Default Login Details
3'ŻMͺŻGuide
ZyWALL Series
LAN Port IP Address https://192.168.1.1
User Name admin
Password 1234
Version 4.10–5.35 Ed. 1, 1/2023
Copyright © 2023 Zyxel and/or its affiliates. All rights reserved.
IMPORTANT!
READ CAREFULLY BEFORE USE.
KEEP THIS GUIDE FOR FUTURE REFERENCE.
This is a Reference Guide for a series of products intended for people who want to configure the Zyxel
Device via Command Line Interface (CLI).
Note: The version number on the cover page refers to the latest firmware version supported
by the Zyxel Device. This guide applies to ZLD version 4.10–5.00 at the time of writing.
How To Use This Guide
1 Read Chapter 1 on page 26 for how to access and use the CLI (Command Line Interface).
2 Read Chapter 2 on page 42 to learn about the CLI user and privilege modes.
Some commands or command options in this guide may not be
available in your product. See your product's User’s Guide for a list of
supported features.
Do not use commands not documented in this guide. Use of
undocumented commands or misconfiguration can damage the unit
and possibly render it unusable.
Some commands are renamed between firmware versions. In cases
where a command has multiple names, the Reference Guide lists each
variation.
Related Documentation
•Quick Start Guide
The Quick Start Guide shows how to connect the Zyxel Device and access the Web Configurator.
• User’s Guide
The ZyWALL USG, ATP, USG FLEX and VPN series User Guides explain how to use the Web Configurator
to configure the Zyxel Device. It also shows the product feature matrix for each device. General
feature differences are written in the Introduction chapter while a more detailed table is in the
Product Feature appendix.
Note: It is recommended you use the Web Configurator to configure the Zyxel Device.
•More Information
Go to support.zyxel.com to find other information on
Zyxel Device.
Contents Overview
Contents Overview
Introduction .......................................................................................................................................25
Command Line Interface ........................................................................................ ....... ....... .............. 26
User and Privilege Modes .................................................................................................................... 42
Reference ..........................................................................................................................................44
Object Reference ................................................................................................................................ 45
Status ......................................................................... ............................................................................. 47
Registration ...................................................................... .......................................... ............................ 53
AP Management .................................................................................................................................. 57
Built-in AP ............................................................................................................................................... 70
AP Group ............................................................................................................................................... 72
Wireless LAN Profiles .............................................................................................................................. 79
Rogue AP ............................................................................................................................................. 100
Wireless Health .................................................................................................................................... 104
Wireless Frame Capture ..................................................................................................................... 109
Dynamic Channel Selection ............................................................................................................. 112
Auto-Healing ....................................................................................................................................... 113
LEDs ...................................................................................................................................................... 115
Interfaces ................................................................................ ............................................................. 117
Trunks ................................................................................ .................................................................... 165
Route ................................................................................ .................................................................... 169
Routing Protocol ................................................................................................................................. 179
Zones ......................................................................... ........................................................................... 186
DDNS .................................................................................................................................................... 189
Virtual Servers ...................................................................................................................................... 192
HTTP Redirect ....................................................................................................................................... 205
Redirect Service .................................................................................................................................. 207
ALG ................................................................................... ....... ....... ....... ....... ....... ................................. 211
UPnP ..................................................................................................................................................... 214
IP/MAC Binding ................................................................................................................................... 217
Layer 2 Isolation .................................................................................................................................. 219
Secure Policy ....................................................................................................................................... 222
Cloud CNM ......................................................................................................................................... 244
Web Authentication ........................................................................................................................... 252
Hotspot ................................................................................................................................................ 263
IPSec VPN ............................................................................................................................................ 278
SSL VPN ................................... ............................................................................................................. 297
L2TP VPN .............................................................................................................................................. 301
ZyWALL Series CLI Reference Guide
3
Contents Overview
Bandwidth Management .................................................................................................................. 309
Application Patrol ............................................................................................................................... 315
Anti-Virus .............................................................................................................................................. 319
RTLS ................................................................................... .................................................................... 327
Reputation Filter .................................................................................................................................. 329
Sandboxing ......................................................................................................................................... 348
IDP Commands ...................................................................................................................................351
Content Filtering ................................................................................................................................. 368
Anti-Spam ............................................................................... ............................................................. 402
Collaborative Detection & Response .............................................................................................. 414
SSL Inspection ...................................................................................................................................... 422
IP Exception ......................................................................................................................................... 430
Device HA ........................................................................................................................................... 432
Device Insight ...................................................................................................................................... 442
User/Group ...................................................................... .................................................................... 447
Application Object ...................... ...................................................................................................... 459
Addresses ............................................................................................................................................ 462
Services ................................................................................... ............................................................. 470
Schedules ............................................................................................................................................ 473
AAA Server .......................................................................................................................................... 475
Authentication Objects ..................................................................................................................... 482
Authentication Server ........................................................................................................................ 494
Certificates .......................................................................................................................................... 496
ISP Accounts ........................................................................................................................................ 502
SSL Application ................................................................................................................................... 505
DHCPv6 Objects ................................................................................................................................. 508
Dynamic Guest Accounts .................................................................................................................511
System ................................................................ .................................................................................. 515
System Remote Management .......................................................................................................... 531
File Manager ....................................................................................................................................... 543
Logs ...................................................................................................................................................... 569
Reports and Reboot ........................................................................................................................... 576
Diagnostics and Remote Assistance ...............................................................................................582
Session Timeout ................................................................................................................................... 585
Packet Flow Explore .......................................................................................... ................................. 586
Maintenance Tools .. ....... ....... ....... ....... ....... ...... ....... ....... ....... .............. ....... ....... ....... ....... ................... 590
Miscellaneous ..................................................................................................................................... 601
Managed AP Commands ................................................................................................................. 608
ZyWALL Series CLI Reference Guide
4
Table of Contents
Table of Contents
Contents Overview .............................................................................................................................3
Table of Contents.................................................................................................................................5
Part I: Introduction ..........................................................................................25
Chapter 1
Command Line Interface..................................................................................................................26
1.1 Overview ......................................................................................................................................... 26
1.1.1 The Configuration File ........................................................................................................... 27
1.2 Accessing the CLI ........................................................................................................................... 27
1.2.1 Console Port .......................................................................................................................... 28
1.2.2 Web Configurator Console .................................................................................................. 28
1.2.3 Telnet ...................................................................................................................................... 30
1.2.4 SSH (Secure SHell) .................................................................................................................. 31
1.3 How to Find Commands in this Guide .........................................................................................32
1.4 How Commands Are Explained ................................................................................................... 32
1.4.1 Background Information (Optional) ................................................................................... 32
1.4.2 Command Input Values (Optional) .................................................................................... 32
1.4.3 Command Summary ............................................................................................................ 32
1.4.4 Command Examples (Optional) ......................................................................................... 32
1.4.5 Command Syntax ................................................................................................................. 32
1.4.6 Naming Conventions ............................................................................................................ 33
1.4.7 Changing the Password ....................................................................................................... 33
1.4.8 Idle Timeout ........................................................................................................................... 33
1.5 CLI Modes ........................................................................................................................................ 33
1.6 Shortcuts and Help ......................................................................................................................... 34
1.6.1 List of Available Commands ................................................................................................ 34
1.6.2 List of Sub-commands or Required User Input ................................................................... 35
1.6.3 Entering Partial Commands ................................................................................................. 35
1.6.4 Entering a ? in a Command ................................................................................................36
1.6.5 Command History ................................................................................................................. 36
1.6.6 Navigation ............................................................................................................................. 36
1.6.7 Erase Current Command ..................................................................................................... 36
1.6.8 The no Commands ............................................................................................................... 36
1.7 Input Values .................................................................................................................................... 36
1.8 Ethernet Interfaces ......................................................................................................................... 41
1.9 Saving Configuration Changes .................................................................................................... 41
ZyWALL Series CLI Reference Guide
5
Table of Contents
1.10 Logging Out .................................................................................................................................. 41
1.11 Resetting the Zyxel Device .......................................................................................................... 41
Chapter 2
User and Privilege Modes .................................................................................................................42
2.1 User And Privilege Modes .............................................................................................................. 42
Part II: Reference ............................................................................................44
Chapter 3
Object Reference ................................ ... .......................................................................... .................45
3.1 Object Reference Commands ..................................................................................................... 45
3.1.1 Object Reference Command Example ............................................................................. 46
Chapter 4
Status...................................................................................................................................................47
4.1 ATP Dashboard Commands ......................................................................................................... 51
4.2 CPU Temperature Monitor Commands ....................................................................................... 52
4.3 System Protection Signature Commands .................................................................................... 52
Chapter 5
Registration.........................................................................................................................................53
5.1 Registration Overview .................................................................................................................... 53
5.2 myZyxel Overview ........................................................................................................................... 53
5.2.1 Subscription Services Available on the Zyxel Device ........................................................ 53
5.2.2 Firewall as a Service (FaaS) License .................................................................................... 54
5.3 Registration Commands ................................................................................................................ 54
5.4 FaaS Commands ............................................................................................................................ 55
5.4.1 Command Examples ............................................................................................................ 55
5.5 Update License Commands ......................................................................................................... 56
Chapter 6
AP Management................................................................................................................................57
6.1 AP Management Overview ..........................................................................................................57
6.1.1 AP Modes ............................................................................................................................... 57
6.1.2 Airtime Fairness ...................................................................................................................... 58
6.2 AP Management Value ................................................................................................................. 58
6.3 General AP Management Commands ....................................................................................... 59
6.3.1 AP Management Commands Example ............................................................................. 64
6.4 Remote AP ...................................................................................................................................... 66
6.4.1 Remote AP Notes .................................................................................................................. 68
ZyWALL Series CLI Reference Guide
6
Table of Contents
6.4.2 Remote AP Commands .......................................................................................................68
Chapter 7
Built-in AP............................................................................................................................................70
7.1 Built-in AP Commands .................................................................................................................... 70
Chapter 8
AP Group ............................................................................................................................................72
8.1 Wireless Load Balancing Overview .............................................................................................. 72
8.2 AP Group Commands ................................................................................................................... 72
8.2.1 AP Group Examples .............................................................................................................. 76
Chapter 9
Wireless LAN Profiles ..........................................................................................................................79
9.1 Wireless LAN Profiles Overview ...................................................................................................... 79
9.2 AP Radio & Monitor Profile Commands ....................................................................................... 79
9.2.1 AP Radio & Monitor Profile Commands Example ............................................................. 88
9.3 SSID Profile Commands .................................................................................................................. 89
9.3.1 SSID Profile Example .............................................................................................................. 92
9.4 Security Profile Commands ........................................................................................................... 92
9.4.1 Security Profile Example ....................................................................................................... 95
9.4.2 SSID and Security Profiles Example ...................................................................................... 96
9.5 MAC Filter Profile Commands ....................................................................................................... 97
9.5.1 MAC Filter Profile Example ................................................................................................... 97
9.6 ZyMesh Profile Commands ............................................................................................................ 98
Chapter 10
Rogue AP..........................................................................................................................................100
10.1 Rogue AP Detection Overview ................................................................................................. 100
10.2 Rogue AP Detection Commands ............................................................................................. 100
10.2.1 Rogue AP Detection Examples ....................................................................................... 101
10.3 Rogue AP Containment Overview ........................................................................................... 102
10.4 Rogue AP Containment Commands ....................................................................................... 103
10.4.1 Rogue AP Containment Example ................................................................................... 103
Chapter 11
Wireless Health.................................................................................................................................104
11.1 Wireless Health Overview .......................................................................................................... 104
11.2 Wireless Health Commands ...................................................................................................... 104
11.2.1 Wireless Health Radio and Station Settings ............................ ........................................ 106
11.2.2 Wireless Health Radio and Station Actions .................................................................... 107
11.2.3 Wireless Health Command Examples ............................................................................. 107
ZyWALL Series CLI Reference Guide
7
Table of Contents
Chapter 12
Wireless Frame Capture..................................................................................................................109
12.1 Wireless Frame Capture Overview ...........................................................................................109
12.2 Wireless Frame Capture Commands ....................................................................................... 109
12.2.1 Wireless Frame Capture Examples .................................................................................. 110
12.2.2 Remote Packet Capture .................................................................................................. 110
Chapter 13
Dynamic Channel Selection...........................................................................................................112
13.1 DCS Overview ............................................................................................................................. 112
13.2 DCS Commands ......................................................................................................................... 112
Chapter 14
Auto-Healing....................................................................................................................................113
14.1 Auto-Healing Overview ............................................................................................................. 113
14.2 Auto-Healing Commands ......................................................................................................... 113
14.2.1 Auto-Healing Examples .................................................................................................... 114
Chapter 15
LEDs ...................................................................................................................................................115
15.1 LED Suppression Mode ............................................................................................................... 115
15.2 LED Suppression Commands ..................................................................................................... 115
15.2.1 LED Suppression Commands Example ........................................................................... 115
15.3 LED Locator ................................................................................................................................. 115
15.4 LED Locator Commands ............................................................................................................ 116
15.4.1 LED Locator Commands Example .................................................................................. 116
Chapter 16
Interfaces..........................................................................................................................................117
16.1 Interface Overview .................................................................................................................... 117
16.1.1 Types of Interfaces ............................................................................................................ 117
16.1.2 Relationships Between Interfaces ................................................................................... 119
16.2 Interface General Commands Summary ................................................................................ 121
16.2.1 Basic Interface Properties and IP Address Commands ................................................ 121
16.2.2 IGMP Proxy Commands ................................................................................................... 128
16.2.3 Proxy ARP Commands ......................................................................................................129
16.2.4 DHCP Setting Commands ................................................................................................ 130
16.2.5 Interface Parameter Command Examples ................................................................... 135
16.2.6 RIP Commands .................................................................................................................. 136
16.2.7 OSPF Commands .............................................................................................................. 137
16.2.8 Connectivity Check (Ping-check) Commands ................................... .......................... 138
16.3 Ethernet Interface Specific Commands .............. .................................................................... 139
16.3.1 MAC Address Setting Commands .................................................................................. 140
ZyWALL Series CLI Reference Guide
8
Table of Contents
16.3.2 Port Grouping Commands .............................................................................................. 140
16.4 Virtual Interface Specific Commands ...................................................................................... 142
16.4.1 Virtual Interface Command Examples ........................................................................... 142
16.5 PPPoE/PPTP Specific Commands ............................................................................................. 142
16.5.1 PPPoE/PPTP Interface Command Examples .................................................................. 144
16.6 Cellular Interface Specific Commands ................................................................................... 144
16.6.1 Cellular Status .................................................................................................................... 147
16.6.2 Cellular Interface Command Examples ......................................................................... 149
16.7 Tunnel Interface Specific Commands ..................................................................................... 150
16.7.1 Tunnel Interface Command Examples ........................................................................... 152
16.8 USB Storage Specific Commands .............................................................................................152
16.8.1 Firmware Upgrade via USB Stick ...................................................................................... 153
16.8.2 USB Storage Commands Example .................................................................................. 155
16.9 VLAN Interface Specific Commands ....................................................................................... 155
16.9.1 VLAN Interface Command Examples ............................................................................ 156
16.10 Bridge Specific Commands .................................................................................................... 156
16.10.1 Bridge Interface Command Examples ......................................................................... 157
16.11 LAG Commands ....................................................................................................................... 157
16.11.1 LAG Interface Command Example .............................................................................. 160
16.12 VTI Commands ......................................................................................................................... 161
16.12.1 Restrictions for IPsec Virtual Tunnel Interface ............................................ .............. ..... 161
16.12.2 VTI Interface Command Example ................................................................................ 164
Chapter 17
Trunks ................................................................................................................................................165
17.1 Trunks Overview .......................................................................................................................... 165
17.2 Trunk Scenario Examples ........................................................................................................... 165
17.3 Trunk Commands Input Values ................................................................................................. 166
17.4 Trunk Commands Summary ...................................................................................................... 166
17.5 Trunk Command Examples ....................................................................................................... 167
Chapter 18
Route.................................................................................................................................................169
18.1 Policy Route ................................................................................................................................ 169
18.1.1 Source Network Address Translation (SNAT) .................................................................. 169
18.2 Policy Route Commands ........................................................................................................... 170
18.2.1 Assured Forwarding (AF) PHB for DiffServ ....................................................................... 175
18.2.2 Policy Route Command Example ................................................................................... 175
18.3 IP Static Route ............................................................................................................................. 176
18.4 Static Route Commands ........................................................................................................... 177
18.4.1 Static Route Commands Examples ................................................................................ 178
Chapter 19
Routing Protocol...............................................................................................................................179
ZyWALL Series CLI Reference Guide
9
Table of Contents
19.1 Routing Protocol Overview ....................................................................................................... 179
19.2 Routing Protocol Commands Summary .................................................................................. 179
19.2.1 RIP Commands .................................................................................................................. 180
19.2.2 General OSPF Commands ............................................................................................... 180
19.2.3 OSPF Area Commands .................................................................................................... 181
19.2.4 Virtual Link Commands ..................................................................................................... 181
19.2.5 Learned Routing Information Commands ..................................................................... 182
19.2.6 Show IP Route Command Example ................................................................................ 182
19.3 BGP (Border Gateway Protocol) ...................................................... ....... ....... .............. ....... ..... 182
19.3.1 BGP Commands ................................................................................................................ 184
Chapter 20
Zones.................................................................................................................................................186
20.1 Zones Overview .......................................................................................................................... 186
20.2 Zone Commands Summary ...................................................................................................... 187
20.2.1 Zone Command Examples .................................................................................. ............ 188
Chapter 21
DDNS .................................................................................................................................................189
21.1 DDNS Overview ........................................................................................................................... 189
21.2 DDNS Commands Summary .....................................................................................................189
21.3 DDNS Commands Example ...................................................................................................... 191
Chapter 22
Virtual Servers...................................................................................................................................192
22.1 Virtual Server Overview .............................................................................................................. 192
22.1.1 1:1 NAT and Many 1:1 NAT ............................................................................................... 192
22.2 Virtual Server Commands Summary ......................................................................................... 192
22.2.1 Virtual Server Command Examples ................................................................................ 194
22.2.2 Tutorial - How to Allow Public Access to a Server ......................................................... 195
22.3 Virtual Server Load Balancing ................................................................................................... 196
22.3.1 Load Balancing Example 1 .............................................................................................. 196
22.3.2 Load Balancing Example 2 .............................................................................................. 197
22.3.3 Virtual Server Load Balancing Process ........................................................................... 198
22.3.4 Load Balancing Rules ....................................................................................................... 199
22.3.5 Virtual Server Load Balancing Algorithms ...................................................................... 200
22.3.6 Virtual Server Load Balancing Commands ............................................................... ..... 201
Chapter 23
HTTP Redirect....................................................................................................................................205
23.1 HTTP Redirect Overview ............................................................................................................. 205
23.1.1 Web Proxy Server .............................................................................................................. 205
23.2 HTTP Redirect Commands ......................................................................................................... 205
ZyWALL Series CLI Reference Guide
10
Table of Contents
23.2.1 HTTP Redirect Command Examples ............................................................................... 206
Chapter 24
Redirect Service...............................................................................................................................207
24.1 HTTP Redirect ............................................................................................................................... 207
24.2 SMTP Redirect ............................................................................................................................. 207
24.3 Redirect Commands .................................................................................................................. 207
24.3.1 Redirect Command Example .......................................................................................... 210
Chapter 25
ALG....................................................................................................................................................211
25.1 ALG Introduction ........................................................................................................................ 211
25.2 ALG Commands ......................................................................................................................... 212
25.3 ALG Commands Example ......................................................................................................... 213
Chapter 26
UPnP...................................................................................................................................................214
26.1 UPnP and NAT-PMP Overview ................................................................................................... 214
26.2 UPnP and NAT-PMP Commands ............................................................................................... 214
26.3 UPnP & NAT-PMP Commands Example ................................................................................... 215
Chapter 27
IP/MAC Binding................................................................................................................................217
27.1 IP/MAC Binding Overview ......................................................................................................... 217
27.2 IP/MAC Binding Commands ..................................................................................................... 217
27.3 IP/MAC Binding Commands Example ..................................................................................... 218
Chapter 28
Layer 2 Isolation...............................................................................................................................219
28.1 Layer 2 Isolation Overview ......................................................................................................... 219
28.2 Layer 2 Isolation Commands ..................................................................................................... 220
28.2.1 Layer 2 Isolation White List Sub-Commands .................................................................. 220
28.3 Layer 2 Isolation Commands Example ..................................................................................... 221
Chapter 29
Secure Policy....................................................................................................................................222
29.1 Secure Policy Overview ............................................................................................................. 222
29.2 Secure Policy Commands ......................................................................................................... 223
29.2.1 Secure Policy Sub-Commands ........................................................................................ 226
29.2.2 Security Services Multiple Profiles .................................................................................... 228
29.2.3 Secure Policy Command Examples ................................................................................ 229
29.3 Output Control Commands ...................................................................................................... 233
29.3.1 Output Control Sub-Commands ..................................................................................... 235
ZyWALL Series CLI Reference Guide
11
Table of Contents
29.4 Session Limit Commands ........................................................................................................... 236
29.5 ADP Commands Overview ................................................. ...................................................... 238
29.5.1 ADP Command Input Values .......................................................................................... 238
29.5.2 ADP Activation Commands ............................................................................................ 239
29.5.3 ADP Global Profile Commands ....................................................................................... 239
29.5.4 ADP Zone-to-Zone Rule Commands ............................................................................... 239
29.5.5 ADP Add/Edit Profile Sub Commands ............................................................................ 240
29.5.6 ADP Flood Detection Whitelist Commands ................................................................... 243
Chapter 30
Cloud CNM....................................... .... ... .... .....................................................................................244
30.1 Cloud CNM Overview ................................................................................................................ 244
30.2 Cloud CNM SecuManager ....................................................................................................... 244
30.2.1 Introduction to XMPP ........................................................................................................ 245
30.2.2 Cloud CNM SecuManager Commands ........................................................................ 246
30.2.3 Cloud CNM SecuManager Command Example .......................................................... 249
30.3 Cloud CNM SecuReporter ............................................ ............................................................. 249
30.3.1 Cloud CNM SecuReporter Commands .......................................................................... 249
30.3.2 Cloud CNM SecuReporter Commands Example .......................................................... 251
Chapter 31
Web Authentication.........................................................................................................................252
31.1 Web Authentication Overview ................................................................................................. 252
31.1.1 User Two-Factor Authentication ...................................................................................... 252
31.1.2 802.1X Single Sign-On ....................................................................................................... 253
31.1.3 Summary of User Authentication Methods .................................................................... 253
31.2 Web Authentication Commands ............................................................................................. 254
31.2.1 web-auth login setting Sub-commands ............................................................. ............ 256
31.2.2 web-auth policy Sub-commands ................................................................................... 257
31.2.3 Facebook Wi-Fi Commands ............................................................................................ 259
31.3 SSO Overview .............................................................................................................................. 259
31.3.1 SSO Configuration Commands ....................................................................................... 260
31.3.2 SSO Show Commands ...................................................................................................... 260
31.3.3 Command Setup Sequence Example ........................................................................... 261
31.3.4 Two-Factor Web Authentication Command Example ............................................ ..... 261
Chapter 32
Hotspot........................................................................................................................ ......................263
32.1 Hotspot Overview ....................................................................................................................... 263
32.2 Billing Overview ........................................................................................................................... 263
32.3 Billing Commands .......................................................................................................................263
32.3.1 Billing Profile Sub-commands ........................................................................................... 265
32.3.2 Billing Command Example ............................................................................................... 265
ZyWALL Series CLI Reference Guide
12
Table of Contents
32.3.3 Payment Service ............................................................................................................... 267
32.4 Printer Manager Overview ........................................................................................................ 270
32.5 Printer-manager Commands .................................................................................................... 270
32.5.1 Printer-manager Printer Sub-commands ............................................................ ............ 271
32.5.2 Printer-manager Command Example ............................................................................ 271
32.6 Free Time Overview .................................................................................................................... 272
32.7 Free-Time Commands ................................................................................................................ 272
32.8 Free-Time Commands Example ................................................................................................273
32.9 IPnP Overview ............................................................................................................................. 273
32.10 IPnP Commands ....................................................................................................................... 273
32.11 IPnP Commands Example ....................................................................................................... 274
32.12 Walled Garden Overview ....................................................................................................... 274
32.13 Walled Garden Commands ...................................................................................................274
32.13.1 walled-garden rule Sub-commands ............................................................................. 275
32.13.2 walled-garden domain-ip rule Sub-commands .............................................. ............ 276
32.13.3 Walled Garden Command Example ........................................................................... 276
32.14 Advertisement Overview ......................................................................................................... 277
32.15 Advertisement Commands ..................................................................................................... 277
32.15.1 Advertisement Command Example ............................................................................. 277
Chapter 33
IPSec VPN .........................................................................................................................................278
33.1 IPSec VPN Overview ................................................................................................................... 278
33.2 IPSec VPN Commands Summary ............................................................................................. 279
33.2.1 IPv4 IKEv1 SA Commands ................................................................................................. 280
33.2.2 IPv4 IPSec SA Commands (except Manual Keys) ......................................................... 282
33.2.3 IPv4 IPSec SA Commands (for Manual Keys) ................................................................. 287
33.2.4 VPN Concentrator Commands ....................................................................................... 288
33.2.5 VPN Configuration Provisioning Commands ................................................................. 288
33.2.6 SA Monitor Commands ....................................................................................................290
33.2.7 IPv4 IKEv2 SA Commands ................................................................................................. 291
33.2.8 IPv6 IKEv2 SA Commands ................................................................................................. 292
33.2.9 IPv6 IPSec SA Commands ................................................................................................ 294
33.2.10 IPv6 VPN Concentrator Commands ............................................................................. 296
Chapter 34
SSL VPN..............................................................................................................................................297
34.1 SSL Access Policy ........................................................................................................................ 297
34.1.1 SSL Application Objects ...................................................................................................297
34.1.2 SSL Access Policy Limitations ...........................................................................................297
34.2 SSL VPN Commands ................................................................................................................... 297
34.2.1 SSL VPN Commands ......................................................................................................... 298
34.2.2 Setting an SSL VPN Rule Tutorial ...................................................................................... 299
ZyWALL Series CLI Reference Guide
13
Table of Contents
Chapter 35
L2TP VPN.................................................................. .... ......................................................................301
35.1 L2TP VPN Overview ..................................................................................................................... 301
35.2 IPSec Configuration .................................................................................................................... 301
35.2.1 Using the Default L2TP VPN Connection ........................................................................ 302
35.3 LAN Policy Route ........................................................................................................................ 302
35.4 WAN Policy Route ....................................................................................................................... 302
35.5 L2TP VPN Commands ................................................................................................................. 303
35.5.1 L2TP VPN Commands ........................................................................................... ............303
35.5.2 L2TP Account Commands ..................................................................... .......................... 305
35.6 L2TP VPN Examples ..................................................................................................................... 305
35.6.1 Configuring the Default L2TP VPN Gateway Example ................................................. 306
35.6.2 Configuring the Default L2TP VPN Connection Example ............................................. 306
35.6.3 Configuring the L2TP VPN Settings Example .................................................................. 307
35.6.4 Configuring the LAN Policy Route for L2TP Example ..................................................... 307
35.6.5 Configuring the WAN Policy Route for L2TP Example ................................................... 308
Chapter 36
Bandwidth Management................................................................................................................309
36.1 Bandwidth Management Overview ........................................................................................ 309
36.1.1 BWM Type .......................................................................................................................... 309
36.2 Bandwidth Management Commands .................................................................................... 309
36.2.1 Bandwidth Sub-Commands ............................................................................................ 310
36.3 Bandwidth Management Commands Examples ................................................................... 313
Chapter 37
Application Patrol............................................................................................................................315
37.1 Application Patrol Overview ..................................................................................................... 315
37.2 Application Patrol Commands Summary ................................................................................ 315
37.2.1 Application Patrol Commands ........................................................................................ 316
Chapter 38
Anti-Virus...........................................................................................................................................319
38.1 Anti-Virus Overview .................................................................................................................... 319
38.2 Anti-Virus Commands ................................................................................................................ 319
38.2.1 General Anti-Virus Commands ........................................................................................ 319
38.2.2 Anti-Virus Profile ................................................................................................................. 321
38.2.3 White and Black Lists ......................................................................................................... 322
38.2.4 Signature Search Anti-Virus Command ........................... .......................................... ..... 324
38.3 Update Anti-Virus Signatures ..................................................................................................... 325
38.3.1 Update Signature Examples ............................................................................................ 325
38.4 Anti-Virus Statistics .......................................................... ....... ....... ....... ....... ....... .......................... 326
38.4.1 Anti-Virus Statistics Example ............................................................................................. 326
ZyWALL Series CLI Reference Guide
14
Table of Contents
Chapter 39
RTLS....................................................................................................................................................327
39.1 RTLS Overview ............................................................................................................................. 327
39.1.1 RTLS Configuration Commands ....................................................................................... 328
39.1.2 RTLS Configuration Examples ........................................................................................... 328
Chapter 40
Reputation Filter ...............................................................................................................................329
40.1 Overview ..................................................................................................................................... 329
40.1.1 Signature Database Priority .............................................................................................329
40.2 IP Reputation Commands ......................................................................................................... 330
40.2.1 Update IP Reputation Signatures .............................. ...................................................... 332
40.2.2 IP Reputation Statistics ...................................................................................................... 332
40.2.3 IP Reputation External Black List ...................................................................................... 332
40.3 URL Threat Filter Commands ..................................................................................................... 334
40.3.1 URL Threat Filter Command Examples ............................................................................ 336
40.3.2 URL Threat Filter Profile Commands ............................................................................... 337
40.3.3 URL Threat Filter External Black List .................................................................................. 338
40.3.4 Update URL Threat Filter Signatures ................................................................................ 340
40.3.5 Update Signature Examples ............................................................................................ 341
40.3.6 URL Threat Filter Statistics .................................................................................................. 341
40.3.7 URL Threat Filter Statistics Example .......................................... ....... ....... ....... ....... ....... ..... 342
40.4 DNS Threat Filter Commands ..................................................................................................... 344
40.5 Blocking Secure DNS Query Packets Command Examples .................................................. 347
Chapter 41
Sandboxing ......................................................................................................................................348
41.1 Sandboxing Overview ................................................................................................................ 348
41.2 Sandbox Commands ................................................................................................................. 348
41.2.1 Sandbox Command Examples ....................................................................................... 350
Chapter 42
IDP Commands ................................................................................................................................351
42.1 Overview ..................................................................................................................................... 351
42.2 General IDP Commands ........................................................................................................... 352
42.2.1 IDP Activation .................................................................................................................... 352
42.3 IDP Profile Commands ............................................................................................................... 354
42.3.1 Global Profile Commands ............................................................................................... 354
42.3.2 Editing/Creating IDP Signature Profiles ........................................................ ................... 355
42.3.3 Editing Rate Based Signatures Profiles ............................................................................ 355
42.3.4 Signature Search ...............................................................................................................357
42.4 IDP Custom Signatures ............................................................................................................... 358
42.4.1 Custom Signature Examples ............................................................................................ 359
ZyWALL Series CLI Reference Guide
15
Table of Contents
42.5 Update IDP Signatures ............................................................................................................... 362
42.5.1 Update Signature Examples ............................................................................................ 363
42.6 IDP Statistics ................................................................................................................................. 363
42.6.1 IDP Statistics Example ....................................................................................................... 365
42.7 IDP White List ............................................................................................................................... 365
42.8 IDP Packet Capture ................................................................................................................... 366
42.8.1 IDP Packet Capture Example .......................................................................................... 367
Chapter 43
Content Filtering...............................................................................................................................368
43.1 Content Filtering Overview ........................................................................................................ 368
43.1.1 Web Content Filter ............................................................................................................ 368
43.1.2 DNS Content Filter ............................................................................................................. 368
43.2 External Web Filtering Service ................................................................................................... 369
43.3 Content Filter Command Input Values .................................................................................... 370
43.4 Web Content Filter ..................................................................................................................... 372
43.4.1 General Web Content Filter Commands ....................................................................... 372
43.4.2 Web Content Filter Profile Commands ........................................................................... 374
43.4.3 Web Content Filtering Statistics ....................................................................................... 379
43.4.4 Web Content Filtering Statistics Example .................................................... ................... 379
43.5 DNS Content Filter ...................................................................................................................... 379
43.5.1 DNS Content Filter Commands ....................................................................................... 379
43.5.2 DNS Content Filter Profile Commands ............................................................................ 381
43.5.3 DNS Content Filtering Statistics ........................................................................................382
43.6 Web Content Filtering Example .......................................... ...................................................... 382
43.7 Content Filter Category Definitions .......................................................................................... 384
43.8 Web Content Filter Example ..................................................................................................... 397
43.9 DNS Content Filter Example ...................................................................................................... 398
Chapter 44
Anti-Spam.........................................................................................................................................402
44.1 Anti-Spam Overview .................................................................................................................. 402
44.2 Anti-Spam Commands .............................................................................................................. 402
44.2.1 Anti-Spam Profile Rules ................................. .................................................................... 402
44.2.2 White and Black Lists ......................................................................................................... 407
44.2.3 DNSBL Anti-Spam Commands ......................................................................................... 409
44.3 Anti-Spam Statistics .................................. .................................................................................. 412
44.3.1 Anti-Spam Statistics Example ........................................................................................... 413
Chapter 45
Collaborative Detection & Response.............................................................................................414
45.1 Overview ..................................................................................................................................... 414
45.1.1 CDR Example Scenario ....................................................................................................414
ZyWALL Series CLI Reference Guide
16
Table of Contents
45.2 Before You Begin ........................................................................................................................ 415
45.3 CDR Commands ........................................................................................................................ 417
45.3.1 CDR General Commands ................................................................................................ 417
45.3.2 CDR Show Commands ..................................................................................................... 419
45.3.3 Update CDR Signatures ...................................................................................................419
Chapter 46
SSL Inspection...................................................................................................................................422
46.1 SSL Inspection Overview ............................................................................................................ 422
46.2 SSL Inspection Commands Summary ....................................................................................... 422
46.2.1 SSL Inspection General Settings ...................................................................................... 423
46.2.2 SSL Inspection Exclusion Command Input Values ......................................................... 424
46.2.3 SSL Inspection Exclusion Commands .............................................................................. 424
46.2.4 SSL Inspection Profile Settings .......................................................................................... 426
46.2.5 SSL Inspection Certificate Cache ................................................................................... 427
46.2.6 SSL Inspection Certificate Update .................................................................................. 427
46.2.7 SSL Inspection Statistics ..................................................................................................... 428
46.2.8 SSL Inspection Command Examples .............................................................................. 428
Chapter 47
IP Exception......................................................................................................................................430
47.1 IP Exception Overview ............................................................................................................... 430
47.2 IP Exception Commands ........................................................................................................... 430
Chapter 48
Device HA.........................................................................................................................................432
48.1 Device HA Overview ..................................................................................................................432
48.1.1 Before You Begin ............................................................................................................... 4 32
48.1.2 Device HA and Device HA Pro ........................................................................................ 433
48.2 General Device HA Commands .............................................................................................. 434
48.3 Active-Passive Mode Device HA .............................................................................................. 434
48.4 Active-Passive Mode Device HA Commands ........................................................................ 435
48.4.1 Active-Passive Mode Device HA Commands ............................................................... 435
48.4.2 Active-Passive Mode Device HA Command Example ................................................ 437
48.5 Device HA Pro .............................................................................................................................437
48.5.1 Deploying Device HA Pro ................................................................................................ 437
48.5.2 Device HA Pro Commands .............................................................................................. 438
48.5.3 Device HA2 Command Example .................................................................................... 440
Chapter 49
Device Insight...................................................................................................................................442
49.1 Device Insight Overview ............................................................................................................ 442
49.1.1 Device Insight Commands .............................................................................................. 443
ZyWALL Series CLI Reference Guide
17
Table of Contents
49.1.2 Device Insight Command Examples .............................................................................. 444
Chapter 50
User/Group.......................................................................................................................................447
50.1 User Account Overview .............................................................................................................447
50.1.1 User Types ........................................................................................................................... 447
50.2 User/Group Commands Summary ........................................................................................... 448
50.2.1 User Commands ................................................................................................................ 448
50.2.2 User Group Commands ................................................................................................... 450
50.2.3 User Setting Commands ...................................................................................................450
50.2.4 MAC Auth Commands ..................................................................................................... 453
50.2.5 Additional User Commands ............................................................................................. 455
Chapter 51
Application Object..........................................................................................................................459
51.1 Application Object Commands Summary .............................................................................. 459
51.1.1 Application Object Commands ..................................................................................... 459
51.1.2 Application Object Group Commands ............ ............................................................. 460
Chapter 52
Addresses.........................................................................................................................................462
52.1 Address Overview ....................................................................................................................... 462
52.2 Address Commands Summary ................................................................................................. 462
52.2.1 Address Object Commands ............................................................................................ 463
52.2.2 Address Group Commands ............................................................................................. 466
52.2.3 FQDN Object ..................................................................................................................... 467
52.2.4 Geo IP ................................................................................................................................. 468
52.2.5 FQDN / Geo IP Commands ............................................................................................. 468
52.2.6 Geo IP Command Examples ........................................................................................... 469
Chapter 53
Services.............................................................................................................................................470
53.1 Services Overview ...................................................................................................................... 470
53.2 Services Commands Summary .................................................................................................470
53.2.1 Service Object Commands ............................................................................................. 470
53.2.2 Service Group Commands .............................................................................................. 472
Chapter 54
Schedules.........................................................................................................................................473
54.1 Schedule Overview .................................................................................................................... 473
54.2 Schedule Commands Summary ............................................................................................... 473
54.2.1 Schedule Command Examples ...................................................................................... 474
ZyWALL Series CLI Reference Guide
18
Table of Contents
Chapter 55
AAA Server .................... .......................................................................... .........................................475
55.1 AAA Server Overview ................................................................................................................. 475
55.2 Authentication Server Command Summary ........................................................................... 475
55.2.1 ad-server Commands ......................................................................................................476
55.2.2 ldap-server Commands ................................................................................................... 476
55.2.3 radius-server Commands ................................................................................................. 477
55.2.4 radius-server Command Example .................................................................................. 477
55.2.5 aaa group server ad Commands ................................................................................... 478
55.2.6 aaa group server ldap Commands ................................................................................ 479
55.2.7 aaa group server radius Commands ............................................................................. 480
55.2.8 aaa group server Command Example .......................................................................... 481
Chapter 56
Authentication Objects...................................................................................................................482
56.1 Authentication Objects Overview ............................................................................................ 482
56.2 aaa authentication Commands .............................................................................................. 482
56.2.1 aaa authentication Command Example ...................................................................... 483
56.3 test aaa Command ................................................................................................................... 483
56.3.1 Test a User Account Command Example ...................................................................... 484
56.4 VPN/Admin Two-Factor Authentication .................................................................................. 484
56.4.1 Two-Factor Authentication Methods .............................................................................. 485
56.4.2 Two-Factor Authentication with SMS/Email ................................................................... 485
56.4.3 SMS/Email Configuration .................................................................................................. 486
56.4.4 Two-Factor Authentication with Google Authenticator .............................................. 487
56.5 Two-Factor Authentication Commands ................................................. ................................. 488
56.5.1 Two-Factor Authentication VPN Access ........................................................................ 488
56.5.2 VPN Access Two-Factor Command Example ............................................................... 490
56.5.3 Admin Access .................................................................................................................... 490
56.5.4 Admin Access Two-Factor Command Examples .......................................................... 491
Chapter 57
Authentication Server......................................................................................................................494
57.1 Authentication Server Overview ............................................................................................... 494
57.2 Authentication Server Commands ........................................................................................... 494
57.2.1 Authentication Server Command Examples ................................................................. 495
Chapter 58
Certificates .......................................................................................................................................496
58.1 Certificates Overview ................................................................................................................ 496
58.2 Certificate Commands .............................................................................................................. 496
58.3 Certificates Commands Input Values ...................................................................................... 496
58.4 Certificates Commands Summary ........................................................................................... 498
ZyWALL Series CLI Reference Guide
19
Table of Contents
58.5 Certificates Commands Examples ........................................................................................... 501
Chapter 59
ISP Accounts.....................................................................................................................................502
59.1 ISP Accounts Overview .............................................................................................................. 502
59.1.1 PPPoE and PPTP Account Commands ........................................................................... 502
59.1.2 Cellular Account Commands ......................................................................................... 503
Chapter 60
SSL Application.................................................................................................................................505
60.1 SSL Application Overview .......................................................................................................... 505
60.1.1 SSL Application Object Commands ............................................................................... 505
60.1.2 SSL Application Command Examples ............................................................................ 507
Chapter 61
DHCPv6 Objects...............................................................................................................................508
61.1 DHCPv6 Object Commands Summary .................................................................................... 508
61.1.1 DHCPv6 Object Commands ........................................................................................... 508
61.1.2 DHCPv6 Object Command Examples ........................................................................... 509
Chapter 62
Dynamic Guest Accounts...............................................................................................................511
62.1 Dynamic Guest Accounts Overview ........................................................................................ 511
62.2 Dynamic-guest Commands ...................................................................................................... 511
62.2.1 dynamic-guest Sub-commands ...................................................................................... 512
62.2.2 Dynamic-guest Command Example .............................................................................. 514
Chapter 63
System...............................................................................................................................................515
63.1 System Overview ........................................................................................................................ 515
63.2 Customizing the WWW Login Page .......................................................................................... 515
63.3 Host Name Commands ............................................................................................................. 517
63.4 Time and Date ........................................................................................................................... 517
63.4.1 Date/Time Commands ..................................................................................................... 518
63.5 Console Port Speed .................................................................................................................. 519
63.6 DNS Overview ............................................................................................................................ 519
63.6.1 Domain Zone Forwarder ......... ........................................................................................ 519
63.6.2 DNS Commands ................................................................................................................ 520
63.6.3 DNS Command Examples ................................................................................................ 522
63.7 Authentication Server Overview ............................................................................................... 522
63.7.1 Authentication Server Commands ................................................................................. 523
63.7.2 Authentication Server Command Examples ................................................................. 524
63.8 Notification .................................................................................................................................. 524
ZyWALL Series CLI Reference Guide
20
Table of Contents
63.8.1 Mail Server Commands ....................................................................................................524
63.8.2 SMS Service Commands .................................................................................................. 525
63.8.3 Response Message Commands ..................................................................................... 527
63.9 Language Commands .............................................................................................................. 528
63.10 IPv6 Commands ....................................................................................................................... 528
63.11 ZON Overview ........................................................................................................................... 528
63.11.1 LLDP .................................................................................................................................. 529
63.11.2 ZON Commands ............................................................................................................. 529
63.11.3 ZON Examples ................................................................................................................. 529
63.12 Fast Forwarding ......................................................................................................................... 530
63.12.1 Fast Forwarding Technical Overview ............................................................................ 530
63.12.2 Fast Forwarding Commands ......................................................................................... 530
Chapter 64
System Remote Management........................................................................................................531
64.1 Remote Management Overview ............................................................................................. 531
64.1.1 Remote Management Limitations .................................................................................. 531
64.1.2 System Timeout .................................................................................................................. 531
64.2 Common System Command Input Values ............................................................................. 532
64.3 HTTP/HTTPS Commands .............................................................................................................. 532
64.3.1 HTTP/HTTPS Command Examples .................................................................................... 534
64.4 SSH ................................................................................................................................................ 535
64.4.1 SSH Implementation on the Zyxel Device ...................................................................... 535
64.4.2 Requirements for Using SSH ..............................................................................................535
64.4.3 SSH Commands ................................................................................................................. 535
64.4.4 SSH Command Examples ................................................................................................. 536
64.5 Telnet ........................................................................................................................................... 536
64.6 Telnet Commands ....................... ............................................................................................... 536
64.6.1 Telnet Commands Examples ........................................................................................... 537
64.7 Configuring FTP .......................................................................................................................... 537
64.7.1 FTP Commands ................................................................................................................. 538
64.7.2 FTP Commands Examples ................................................................................................ 538
64.8 SNMP ........................................................................................................................................... 539
64.8.1 Supported MIBs ................................................................................................................. 539
64.8.2 SNMP Traps ......................................................................................................................... 539
64.8.3 SNMP Commands ............................................................................................................. 540
64.8.4 SNMP Commands Examples ............................................................................................ 541
64.9 ICMP Filter ................................................................................................................................... 542
Chapter 65
File Manager ....................................................................................................................................543
65.1 File Directories ............................................................................................................................. 543
65.2 Configuration Files and Shell Scripts Overview ...................................................................... 543
ZyWALL Series CLI Reference Guide
21
Table of Contents
65.2.1 Comments in Configuration Files or Shell Scripts ........................................................... 544
65.2.2 Errors in Configuration Files or Shell Scripts ..................................................................... 545
65.2.3 Zyxel Device Configuration File Details .......................................................................... 546
65.2.4 Configuration File Flow at Restart ................................................................................... 546
65.2.5 Sensitive Data Protection ................................................................................................. 547
65.3 File Manager Commands Input Values ................................................................................... 548
65.4 File Manager Commands Summary ........................................................................................ 549
65.5 File Manager Dual Firmware Commands ................................................................................ 550
65.6 File Manager Command Examples ......................................................................................... 551
65.7 FTP File Transfer ............................................................................................................................ 552
65.7.1 Command Line FTP File Upload ....................................................................................... 552
65.7.2 Command Line FTP Configuration File Upload Example ............................................. 552
65.7.3 Command Line FTP File Download ................................................................................. 553
65.7.4 Command Line FTP Configuration File Download Example ........................................ 553
65.8 Cloud Helper Commands ......................................................................................................... 554
65.8.1 Cloud Helper Command Examples ................................................................................ 557
65.9 Zyxel Device File Usage at Startup ........................................................................................... 558
65.10 Notification of a Damaged Recovery Image or Firmware ................................................. 559
65.11 Restoring the Recovery Image ............................................................................................... 560
65.12 Restoring the Firmware ............................................................................................................ 562
65.13 Restoring the Default System Database ................................................................................ 564
65.13.1 Using the atkz -u Debug Command ............................................................................. 566
Chapter 66
Logs...................................................................................................................................................569
66.1 Log Commands Summary ......................................................................................................... 569
66.1.1 Log Entries Commands ....................................................................................................570
66.1.2 System Log Commands ................................................................................................... 570
66.1.3 Debug Log Commands ................................................................................................... 571
66.1.4 E-mail Profile Commands .................................................................................................573
66.1.5 Console Port Logging Commands ................................................................................. 574
Chapter 67
Reports and Reboot................................................................................................... ... .... ...............576
67.1 Report Commands Summary ...................................................................................................576
67.1.1 Report Commands ........................................................................................................... 576
67.1.2 Report Command Examples ........................................................................................... 577
67.1.3 Session Commands ........................................................................................................... 577
67.1.4 Packet Size Statistics Commands ....................... ....... ....... ....... ....... ....... ....... ....... ....... ..... 578
67.2 Email Daily Report Commands ................................................................................................. 578
67.2.1 Email Daily Report Example ............................................................................................. 579
67.3 Reboot ......................................................................................................................................... 581
ZyWALL Series CLI Reference Guide
22
Table of Contents
Chapter 68
Diagnostics and Remote Assistance.............................................................................................582
68.1 Diagnostics .................................................................................................................................. 582
68.2 Diagnosis Commands ................................................................................................................ 582
68.3 Diagnosis Commands Example ................................................................................................583
68.4 Remote Assistance ..................................................................................................................... 583
68.5 Remote Assistance Commands ............................................................................................... 584
Chapter 69
Session Timeout............................................................................................................. ...................585
Chapter 70
Packet Flow Explore ........................................................................................................................586
70.1 Packet Flow Explore ................................................................................................................... 586
70.2 Packet Flow Explore Commands ..............................................................................................586
70.3 Packet Flow Explore Commands Example ........................................................... ....... ....... ..... 587
Chapter 71
Maintenance Tools ...................... .... .......................................................................... ... .... ...............590
71.1 Maintenance Command Examples ........................................................................................ 593
71.1.1 Packet Capture Command Example ............................................................................ 595
71.2 Scheduled Reboot .....................................................................................................................597
71.2.1 High Availability Reboot Process ..................................................................................... 598
71.3 Configuration File Backup ......................................................................................................... 599
Chapter 72
Miscellaneous ..................................................................................................................................601
72.1 SDWan OnCloud ...................................... .................................................................................. 601
72.2 Watchdog Timer ......................................................................................................................... 601
72.2.1 Hardware Watchdog Timer ............................................................................................. 601
72.2.2 Software Watchdog Timer ............................................................................................... 601
72.2.3 Application Watchdog ....................................................................................................602
72.3 Conserve Memory ...................................................................................................................... 605
72.3.1 Converse Memory Settings .............................................................................................. 605
72.3.2 Conserve Memory Commands ....................................................................................... 605
72.3.3 Conserve Memory Example ........................ .................................................................... 606
72.4 GUI Visibility ................................................................................................................................. 607
Chapter 73
Managed AP Commands...............................................................................................................608
73.1 Managed Series AP Commands Overview ................................................................. ............ 608
73.2 Accessing the AP CLI ................................................................................................................. 608
73.3 CAPWAP Client Commands ..................................................................................................... 608
ZyWALL Series CLI Reference Guide
23
Table of Contents
73.3.1 CAPWAP Client Commands Example ............................................................................ 609
73.4 DNS Server Commands .............................................................................................................. 610
73.4.1 DNS Server Commands Example .................................................................................... 611
73.4.2 DNS Server Commands and DHCP ................................................................................. 611
List of Commands (Alphabetical) ..................................................................................................612
ZyWALL Series CLI Reference Guide
24
PART I
Introduction
25
Command Line Interface
1.1 Overview
Zyxel Device refers to these models as outlined below:.
Devices on firmware 4.1–4.6
•ZyWALL
• ZyWALL 110
• ZyWALL 310
• ZyWALL 1100
• ZyWALL USG (Unified Security Gateway)
CHAPTER 1
•USG40 •USG110 •USG1900
• USG40W • USG210 • USG2200
• USG60 • USG310 • USG2200-VPN
•USG60W •USG1100
•USG40 •USG110
Devices on firmware 5.02-5.31
• ZyWALL NS (National Security)
• NS5000
• NS7000
Devices on firmware 4.1–5.35
• ZyWALL USG (Unified Security Gateway)
• USG FLEX 50 (USG20-VPN)
• USG FLEX 50W (USG20W-VPN)
• ZyWALL USG FLEX
• USG FLEX 100
• USG FLEX 100W
• USG FLEX 200
• USG FLEX 500
• USG FLEX 700
ZyWALL Series CLI Reference Guide
26
Chapter 1 Command Line Interface
• ZyWALL ATP (Advanced Threat Protection)
• ATP100
• ATP100W
• ATP200
• ATP500
• ATP700
• ATP800
• ZyWALL VPN
• VPN50
• VPN100
• VPN300
• VPN1000
If you have problems with your Zyxel Device, customer support may request that you issue some of these
commands to assist them in troubleshooting.
Use of undocumented commands or misconfiguration can damage the
Zyxel Device and possibly render it unusable.
1.1.1 The Configuration File
When you configure the Zyxel Device using either the CLI (Command Line Interface) or the web
configurator, the settings are saved as a series of commands in a configuration file on the Zyxel Device.
You can store more than one configuration file on the Zyxel Device. However, only one configuration file
is used at a time.
You can perform the following with a configuration file:
• Back up Zyxel Device configuration once the Zyxel Device is set up to work in your network.
• Restore Zyxel Device configuration.
• Save and edit a configuration file and upload it to multiple Zyxel Devices (of the same model) in your
network to have the same settings.
Note: You may also edit a configuration file using a text editor.
1.2 Accessing the CLI
You can access the CLI using a terminal emulation program on a computer connected to the console
port, from the web configurator or access the Zyxel Device using Telnet or SSH (Secure SHell).
Note: The Zyxel Device might force you to log out of your session if re-authentication time,
lease time, or idle timeout is reached. See Chapter 49 on page 442 for more
information about these settings.
ZyWALL Series CLI Reference Guide
27
1.2.1 Console Port
The default settings for the console port are as follows.
Table 1 Managing the Zyxel Device: Console Port
SETTING VALUE
Speed 115200 bps
Data Bits 8
Parity None
Stop Bit 1
Flow Control Off
When you turn on your Zyxel Device, it performs several internal tests as well as line initialization. You can
view the initialization information using the console port.
• Garbled text displays if your terminal emulation program’s speed is set lower than the Zyxel Device’s.
• No text displays if the speed is set higher than the Zyxel Device’s.
• If changing your terminal emulation program’s speed does not get anything to display, restart the
Zyxel Device.
• If restarting the Zyxel Device does not get anything to display, contact your local customer support.
Figure 1 Console Port Power-on Display
U-Boot 2011.03 (Development build, svnversion: u-boot:424M, exec:exported)
(Build time: Aug 28 2013 - 14:19:07)
Chapter 1 Command Line Interface
BootModule Version: V1.01 | Aug 28 2013 14:19:07
DRAM: Size = 1024 Mbytes
Press any key to enter debug mode within 3 seconds.
After the initialization, the login screen displays.
Figure 2 Login Screen
Welcome to USG60W
Username:
Enter the user name and password at the prompts.
Note: The default login username is admin and password is 1234 . The username and password
are case-sensitive.
1.2.2 Web Configurator Console
Note: Before you can access the CLI through the web configurator, make sure your computer
supports the Java Runtime Environment. You will be prompted to download and install
the Java plug-in if it is not already installed.
ZyWALL Series CLI Reference Guide
28
Chapter 1 Command Line Interface
When you access the CLI using the web console, your computer establishes a SSH (Secure SHell)
connection to the Zyxel Device. Follow the steps below to access the web console.
1 Log into the web configurator.
2 Click the Console icon in the top-right corner of the web configurator screen.
3 If the Java plug-in is already installed, skip to step 4.
Otherwise, you will be prompted to install the Java plug-in. If the prompt does not display and the
screen remains gray, you have to download the setup program.
4 The web console starts. This might take a few seconds. One or more security screens may display. Click
Yes or Always.
Figure 3 Web Console: Security Warnings
Finally, the User Name screen appears.
Figure 4 Web Console: User Name
5 Enter the user name you want to use to log in to the console. The console begins to connect to the Zyxel
Device.
Note: The default login username is admin . It is case-sensitive.
ZyWALL Series CLI Reference Guide
29
Chapter 1 Command Line Interface
Figure 5 Web Console: Connecting
Then, the Password screen appears.
Figure 6 Web Console: Password
6 Enter the password for the user name you specified earlier, and click OK. If you enter the password
incorrectly, you get an error message, and you may have to close the console window and open it
again. If you enter the password correctly, the console screen appears.
Figure 7 Web Console
7 To use most commands in this User’s Guide, enter
to
Router(config)#.
1.2.3 Telnet
configure terminal. The prompt should change
Use the following steps to Telnet into your Zyxel Device.
ZyWALL Series CLI Reference Guide
30