EasyManua.ls Logo

ZyXEL Communications ZyWall User Manual

ZyXEL Communications ZyWall
386 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Page #1 background imageLoading...
Page #1 background image
www.zyxel.com
Quick Start Guide
ZyWALL (ZLD) Series
Security Firewalls
Versions: 3.10
Edition 2, 12/2013
Copyright © 2011
ZyXEL Communications Corporation
CLI Reference Guide
Default Login Details
LAN Port IP Address http://192.168.1.1
User Name admin
Password 1234
Copyright © 2013 ZyXEL Communications Corporation

Table of Contents

Other manuals for ZyXEL Communications ZyWall

Question and Answer IconNeed help?

Do you have a question about the ZyXEL Communications ZyWall and is the answer not in the manual?

ZyXEL Communications ZyWall Specifications

General IconGeneral
BrandZyXEL Communications
ModelZyWall
CategoryFirewall
LanguageEnglish

Summary

How To Use This Guide

Related Documentation

Lists other relevant documentation like Quick Start Guide and User's Guide for device configuration.

Introduction

Reference

Refers to sections containing detailed command references and explanations.

Part I: Introduction

Chapter 1 Command Line Interface

Describes how to access and use the Command Line Interface (CLI) on the ZyWALL.

1.1 Overview

1.2 Accessing the CLI

Details the methods for connecting to and accessing the ZyWALL's Command Line Interface.

1.2.1 Console Port

1.2.2 Web Configurator Console

Guides on accessing the CLI through the web configurator using SSH and Java.

1.2.3 Telnet

1.2.4 SSH (Secure SHell)

Explains how to use an SSH client to access the ZyWALL's CLI.

1.3 How to Find Commands in this Guide

1.4 How Commands Are Explained

Details the conventions and structure used to explain CLI commands throughout the guide.

1.4.1 Background Information (Optional)

1.4.2 Command Input Values (Optional)

Lists common input values required for commands, often presented in tables.

1.4.3 Command Summary

1.4.4 Command Examples (Optional)

Offers practical examples of how to use commands for a given feature.

1.4.5 Command Syntax

1.4.6 Changing the Password

Recommends changing the default password for security and references the relevant section for commands.

1.5 CLI Modes

1.6 Shortcuts and Help

Covers features for obtaining command assistance, such as listing available commands and sub-commands.

1.6.1 List of Available Commands

1.6.2 List of Sub-commands or Required User Input

Explains how to get detailed help for a command, including sub-commands and required input.

1.6.3 Entering Partial Commands

1.6.4 Entering a ? in a Command

Explains how to use the "?" character for help information and how to enter it literally using CTRL+V.

1.6.5 Command History

1.6.6 Navigation

Provides keyboard shortcuts (CTRL+A, CTRL+E) for navigating within the command line input.

1.6.7 Erase Current Command

1.6.8 The no Commands

Explains the usage of "no" commands to disable or revert settings to their default state.

1.7 Input Values

1.8 Ethernet Interfaces

Explains how Ethernet interface names vary depending on the ZyWALL model (USG 300+ vs. USG 200 and below).

1.9 Saving Configuration Changes

1.10 Logging Out

Details the commands ('exit' or 'end') used to exit configuration mode or log out of the CLI session.

CHAPTER 2 User and Privilege Modes

2.1 User And Privilege Modes

Describes the initial user mode upon login and how to enter privilege mode using the 'enable' command.

2.1.1 Debug Commands

Table 5 Debug Commands

Lists debug commands, noting their availability depends on the debug flag and that they are primarily for service personnel.

PART II Reference

CHAPTER 3 Object Reference

Explains how to use commands to view configuration settings that reference specific objects.

3.1 Object Reference Commands

3.1.1 Object Reference Command Example

Details commands used to check object references, helpful for deletion tasks.

CHAPTER 4 Status

4.1 Status

Explains commands for displaying system status, CPU, disk, memory, and version information.

CHAPTER 5 Registration

5.1 myZyXEL.com Overview

Describes myzyxel.com as ZyXEL's portal for managing subscription services and device registration.

5.1.1 Subscription Services Available on the ZyWALL

5.2 Registration Commands

Details commands required for registering the device and activating subscription services.

5.2.1 Command Examples

5.3 Country Code

Lists country codes used in registration and other settings.

CHAPTER 6 Interfaces

6.1 Interface Overview

Provides a general overview of interfaces, their characteristics, and logical structure.

6.1.1 Types of Interfaces

6.1.2 Relationships Between Interfaces

Explains the hierarchical relationships and dependencies between different types of interfaces.

6.2 Interface General Commands Summary

6.2.1 Basic Interface Properties and IP Address Commands

Lists commands for configuring basic interface properties like IP address, subnet mask, and gateway.

6.2.2 DHCP Setting Commands

6.2.2.1 DHCP Setting Command Examples

Demonstrates configuring DHCP pools, static entries, and assigning IP addresses to clients.

6.2.3 Interface Parameter Command Examples

6.2.4 RIP Commands

Lists commands for configuring RIP (Routing Information Protocol) settings on interfaces.

6.2.5 OSPF Commands

6.2.6 Connectivity Check (Ping-check) Commands

Explains commands used to regularly check interface connectivity to the gateway using ping or TCP.

6.2.6.1 Connectivity Check Command Example

6.3 Ethernet Interface Specific Commands

Covers commands specific to configuring Ethernet interfaces.

6.3.1 MAC Address Setting Commands

6.3.2 Port Grouping Commands

Explains commands related to configuring port grouping and assigning physical ports to representative interfaces.

6.3.2.1 Port Grouping Command Examples

6.4 Virtual Interface Specific Commands

Covers commands specific to configuring virtual interfaces.

6.4.1 Virtual Interface Command Examples

6.5 PPPoE/PPTP Specific Commands

Details commands specific to configuring PPPoE and PPTP interfaces for ISP connections.

6.6 Cellular Interface Specific Commands

6.6.1 Cellular Status

Describes various statuses related to cellular connections, including device detection, network availability, and signal quality.

6.6.2 Cellular Interface Command Examples

6.7 Tunnel Interface Specific Commands

Covers commands specific to configuring GRE, IPv6 in IPv4, and 6to4 tunnel interfaces.

6.7.1 Tunnel Interface Command Examples

6.8 USB Storage Specific Commands

Covers commands for configuring settings related to USB storage devices connected to the ZyWALL.

6.8.1 USB Storage General Commands Example

6.9 WLAN Specific Commands

Covers commands for configuring WLAN interfaces to act as access points.

6.9.1 WLAN General Commands

6.9.1.1 WLAN General Commands Example

Shows an example of configuring WLAN settings like band, channel, and security.

6.9.2 WLAN Interface Commands

6.9.3 WLAN MAC Filter Commands

Explains commands to control wireless client access based on MAC addresses.

6.10 VLAN Interface Specific Commands

6.10.1 VLAN Interface Command Examples

Provides examples of setting up VLAN interfaces with specified IDs, ports, and IP configurations.

6.11 Bridge Specific Commands

6.11.1 Bridge Interface Command Examples

Demonstrates configuring bridge interfaces by joining Ethernet or VLAN interfaces.

6.12 Auxiliary Interface Specific Commands

6.12.1 Auxiliary Interface Command Examples

Provides examples of configuring auxiliary interfaces with dial string, port speed, and authentication.

CHAPTER 7 Trunks

7.1 Trunks Overview

Provides an overview of trunks, their benefits for load balancing, and network reliability.

7.2 Trunk Scenario Examples

7.3 Trunk Commands Input Values

Explains the values required for interface-group commands, such as group name and interface names.

7.4 Trunk Commands Summary

7.5 Trunk Command Examples

Demonstrates creating weighted round robin and least load first trunks with Ethernet and VLAN interfaces.

7.6 Link Sticking

7.7 Link Sticking Commands Summary

Lists commands related to link sticking, which affects load balancing behavior.

7.8 Link Sticking Command Example

CHAPTER 8 Route

Covers configuring policies for IP routing and static routes on the ZyWALL.

8.1 Policy Route

8.2 Policy Route Commands

Details commands for configuring policy routes, including destination, source, next-hop, and bandwidth settings.

8.2.1 Assured Forwarding (AF) PHB for DiffServ

8.2.2 Policy Route Command Example

Demonstrates creating address objects and a policy route to direct traffic through a specific interface to a next-hop router.

8.3 IP Static Route

8.4 Static Route Commands

Lists commands for configuring static IP and IPv6 routes, including destination, gateway, and interface.

CHAPTER 9 Routing Protocol

9.1 Routing Protocol Overview

Describes how routing protocols provide network information to the ZyWALL for making routing decisions.

9.2 Routing Protocol Commands Summary

9.2.1 RIP Commands

Lists commands for configuring RIP settings, including network enabling, redistribution, and version settings.

9.2.2 General OSPF Commands

9.2.3 OSPF Area Commands

Lists commands for configuring OSPF areas, including network interfaces, authentication, and area types.

9.2.4 Virtual Link Commands

9.2.5 Learned Routing Information Commands

Lists commands to view learned routing information from protocols like OSPF and RIP.

9.2.6 show ip route Command Example

CHAPTER 10 Zones

Explains how to set up zones for configuring network security and policies.

10.1 Zones Overview

10.2 Zone Commands Summary

Summarizes values and lists commands for zone management, binding, and blocking traffic.

10.2.1 Zone Command Examples

CHAPTER 11 DDNS

Describes how to configure dynamic DNS (DDNS) services for the ZyWALL.

11.1 DDNS Overview

11.2 DDNS Commands Summary

Summarizes values and lists commands for configuring DDNS profiles, including service types, IP selection, and hostnames.

CHAPTER 12 Virtual Servers

12.1 Virtual Server Overview

Defines virtual servers as port forwarding or translation for making private network computers available externally.

12.1.1 1:1 NAT and Many 1:1 NAT

12.2 Virtual Server Commands Summary

Summarizes values and lists commands for creating, deleting, and managing virtual server profiles.

12.2.1 Virtual Server Command Examples

12.2.2 Tutorial - How to Allow Public Access to a Server

Guides on creating address objects, configuring NAT, and setting up firewall rules to allow public access to a server.

CHAPTER 13 HTTP Redirect

13.1 HTTP Redirect Overview

Defines HTTP redirect as forwarding client HTTP requests to a web proxy server.

13.1.1 Web Proxy Server

13.2 HTTP Redirect Commands

Lists commands for setting, activating, deactivating, and clearing HTTP redirect rules.

CHAPTER 14 ALG

14.1 ALG Introduction

Defines ALG as an Application Layer Gateway that handles NAT-unfriendly applications by modifying IP addresses and port numbers in data payloads.

14.2 ALG Commands

14.3 ALG Commands Example

Lists commands for configuring ALG for SIP, H.323, and FTP, including timeouts and port settings.

CHAPTER 15 IP/MAC Binding

15.1 IP/MAC Binding Overview

Describes the purpose of IP/MAC binding in securing privileged IP addresses and preventing unauthorized access.

15.2 IP/MAC Binding Commands

15.3 IP/MAC Binding Commands Example

Demonstrates enabling IP/MAC binding on an interface and checking its status.

CHAPTER 16 Firewall

16.1 Firewall Overview

Describes the firewall as a stateful inspection firewall that restricts access by screening data packets against rules.

16.2 Firewall Commands

16.2.1 Firewall Sub-Commands

Details sub-commands used within firewall rules to define actions, sources, destinations, and logging.

16.2.2 Firewall Command Examples

16.3 Session Limit Commands

Explains commands for setting limits on concurrent NAT/firewall sessions per host or user.

CHAPTER 17 IPSec VPN

17.1 IPSec VPN Overview

Defines VPNs and IPSec, explaining VPN tunnel establishment in phases (IKE SA, IPSec SA).

17.2 IPSec VPN Commands Summary

17.2.1 IKE SA Commands

Lists commands for configuring IKE SAs (Internet Key Exchange Security Associations), which establish VPN gateways.

17.2.2 IPSec SA Commands (except Manual Keys)

17.2.3 IPSec SA Commands (for Manual Keys)

Lists additional commands for configuring IPSec SAs that use manual keys for VPN connections.

17.2.4 VPN Concentrator Commands

17.2.5 VPN Configuration Provisioning Commands

Lists commands for provisioning VPN configurations, allowing automatic rule distribution to users or groups.

17.2.6 SA Monitor Commands

CHAPTER 18 SSL VPN

Explains how to set up secure SSL VPN access for remote user login.

18.1 SSL Access Policy

18.1.1 SSL Application Objects

Defines SSL application objects that specify allowed applications and servers for SSL VPN access.

18.1.2 SSL Access Policy Limitations

18.2 SSL VPN Commands

Summarizes values and lists commands for configuring SSL VPN access policies, including application objects and endpoint security.

18.2.1 SSL VPN Commands

18.2.2 Setting an SSL VPN Rule Tutorial

Provides a tutorial with examples for configuring an SSL VPN rule, including user accounts and network extensions.

CHAPTER 19 L2TP VPN

19.1 L2TP VPN Overview

Defines L2TP VPN as a protocol tunneling network traffic over IPSec, allowing remote users to access networks without separate VPN software.

19.2 IPSec Configuration

19.2.1 Using the Default L2TP VPN Connection

Guides on editing the pre-configured default L2TP VPN connection and its local/remote policies.

19.3 Policy Route

19.4 L2TP VPN Commands

Summarizes values and lists commands for L2TP VPN configuration, including IPsec policy, address pools, and authentication.

19.4.1 L2TP VPN Commands

19.5 L2TP VPN Example

Demonstrates configuring L2TP VPN settings, including IP address pools, DNS servers, and user accounts.

19.5.1 Configuring the Default L2TP VPN Gateway Example

19.5.2 Configuring the Default L2TP VPN Connection Example

Guides on configuring local and remote policies for the default L2TP VPN connection.

19.5.3 Configuring the L2TP VPN Settings Example

19.5.4 Configuring the Policy Route for L2TP Example

Demonstrates configuring a policy route for the L2TP VPN connection, specifying source, destination, and next hop.

CHAPTER 20 Application Patrol

20.1 Application Patrol Overview

Describes application patrol's function in managing applications, protocols, and bandwidth, including traffic prioritization.

20.2 Application Patrol Commands Summary

20.2.1 Pre-defined Application Commands

Lists commands for managing pre-defined applications, such as activating, setting bandwidth limits, and defining actions.

20.2.2 Rule Commands for Pre-defined Applications

20.2.2.1 Rule Sub-commands

Details sub-commands used for application patrol rules, including access actions, bandwidth limits, and destination/source specifications.

20.2.3 Exception Commands for Pre-defined Applications

20.2.3.1 Exception Rule Sub-commands

Details sub-commands for application patrol exception rules, covering actions, bandwidth, and DSCP marking.

20.2.4 Other Application Commands

20.2.5 Rule Commands for Other Applications

Lists commands for creating and managing rules for other applications.

20.2.5.1 Other Rule Sub-commands

20.2.6 General Commands for Application Patrol

Provides general commands for application patrol, including activation and bandwidth management settings.

20.2.6.1 General Command Examples

CHAPTER 21 Anti-Virus

Introduces and guides on configuring the anti-virus scanner for threat detection.

21.1 Anti-Virus Overview

21.2 Anti-virus Commands

Summarizes values and lists commands for general anti-virus configuration, activation, and EICAR test file detection.

21.2.1 General Anti-virus Commands

21.2.1.1 Activate/Deactivate Anti-Virus Example

Demonstrates activating and deactivating the anti-virus service on the ZyWALL.

21.2.2 Zone to Zone Anti-virus Rules

21.2.2.1 Zone to Zone Anti-virus Rule Example

Lists commands for configuring zone-to-zone anti-virus rules, including scanning protocols and actions for infected files.

21.2.3 White and Black Lists

21.2.3.1 White and Black Lists Example

Describes commands for configuring white lists (to allow) and black lists (to block) for anti-virus checks based on file patterns.

21.2.4 Signature Search Anti-virus Command

21.2.4.1 Signature Search Example

Describes the command for searching anti-virus signatures by ID, name, severity, or category.

21.3 Update Anti-virus Signatures

21.3.1 Update Signature Examples

Details commands for updating anti-virus signatures, including automatic and scheduled downloads.

21.4 Anti-virus Statistics

21.4.1 Anti-virus Statistics Example

Lists commands for collecting and displaying anti-virus statistics, including ranking by IP address or virus name.

CHAPTER 22 IDP Commands

22.1 Overview

Explains that IDP commands mirror web configurator features and provides valid input for IDP commands.

22.2 General IDP Commands

22.2.1 IDP Activation

Details how to activate or deactivate IDP services, noting the requirement for service registration.

22.2.1.1 Activate/Deactivate IDP Example

22.3 IDP Profile Commands

Lists commands for managing IDP profiles, including renaming, deleting, and displaying signature details.

22.3.1 Global Profile Commands

22.3.1.1 Example of Global Profile Commands

Covers commands for renaming or deleting IDP profiles and showing base profiles.

22.3.2 IDP Zone to Zone Rules

22.3.2.1 Example of IDP Zone to Zone Rule Commands

Explains how to apply IDP profiles to specific traffic directions between zones.

22.3.3 Editing/Creating IDP Signature Profiles

22.3.4 Editing/Creating Anomaly Profiles

Guides on creating or editing IDP anomaly profiles, recommending the web configurator.

22.3.4.1 Creating an Anomaly Profile Example

22.3.5 Editing System Protect

Guides on creating or editing IDP anomaly profiles, recommending the web configurator.

22.3.6 Signature Search

22.3.6.1 Search Parameter Tables

Explains how to search for signatures within a named profile using various criteria.

22.4 IDP Custom Signatures

22.4.1 Custom Signature Examples

Explains how to create or edit custom IDP signatures, recommending the web configurator for this process.

22.5 Update IDP Signatures

22.5.1 Update Signature Examples

Demonstrates managing IDP signature updates, including automatic and scheduled downloads.

22.6 IDP Statistics

22.6.1 IDP Statistics Example

Lists commands for collecting and displaying IDP statistics, including summary and ranking by signature, source, or destination.

CHAPTER 23 Content Filtering

23.1 Content Filtering Overview

Explains content filtering's ability to block web features, specific sites, or categories, and create custom policies.

23.2 Content Filtering Policies

23.3 External Web Filtering Service

Outlines how content filtering policies use schedule, address, and user objects to apply filtering profiles.

23.4 Content Filtering Reports

23.5 Content Filter Command Input Values

Refers to the user's guide for viewing content filtering reports after activating subscription services.

23.6 General Content Filter Commands

23.7 Content Filter Filtering Profile Commands

Explains input values for content filter commands, including policy numbers, addresses, schedules, and categories.

23.8 Content Filter URL Cache Commands

23.9 Content Filtering Statistics

Lists commands for collecting and displaying content filtering statistics, including total pages inspected and blocked.

23.9.1 Content Filtering Statistics Example

23.10 Content Filtering Commands Example

Demonstrates limiting web access for a sales group by creating address objects, schedules, and filtering profiles.

CHAPTER 24 Anti-Spam

24.1 Anti-Spam Overview

Explains the anti-spam feature for sender reputation checking, mail content analysis, and virus outbreak detection.

24.2 Anti-Spam Commands

24.2.1 General Anti-Spam Commands

Details general anti-spam commands, including activation, status display, and scanning protocols.

24.2.1.1 Activate/Deactivate Anti-Spam Example

24.2.2 Zone to Zone Anti-spam Rules

Lists commands for configuring zone-to-zone anti-spam rules, including scanning protocols and actions for spam emails.

24.2.2.1 Zone to Zone Anti-spam Rule Example

24.2.3 White and Black Lists

Describes commands for configuring white lists and black lists for anti-spam checks based on e-mail headers and subjects.

24.2.3.1 White and Black Lists Example

24.2.3.2 Regular Expressions in Black or White List Entries

Explains the use of question marks (?) and wildcards (*) for pattern matching in black or white list entries.

24.2.4 DNSBL Anti-Spam Commands

24.2.4.1 DNSBL Example

Describes commands for checking sender and relay IP addresses against DNS-based spam Black Lists (DNSBLs).

24.3 Anti-Spam Statistics

24.3.1 Anti-Spam Statistics Example

Lists commands for collecting and displaying anti-spam statistics, including total mails scanned and spam detected.

CHAPTER 25 Device HA

25.1 Device HA Overview

Describes Active-Passive and Legacy modes for device HA and management access.

25.1.1 Before You Begin

25.2 General Device HA Commands

Provides prerequisites for device HA, including static IP configuration and service subscriptions.

25.3 Active-Passive Mode Device HA

25.4 Active-Passive Mode Device HA Commands

Lists general commands for managing device HA, including activation, mode setting, and status display.

25.4.1 Active-Passive Mode Device HA Commands

25.5 Legacy Mode (VRRP) Device HA

Lists commands for configuring active-passive mode device HA, including preempt, role, cluster ID, priority, and authentication.

Virtual Router Redundancy Protocol (VRRP) Overview

25.6 Legacy Mode (VRRP) Device HA Commands

Explains VRRP's role in creating redundant backup gateways to ensure gateway availability.

25.6.1 VRRP Group Commands

25.6.2 VRRP Synchronization Commands

Lists commands for configuring VRRP groups and synchronization.

25.6.3 Link Monitoring Commands

CHAPTER 26 User/Group

Lists commands for link monitoring, which can shut down VRRP interfaces if a link goes down, allowing the backup to take over.

26.1 User Account Overview

26.1.1 User Types

Defines user accounts and their role in privileges, firewall rules, and service access control.

26.2 User/Group Commands Summary

26.2.1 User Commands

Lists and describes different types of user accounts (Admin, Limited-Admin, Access Users) and their abilities.

26.2.2 User Group Commands

26.2.3 User Setting Commands

Lists commands for managing user groups, including creating, deleting, renaming, and adding users/groups.

26.2.4 Force User Authentication Commands

26.2.4.1 force-auth Sub-commands

Lists commands for user settings, specifically related to lease times, reauthorization times, and default user types.

26.2.4.2 Force Authentication Policy Insert Command Example

26.2.5 Additional User Commands

Details sub-commands for force-auth policies, such as activation, description, destination, EPS association, and schedule.

CHAPTER 27 Addresses

27.1 Address Overview

Explains how to set up addresses and address groups for specifying network locations in rules and policies.

27.2 Address Commands Summary

27.2.1 Address Object Commands

Lists commands for creating and managing address objects and address groups, adding address objects to groups, and setting descriptions.

27.2.2 Address Group Commands

27.2.2.1 Address Group Command Examples

Lists commands for creating and managing address groups, adding address objects to groups, and renaming groups.

CHAPTER 28 Services

28.1 Services Overview

Explains how to use service objects to define TCP, UDP, and ICMP applications, and create service groups.

28.2 Services Commands Summary

28.2.1 Service Object Commands

Lists commands for creating and deleting service objects for TCP, UDP, and ICMP, and renaming services.

28.2.2 Service Group Commands

28.2.2.1 Service Group Command Examples

Lists commands for creating and managing service groups, adding services to groups, and renaming groups.

CHAPTER 29 Schedules

29.1 Schedule Overview

Explains the two types of schedules: one-time and recurring, and their applications.

29.2 Schedule Commands Summary

29.2.1 Schedule Command Examples

Summarizes values and lists commands for creating, updating, and deleting schedule objects.

CHAPTER 30 AAA Server

30.1 AAA Server Overview

Explains AAA servers for access control and lists supported authentication server types: Local, Directory Service (LDAP/AD), and RADIUS.

30.2 Authentication Server Command Summary

30.2.1 ad-server Commands

Lists commands for setting up the default Active Directory (AD) server, including base DN, bind DN, and host address.

30.2.2 ldap-server Commands

30.2.3 radius-server Commands

Lists commands for setting up the default LDAP server, including base DN, bind DN, host, and port.

30.2.4 radius-server Command Example

30.2.5 aaa group server ad Commands

Lists commands for setting up the default RADIUS server, including host, port, key, and timeout.

30.2.6 aaa group server ldap Commands

30.2.7 aaa group server radius Commands

Lists commands for configuring groups of AD servers, including renaming and case-sensitivity settings.

30.2.8 aaa group server Command Example

CHAPTER 31 Authentication Objects

Lists commands for configuring groups of LDAP servers, including attributes and host settings.

31.1 Authentication Objects Overview

31.2 aaa authentication Commands

Explains how to select authentication methods for user authentication using AAA servers or the internal database.

31.2.1 aaa authentication Command Example

31.3 test aaa Command

Lists commands for configuring authentication profiles, including renaming, clearing, and setting default members.

31.3.1 Test a User Account Command Example

CHAPTER 32 Certificates

Lists the command used to test a user account on an authentication server.

32.1 Certificates Overview

32.2 Certificate Commands

Explains how to use certificates for user authentication and exchange public keys.

32.3 Certificates Commands Input Values

32.4 Certificates Commands Summary

Describes commands for configuring certificates, including generation and management.

32.5 Certificates Commands Examples

CHAPTER 33 ISP Accounts

Demonstrates creating a self-signed X.509 certificate and displaying the list of local certificates.

33.1 ISP Accounts Overview

33.1.1 PPPoE and PPTP Account Commands

Explains how to use ISP accounts to manage Internet Service Provider information for PPPoE, PPTP, and cellular interfaces.

33.1.2 Cellular Account Commands

CHAPTER 34 SSL Application

Lists commands for managing PPPoE and PPTP ISP accounts, including username, password, authentication, and encryption.

34.1 SSL Application Overview

34.1.1 SSL Application Object Commands

Describes how to configure SSL application objects for use in SSL VPN for remote user login.

34.1.2 SSL Application Command Examples

CHAPTER 35 Endpoint Security

Defines SSL application objects that specify allowed applications and servers for SSL VPN access.

35.1 Endpoint Security Overview

35.1.1 Endpoint Security Commands Summary

Explains Endpoint Security (EPS) for enforcing corporate policies on user computers before granting network or SSL VPN access.

35.1.2 Endpoint Security Object Commands

35.1.3 Endpoint Security Object Command Example

Lists commands for creating endpoint security objects, specifying anti-virus, personal firewall, application, and file information checks.

CHAPTER 36 DHCPv6 Objects

36.1 DHCPv6 Object Commands Summary

Lists the various settings EPS can check on user computers, such as OS, software versions, and registry settings.

36.1.1 DHCPv6 Object Commands

36.1.2 DHCPv6 Object Command Examples

Summarizes values and lists commands for creating and editing DHCPv6 lease and request objects.

CHAPTER 37 System

37.1 System Overview

Explains how to set up and manage DHCPv6 request and lease objects for IPv6 address assignment.

37.2 Customizing the WWW Login Page

37.3 Host Name Commands

Provides information on commands for general system configuration, including system time, console port speed, and DNS settings.

37.4 Time and Date

37.4.1 Date/Time Commands

Lists commands for setting the domain name and hostname for the ZyWALL.

37.5 Console Port Speed

37.6 DNS Overview

Details commands for setting the date, time, daylight saving, and time zones, plus NTP configuration.

37.6.1 Domain Zone Forwarder

37.6.2 DNS Commands

Explains the role of DNS in mapping domain names to IP addresses and vice versa.

37.6.3 DNS Command Example

CHAPTER 38 System Remote Management

Describes domain zone forwarders for resolving domain zones used by features like VPN and DDNS.

38.1 Remote Management Overview

38.1.1 Remote Management Limitations

Explains how to manage the ZyWALL remotely via Internet, LAN, or DMZ, and lists limitations.

38.1.2 System Timeout

38.2 Common System Command Input Values

Lists conditions under which remote management may not work, such as disabled services or firewall blocks.

38.3 HTTP/HTTPS Commands

38.3.1 HTTP/HTTPS Command Examples

Identifies values required for many system commands, like address objects and zone objects.

38.4 SSH

38.4.1 SSH Implementation on the ZyWALL

Lists commands for configuring HTTP/HTTPS access, including authentication methods, ports, and secure server settings.

38.4.2 Requirements for Using SSH

38.4.3 SSH Commands

Details the SSH implementation on the ZyWALL, including supported versions and required client software.

38.4.4 SSH Command Examples

38.5 Telnet

Lists commands for enabling SSH access, setting certificates, ports, and service control rules.

38.6 Telnet Commands

38.6.1 Telnet Commands Examples

Explains how to configure ZyWALL for remote Telnet access.

38.7 Configuring FTP

38.7.1 FTP Commands

Demonstrates setting a service control rule for Telnet access based on address objects and zones.

38.8 SNMP

38.8.1 Supported MIBs

Lists commands for enabling FTP access, setting certificates, ports, TLS, and service control rules.

38.8.2 SNMP Traps

38.8.3 SNMP Commands

Introduces SNMP for network management and monitoring, supporting SNMPv1 and SNMPv2c.

38.8.4 SNMP Commands Examples

38.9 ICMP Filter

Lists commands for enabling SNMP access, configuring community strings, contact information, location, and ports.

38.10 Dial-in Management

38.10.1 AT Command Strings

Covers configuring ICMP filter rules to discard or reject ICMP packets and specify response behavior for probing attempts.

38.10.4 Dial-in Management Commands

38.11 Vantage CNM

Explains AT command strings for modem control, such as tone or pulse dialing.

38.11.1 Vantage CNM Commands

38.11.1.1 Vantage CNM Command Examples

Introduces Vantage CNM, a global management solution for ZyXEL devices, and provides CNM commands.

38.12 Language Commands

CHAPTER 39 File Manager

Demonstrates turning on Vantage CNM management and registering the ZyWALL with a server.

39.1 File Directories

39.2 Configuration Files and Shell Scripts Overview

Explains how to set language for web configurator screens.

39.2.1 Comments in Configuration Files or Shell Scripts

39.2.2 Errors in Configuration Files or Shell Scripts

Explains how to store and apply configuration files (.conf) and run shell scripts (.zysh) for managing ZyWALL settings.

39.2.3 ZyWALL Configuration File Details

39.2.4 Configuration File Flow at Restart

Explains how the ZyWALL processes files line-by-line, handles errors, and the effect of `setenv stop-on-error off`.

39.3 File Manager Commands Input Values

39.4 File Manager Commands Summary

Describes the default, startup, and lastgood configuration files and their management during startup.

39.5 File Manager Command Examples

39.6 FTP File Transfer

Lists file management commands for applying, copying, deleting, renaming, and running files.

39.6.1 Command Line FTP File Upload

39.6.2 Command Line FTP Configuration File Upload Example

Demonstrates saving the current configuration before applying a shell script file.

39.6.3 Command Line FTP File Download

39.7 ZyWALL File Usage at Startup

Provides an example of transferring a configuration file from a computer to the ZyWALL via FTP.

39.8 Notification of a Damaged Recovery Image or Firmware

39.9 Restoring the Recovery Image

Describes the files the ZyWALL uses during system startup: Boot Module, Recovery Image, and Firmware.

39.10 Restoring the Firmware

39.11 Restoring the Default System Database

Explains how the ZyWALL notifies users of damaged recovery images or firmware and provides troubleshooting steps.

39.11.1 Using the atkz -u Debug Command

CHAPTER 40 Logs

Details the procedure for restoring the recovery image using the ATUK or ATUR command in debug mode.

40.1 Log Commands Summary

40.1.1 Log Entries Commands

Provides information about the ZyWALL's logs, including log commands and remote syslog server settings.

40.1.2 System Log Commands

40.1.2.1 System Log Command Examples

Lists commands for displaying specified log entries with filtering options like priority, source, and destination.

40.1.3 Debug Log Commands

40.1.4 E-mail Profile Commands

Lists commands for configuring system log settings, including category specification, suppression, and connectivity check logging.

40.1.4.1 E-mail Profile Command Examples

40.1.5 Console Port Logging Commands

Lists commands for configuring e-mail profiles to send daily reports, including SMTP settings, subject, and schedule.

CHAPTER 41 Reports and Reboot

41.1 Report Commands Summary

Lists commands for configuring console port logging, including status, enabling/disabling, and category settings.

41.1.1 Report Commands

41.1.2 Report Command Examples

Provides information on report commands and how to restart the ZyWALL, including daily report e-mail features.

41.1.3 Session Commands

41.1.4 Packet Size Statistics Commands

Demonstrates starting data collection, displaying traffic reports by IP, service, and URL, and stopping collection.

41.2 Email Daily Report Commands

41.2.1 Email Daily Report Example

Lists commands to display current sessions for debugging and statistical analysis, with filtering options.

41.3 Reboot

CHAPTER 42 Session Timeout

Explains commands to enable/disable packet size statistics data collection and display statistics.

CHAPTER 43 Diagnostics

43.1 Diagnostics

Explains how to modify and display session timeout values for UDP, TCP, and ICMP sessions.

43.2 Diagnosis Commands

43.3 Diagnosis Commands Example

Covers using the diagnostics feature to generate files for troubleshooting with customer support.

CHAPTER 44 Packet Flow Explore

44.1 Packet Flow Explore

Lists commands for collecting diagnostics information, including creating new diagnostic files and displaying their details.

44.2 Packet Flow Explore Commands

44.3 Packet Flow Explore Commands Example

Explains how to use the packet flow explore feature to understand packet forwarding and troubleshoot network issues.

CHAPTER 45 Packet Flow Filter

45.1 Packet Flow Filter

Lists commands for displaying routing, SNAT, VPN, and WAN trunk settings.

45.2 Packet Flow Filter Commands

45.3 Packet Flow Filter Commands Examples

Explains the purpose of packet flow filter in troubleshooting specific packet forwarding issues.

CHAPTER 46 Maintenance Tools

46.1 Maintenance Tools

Covers commands specific to configuring packet flow filters, including enabling/disabling, specifying source/destination, protocol, and ports.

46.1.1 Packet Capture Command Example

46.1 Maintenance Command Examples

Lists maintenance tool commands available in privilege and configuration modes, including packet-trace and ARP table management.

CHAPTER 47 Watchdog Timer

47.1 Hardware Watchdog Timer

Shows how to configure packet capture settings and perform a packet capture, including checking status.

47.2 Software Watchdog Timer

47.3 Application Watchdog

Describes the hardware watchdog's function in restarting the system if hardware fails, with a recommendation not to modify its settings.

47.3.1 Application Watchdog Commands Example

List of Commands (Alphabetical)

Describes the software watchdog's function in restarting the system if core firmware fails, with a recommendation not to modify its settings.

Related product manuals