter 27
IP/MAC Binding................................................................................................................................217
27.1 IP/MAC Binding Overview ......................................................................................................... 217
27.2 IP/MAC Binding Commands ..................................................................................................... 217
27.3 IP/MAC Binding Commands Example ..................................................................................... 218
Chapter 28
Layer 2 Isolation...............................................................................................................................219
28.1 Layer 2 Isolation Overview ......................................................................................................... 219
28.2 Layer 2 Isolation Commands ..................................................................................................... 220
28.2.1 Layer 2 Isolation White List Sub-Commands .................................................................. 220
28.3 Layer 2 Isolation Commands Example ..................................................................................... 221
Chapter 29
Secure Policy....................................................................................................................................222
29.1 Secure Policy Overview ............................................................................................................. 222
29.2 Secure Policy Commands ......................................................................................................... 223
29.2.1 Secure Policy Sub-Commands ........................................................................................ 226
29.2.2 Security Services Multiple Profiles .................................................................................... 228
29.2.3 Secure Policy Command Examples ................................................................................ 229
29.3 Session Limit Commands ........................................................................................................... 233
29.4 ADP Commands Overview ....................................................................................................... 235
29.4.1 ADP Command Input Values .......................................................................................... 236
29.4.2 ADP Activation Commands ............................................................................................ 236