Table of Contents
ZyWALL / USG (ZLD) CLI Reference Guide
10
Chapter 23
IP/MAC Binding.................................................................................................................................157
23.1 IP/MAC Binding Overview .............................................................................................................157
23.2 IP/MAC Binding Commands .........................................................................................................157
23.3 IP/MAC Binding Commands Example ..........................................................................................158
Chapter 24
Layer 2 Isolation ...............................................................................................................................160
24.1 Layer 2 Isolation Overview ............................................................................................................160
24.2 Layer 2 Isolation Commands ........................................................................................................161
24.2.1 Layer 2 Isolation White List Sub-Commands ......................................................................161
24.3 Layer 2 Isolation Commands Example .........................................................................................162
Chapter 25
Secure Policy ....................................................................................................................................163
25.1 Secure Policy Overview ................................................................................................................163
25.2 Secure Policy Commands .............................................................................................................164
25.2.1 Secure Policy Sub-Commands ............................................................................................167
25.2.2 Secure Policy Command Examples ....................................................................................169
25.3 Session Limit Commands .............................................................................................................171
25.4 ADP Commands Overview ...........................................................................................................173
25.4.1 ADP Command Input Values ...............................................................................................174
25.4.2 ADP Activation Commands .................................................................................................174
25.4.3 ADP Global Profile Commands ...........................................................................................174
25.4.4 ADP Zone-to-Zone Rule Commands ...................................................................................174
25.4.5 ADP Add/Edit Profile Commands ........................................................................................175
Chapter 26
Web Authentication ..........................................................................................................................179
26.1 Web Authentication Overview .......................................................................................................179
26.2 Web Authentication Commands ....................................................................................................179
26.2.1 web-auth policy Sub-commands .........................................................................................180
26.3 SSO Overview ...............................................................................................................................181
26.3.1 SSO Configuration Commands ...........................................................................................181
26.3.2 SSO Show Commands ........................................................................................................182
26.3.3 Command Setup Sequence Example .................................................................................182
Chapter 27
RTLS ..................................................................................................................................................183
27.1 RTLS Overview .............................................................................................................................183
27.1.1 RTLS Configuration Commands ..........................................................................................184
27.1.2 RTLS Configuration Examples ............................................................................................184