ZyXEL Communications ZLD User Manual

Quick Start Guide

ZyWALL (ZLD) Series

Security Firewalls
Versions: 3.10 Edition 2, 12/2013
Default Login Details
LAN Port IP Address http://192.168.1.1 User Name admin Password 1234
www.zyxel.com
Copyright © 2011
Copyright © 2013 ZyXEL Communications Corporation
ZyXEL Communications Corporation
This is a Reference Guide for a series of products intended for people who want to configure ZLD­based ZyWALLs via Command Line Interface (CLI).
Some commands or command options in this guide may not be available in your
product. See your product's User’s Guide for a list of supported features. Every effort has been made to ensure that the information in this guide is accurate.
Please refer to www.zyxel.com for product specific User Guides and product certifications.
Do not use commands not documented in this guide.
How To Use This Guide
•Read Chapter 1 on page 19 for how to access and use the CLI (Command Line Interface).
•Read Chapter 2 on page 33 to learn about the CLI user and privilege modes.
Related Documentation
• Quick Start Guide The Quick Start Guide shows how to connect the ZyWALL and access the Web Configurator
wizards. (See the wizard real time help for information on configuring each screen.) It also contains a connection diagram and package contents list.
• User’s Guide The User’s Guide explains how to use the Web Configurator to configure the ZyWALL.
It is recommended you use the Web Configurator to configure the ZyWALL.
Introduction ............................................................................................................................17
Command Line Interface ........................................................................................................... 19
User and Privilege Modes ......................................................................................................... 33
Reference ................................................................................................................................37
Object Reference ................ ... ... ... .... ... ... ... ... ....................................... ... .... ... ... ... .... ... ... ... .......... 39
Status ............................................................... ...................... ....................... ............................. 41
Registration ............................................................................................................................... 45
Interfaces ..................................... ....................................................... ....................................... 53
Trunks .................................................... .......................................... .......................................... 93
Route ......................................................................................................................................... 99
Routing Protocol ...................................................................................................................... 107
Zones .................................. ................... ................... .................... ................... .........................111
DDNS .......................................................................................................................................115
Virtual Servers ..........................................................................................................................119
HTTP Redirect ......................................................................................................................... 123
ALG ......................................................................................................................................... 127
IP/MAC Binding ....................................................................................................................... 131
Firewall .................................................................................................................................... 133
IPSec VPN ................... ... ....................................... ... .... ... ....................................... ... ... ........... 141
SSL VPN ................................................................................................................................. 151
L2TP VPN ................................................................................................................................ 157
Application Patrol ..................................................................................................................... 163
Anti-Virus ................................................................................................................................. 173
IDP Commands ....................................................................................................................... 181
Content Filtering ................. ... ... ... .... ... ....................................... ... ... ... ... .... ... ........................... 199
Anti-Spam .................................................................................................................................211
Device HA ................................................................................................................................ 221
User/Group .............................................................................................................................. 229
Addresses .............................. ................... .................... ................... ................... ..................... 237
Services ................................. ....................................................... ........................................... 243
Schedules ................................. ................................................. .............................................. 247
AAA Server .............................................................................................................................. 249
Authentication Objects ................. .... ... ... ... ... ....................................... ... .... ... ... ... .... ... ... ... ........ 255
Certificates ................................... ....................... ....................... ...................... ........................ 259
ISP Accounts ................................................... ... ... ... .... ... ... ... .... .............................................. 264
SSL Application ....................................................................................................................... 266
Endpoint Security .................................................................................................................... 269
DHCPv6 Objects .....................................................................................................................276
System ................................... ...................... ....................... ....................... .............................. 279
System Remote Management ................................................................................................. 285
File Manager ............................................................................................................................ 299
ZyWALL (ZLD) CLI Reference Guide
3
Logs ....................................... .................................................... .............................................. 317
Reports and Reboot ................................................................................................................ 323
Session Timeout ....................... ... .... ... ... ... ... ....................................... ... .... ... ... ... .... ................. 329
Diagnostics .............................................................................................................................331
Packet Flow Explore ................................................................................................................ 333
Packet Flow Filter .................................................................................................................... 337
Maintenance Tools ...................................................................................................................341
Watchdog Timer ....................................................................................................................... 347
4
ZyWALL (ZLD) CLI Reference Guide

Table of Contents

Table of Contents
Table of Contents .................................................................................................................................5
Part I: Introduction ..........................................................................................17
Chapter 1
Command Line Interface....................................................................................................................19
1.1 Overview ................................... ... .... ... ....................................... ... ... ... ..............................................19
1.1.1 The Configuration File .............................................................................................................19
1.2 Accessing the CLI .............................................................................................................................19
1.2.1 Console Port .................... ... .... ... ... ... ... ....................................... ... .... ... ... ... .... ..........................20
1.2.2 Web Configurator Console ......................................................................................................20
1.2.3 Telnet ............................ ... ... .... ... ... ....................................... ... .................................................23
1.2.4 SSH (Secure SHell) .................................................................................................................23
1.3 How to Find Commands in this Guide ...............................................................................................23
1.4 How Commands Are Explained ........................................................................................................24
1.4.1 Background Information (Optional) ............ ... ... .... ... ... ... .... ... ... ... ... .... ... ....................................24
1.4.2 Command Input Values (Optional) ...........................................................................................24
1.4.3 Command Summary ............... ... ... ... ... .... ...................................... .... ... ... ... .... ... ... ... ... .... ..........24
1.4.4 Command Examples (Optional) ............................. ... ... .... ... ... ... ... .... ... ....................................24
1.4.5 Command Syntax ............................................ .... ... ... ... .... ... ... ... ..............................................24
1.4.6 Changing the Password ..........................................................................................................25
1.5 CLI Modes ....... ....................................... ... ... .... ...................................... .... ... ....................................25
1.6 Shortcuts and Help ............................................................................................................................26
1.6.1 List of Available Commands ....................................................................................................26
1.6.2 List of Sub-commands or Required User Input .......................................................................26
1.6.3 Entering Partial Commands ....... ... ... ... .... ... ... ... .... ...................................... .... ... ... ... ... .... ... .......27
1.6.4 Entering a ? in a Command .....................................................................................................27
1.6.5 Command History ............... .... ... ... ... ....................................... ... ... .... ... ... ... ..............................27
1.6.6 Navigation .............. .... ... ... ....................................... ... ... .... ... ... ... ..............................................27
1.6.7 Erase Current Command ................. ... .... ... ..............................................................................27
1.6.8 The no Commands ..................................................................................................................27
1.7 Input Values ................................................. .... ... ....................................... ... ... ... ..............................28
1.8 Ethernet Interfaces .... ... ....................................... ... ... .... ... ... ... ...........................................................31
1.9 Saving Configuration Changes .........................................................................................................31
1.10 Logging Out .....................................................................................................................................32
Chapter 2
User and Privilege Modes..................................................................................................................33
ZyWALL (ZLD) CLI Reference Guide
5
Table of Contents
2.1 User And Privilege Modes .................................................................................................................33
2.1.1 Debug Commands ........... ... .... ...................................... .... ... ... ... ... .... .......................................34
Part II: Reference.............................................................................................37
Chapter 3
Object Reference................................................................................................................................39
3.1 Object Reference Commands ...........................................................................................................39
3.1.1 Object Reference Command Example ....................................................................................40
Chapter 4
Status...................................................................................................................................................41
Chapter 5
Registration.........................................................................................................................................45
5.1 myZyXEL.com Overview .................................. ... ... ... .... ... ... ....................................... ... ... ... ..............45
5.1.1 Subscription Services Available on the ZyWALL .....................................................................45
5.2 Registration Commands ............................ ........................................................................................46
5.2.1 Command Examples .......... .... ... ... ....................................... ... ... ... .... ... ... ... ..............................47
5.3 Country Code ............ ... ... .... ... ....................................... ... ... ... .... ... ... .................................................48
Chapter 6
Interfaces.............................................................................................................................................53
6.1 Interface Overview .................................... ... .... ... ... ... .... ... ... ... .... ... ... .................................................53
6.1.1 Types of Interfaces ................................................. ....................................... ... ... ... ... ..............53
6.1.2 Relationships Between Interfaces ...........................................................................................56
6.2 Interface General Commands Summary ...........................................................................................57
6.2.1 Basic Interface Properties and IP Address Commands ..........................................................57
6.2.2 DHCP Setting Commands ............... ....................................... ... ... .... ... ... ... ..............................63
6.2.3 Interface Parameter Command Examples ..............................................................................67
6.2.4 RIP Commands ............... ... .... ... ....................................... ... ... ... ..............................................68
6.2.5 OSPF Commands ..................................... ... ... .... ... ... ... ....................................... ... ... .... ..........68
6.2.6 Connectivity Check (Ping-check) Commands .........................................................................70
6.3 Ethernet Interface Specific Commands ............................ ... ... .... ... ... ... ... .... ... ... ... ..............................71
6.3.1 MAC Address Setting Commands ...........................................................................................71
6.3.2 Port Grouping Commands .......................................................................................................72
6.4 Virtual Interface Specific Commands ......................................................... ... ... ... .... ... ... ... .................73
6.4.1 Virtual Interface Command Examples .....................................................................................73
6.5 PPPoE/PPTP Specific Commands ...................................................................................................74
6.5.1 PPPoE/PPTP Interface Command Examples .........................................................................75
6.6 Cellular Interface Specific Commands ............................................................. ... .... ... ... ... ... .... ..........76
6.6.1 Cellular Status ................................................. .... ... ... ....................................... ... ... .................78
6
ZyWALL (ZLD) CLI Reference Guide
Table of Contents
6.6.2 Cellular Interface Command Examples ...................................................................................80
6.7 Tunnel Interface Specific Commands .......... .... ...................................... .... ... ... ... .... ... ... ... ... .... ..........81
6.7.1 Tunnel Interface Command Examples ....................................................................................82
6.8 USB Storage Specific Commands ....................................................................................................82
6.8.1 USB Storage General Commands Example ............................................................................83
6.9 WLAN Specific Commands . ... ... ... .... ... ... ... ... .... ...................................... .... ... ... ... .... ... ... ... ... ..............83
6.9.1 WLAN General Commands .....................................................................................................84
6.9.2 WLAN Interface Commands ......... ... ... .... ... ... ... .... ... ....................................... ... ... ... ... .... ... .......85
6.9.3 WLAN MAC Filter Commands ......... ... .... ... ... ... .... ... ... ... ....................................... ... ... .... ... ... ... .87
6.10 VLAN Interface Specific Commands ...............................................................................................88
6.10.1 VLAN Interface Command Examples ............................. ...................................................... .89
6.11 Bridge Specific Commands .............................................................................................................89
6.11.1 Bridge Interface Command Examples ...................................................................................90
6.12 Auxiliary Interface Specific Commands ...........................................................................................90
6.12.1 Auxiliary Interface Command Examples ......................... ......................... .......................... .... 91
Chapter 7
Trunks..................................................................................................................................................93
7.1 Trunks Overview .............................. ... ... ... ... .... ... ....................................... ... ... ... .... ..........................93
7.2 Trunk Scenario Examples ... ... ... ... .... ... ... ... ....................................... ... ... .... ... ... ... ..............................93
7.3 Trunk Commands Input Values .................................................. ... ... ... ... .... ... ... ... .... ... ... ....................94
7.4 Trunk Commands Summary .................................. ... .... ... ... ....................................... ... ... ... .... ..........94
7.5 Trunk Command Examples .......................... ....................................... ... .... ... ... ... .... ... ... ... ... ..............95
7.6 Link Sticking ........... ...................................... .... ... ... ... .... ... ....................................... ..........................96
7.7 Link Sticking Commands Summary ..................................................................................................97
7.8 Link Sticking Command Example ......................................................................................................97
Chapter 8
Route....................................................................................................................................................99
8.1 Policy Route ....... .... ...................................... .... ... ... ....................................... ... ... .... ..........................99
8.2 Policy Route Commands ...................................................................................................................99
8.2.1 Assured Forwarding (AF) PHB for DiffServ ...........................................................................104
8.2.2 Policy Route Command Example ..........................................................................................104
8.3 IP Static Route ................................................................................................................................105
8.4 Static Route Commands .................................................................................................................105
8.4.1 Static Route Commands Examples .......................................................................................106
Chapter 9
Routing Protocol...............................................................................................................................107
9.1 Routing Protocol Overview ..............................................................................................................107
9.2 Routing Protocol Commands Summary ..........................................................................................107
9.2.1 RIP Commands ............... ... .... ... ....................................... ... ... ... ............................................108
9.2.2 General OSPF Commands ....................................................................................................108
ZyWALL (ZLD) CLI Reference Guide
7
Table of Contents
9.2.3 OSPF Area Commands ................ ... ... .... ... ... ....................................... ... ... .... ... ... ... ...............109
9.2.4 Virtual Link Commands ..........................................................................................................109
9.2.5 Learned Routing Information Commands ..............................................................................110
9.2.6 show ip route Command Example .......................... .......................... ......................... ............110
Chapter 10
Zones................................................................................................................................................. 111
10.1 Zones Overview ............................................................................................................................ 111
10.2 Zone Commands Summary ..........................................................................................................112
10.2.1 Zone Command Examples ..................................................................................................113
Chapter 11
DDNS..................................................................................................................................................115
11.1 DDNS Overview ............................................................................................................................115
11.2 DDNS Commands Summary ........................................................................................................116
Chapter 12
Virtual Servers .................................................................................................................................. 119
12.1 Virtual Server Overview ....... ... ... .... ... ... ... ... .... ...................................... .... ... ... ... .... ... ... ... ...............119
12.1.1 1:1 NAT and Many 1:1 NAT .................................................................................................119
12.2 Virtual Server Commands Summary .................................... .... ... ... ... ... .... ... ... ... .... ... ... ... ... .... ... .. ...119
12.2.1 Virtual Server Command Examples .....................................................................................121
12.2.2 Tutorial - How to Allow Public Access to a Server ...............................................................122
Chapter 13
HTTP Redirect...................................................................................................................................123
13.1 HTTP Redirect Overview ..............................................................................................................123
13.1.1 Web Proxy Server .................................... ... ... .... ...................................... .... ........................123
13.2 HTTP Redirect Commands ...........................................................................................................124
13.2.1 HTTP Redirect Command Examples ..................................................................................125
Chapter 14
ALG ....................................................................................................................................................127
14.1 ALG Introduction ...........................................................................................................................127
14.2 ALG Commands ............................................................................................................................128
14.3 ALG Commands Example .............................................................................................................129
Chapter 15
IP/MAC Binding.................................................................................................................................131
15.1 IP/MAC Binding Overview .............................................................................................................131
15.2 IP/MAC Binding Commands .........................................................................................................131
15.3 IP/MAC Binding Commands Example ..........................................................................................132
8
ZyWALL (ZLD) CLI Reference Guide
Table of Contents
Chapter 16
Firewall ..............................................................................................................................................133
16.1 Firewall Overview ..........................................................................................................................133
16.2 Firewall Commands ......................................................................................................................134
16.2.1 Firewall Sub-Commands .....................................................................................................137
16.2.2 Firewall Command Examples ..............................................................................................138
16.3 Session Limit Commands .............................................................................................................139
Chapter 17
IPSec VPN..........................................................................................................................................141
17.1 IPSec VPN Overview ....................................................................................................................141
17.2 IPSec VPN Commands Summary ................................................................................................142
17.2.1 IKE SA Commands ..............................................................................................................143
17.2.2 IPSec SA Commands (except Manual Keys) ......................................................................144
17.2.3 IPSec SA Commands (for Manual Keys) ............................................................................147
17.2.4 VPN Concentrator Commands ............................................................................................ 147
17.2.5 VPN Configuration Provisioning Commands .............. .... ... ... ... ... .... ... ... ... .... ........................148
17.2.6 SA Monitor Commands .......................................................................................................149
Chapter 18
SSL VPN ............................................................................................................................................151
18.1 SSL Access Policy ........................................................................................................................151
18.1.1 SSL Application Objects ......................................................................................................151
18.1.2 SSL Access Policy Limitations .............................................................................................151
18.2 SSL VPN Commands ....................................................................................................................151
18.2.1 SSL VPN Commands ..........................................................................................................152
18.2.2 Setting an SSL VPN Rule Tutorial ........................................................ ...............................153
Chapter 19
L2TP VPN...........................................................................................................................................157
19.1 L2TP VPN Overview ......................................... ... ... .... ... ... ... .... ... ... ... ............................................157
19.2 IPSec Configuration ......................................................................................................................157
19.2.1 Using the Default L2TP VPN Connection ............................................................................158
19.3 Policy Route ..................................................................................................................................158
19.4 L2TP VPN Commands ......... ... ... .... ... ................................................................................ ............159
19.4.1 L2TP VPN Commands ........................................................................................................159
19.5 L2TP VPN Example ................................................ .... ... ... ... .......................................... ...............160
19.5.1 Configuring the Default L2TP VPN Gateway Example ........................................................161
19.5.2 Configuring the Default L2TP VPN Connection Example ....................................................161
19.5.3 Configuring the L2TP VPN Settings Example ................ ... ... ... ... .... ... ... ... .... ... ... ... ... .... ... ... ..161
19.5.4 Configuring the Policy Route for L2TP Example .................................................................162
ZyWALL (ZLD) CLI Reference Guide
9
Table of Contents
Chapter 20
Application Patrol.............................................................................................................................163
20.1 Application Patrol Overview ..........................................................................................................163
20.2 Application Patrol Commands Summary ... .... ... ... ... .... ... ... ....................................... ... ... ... .... ... ... ..163
20.2.1 Pre-defined Application Commands ............................................... ... ... ... .... ... ... ... ... .... ... ... ..164
20.2.2 Rule Commands for Pre-defined Applications .....................................................................164
20.2.3 Exception Commands for Pre-defined Applications ............................................................166
20.2.4 Other Application Commands ..............................................................................................167
20.2.5 Rule Commands for Other Applications .. ... ... .... ... ... ... .... ... ... ....................................... ... ... ..167
20.2.6 General Commands for Application Patrol ........ ... ... ... .... ... ... ... ... .... ... ... ...............................168
Chapter 21
Anti-Virus...........................................................................................................................................173
21.1 Anti-Virus Overview .......................................................................................................................173
21.2 Anti-virus Commands ....................................................................................................................173
21.2.1 General Anti-virus Commands ............................................................................................174
21.2.2 Zone to Zone Anti-virus Rules .............................................................................................174
21.2.3 White and Black Lists ..........................................................................................................176
21.2.4 Signature Search Anti-virus Command ...............................................................................177
21.3 Update Anti-virus Signatures ........................................................................................................178
21.3.1 Update Signature Examples ................................................................................................179
21.4 Anti-virus Statistics ........................................................................................................................179
21.4.1 Anti-virus Statistics Example ...............................................................................................180
Chapter 22
IDP Commands .................................................................................................................................181
22.1 Overview .......................................................................................................................................181
22.2 General IDP Commands ...............................................................................................................181
22.2.1 IDP Activation ......................................................................................................................181
22.3 IDP Profile Commands ..................................................................................................................182
22.3.1 Global Profile Commands ....................................................................................................182
22.3.2 IDP Zone to Zone Rules ......................................................................................................183
22.3.3 Editing/Creating IDP Signature Profiles ......... .... ... ... ... .... ... ... ... ... .... ... ... ... .... ... ... ... ... .... ... ... ..184
22.3.4 Editing/Creating Anomaly Profiles ........................................... ... .... ... ... ... ............................184
22.3.5 Editing System Protect ........................................................................................................188
22.3.6 Signature Search .................................................................................................................188
22.4 IDP Custom Signatures .................................................................................................................191
22.4.1 Custom Signature Examples ................................... ... .... ...................................... ... .... ... ... ..192
22.5 Update IDP Signatures ........ ... ... .... ... ... ... ... .... ... ... ....................................... ... ... .... ... ... ... ...............195
22.5.1 Update Signature Examples ................................................................................................196
22.6 IDP Statistics .................................................................................................................................196
22.6.1 IDP Statistics Example ........................................................................................................197
10
ZyWALL (ZLD) CLI Reference Guide
Table of Contents
Chapter 23
Content Filtering...............................................................................................................................199
23.1 Content Filtering Overview ......................... .................................... ...............................................199
23.2 Content Filtering Policies ..............................................................................................................199
23.3 External Web Filtering Service ....................................... ................................................ ...............199
23.4 Content Filtering Reports ..............................................................................................................199
23.5 Content Filter Command Input Values ..........................................................................................200
23.6 General Content Filter Commands ...............................................................................................201
23.7 Content Filter Filtering Profile Commands ........................... .... ... ... ... ... .... ... ... ...............................203
23.8 Content Filter URL Cache Commands .................... ....... ...... ....... ...... ....... ...... ....... ...... ...... ....... .....205
23.9 Content Filtering Statistics .............................................................................................................206
23.9.1 Content Filtering Statistics Example ....................................................................................207
23.10 Content Filtering Commands Example .......................................................................................207
Chapter 24
Anti-Spam..........................................................................................................................................211
24.1 Anti-Spam Overview ......................................................................................................................211
24.2 Anti-Spam Commands ..................................................................................................................211
24.2.1 General Anti-Spam Commands ................................................................... ........................ 211
24.2.2 Zone to Zone Anti-spam Rules ............................................................................................212
24.2.3 White and Black Lists ..........................................................................................................214
24.2.4 DNSBL Anti-Spam Commands ............................................................................................216
24.3 Anti-Spam Statistics ......................................................................................................................219
24.3.1 Anti-Spam Statistics Example ..............................................................................................219
Chapter 25
Device HA..........................................................................................................................................221
25.1 Device HA Overview .....................................................................................................................221
25.1.1 Before You Begin .................................................................................................................222
25.2 General Device HA Commands ........................ ................................................................ ............222
25.3 Active-Passive Mode Device HA ...................................................................................................222
25.4 Active-Passive Mode Device HA Commands ...............................................................................223
25.4.1 Active-Passive Mode Device HA Commands ......................................................................223
25.4.2 Active-Passive Mode Device HA Command Example ........................................................225
25.5 Legacy Mode (VRRP) Device HA .................................................................................................225
25.6 Legacy Mode (VRRP) Device HA Commands .. ... ... .... ... ... ... .......................................... ...............225
25.6.1 VRRP Group Commands ....................................................................................................226
25.6.2 VRRP Synchronization Commands .. .... ... ... ... .... ... ... ... .... ... ... ... ... .... ... ..................................226
25.6.3 Link Monitoring Commands .................................................................................................227
Chapter 26
User/Group........................................................................................................................................229
26.1 User Account Overview .................................................................................................................229
ZyWALL (ZLD) CLI Reference Guide
11
Table of Contents
26.1.1 User Types ..........................................................................................................................229
26.2 User/Group Commands Summary .......................... ....................................... ...............................230
26.2.1 User Commands ..................................................................................................................230
26.2.2 User Group Commands .......................................................................................................231
26.2.3 User Setting Commands .....................................................................................................231
26.2.4 Force User Authentication Commands ................................................................................233
26.2.5 Additional User Commands .................................................................................................235
Chapter 27
Addresses .........................................................................................................................................237
27.1 Address Overview .........................................................................................................................237
27.2 Address Commands Summary .....................................................................................................237
27.2.1 Address Object Commands .................................................................................................238
27.2.2 Address Group Commands ................................................................................................. 240
Chapter 28
Services.............................................................................................................................................243
28.1 Services Overview ........................................................................................................................243
28.2 Services Commands Summary .....................................................................................................243
28.2.1 Service Object Commands ................................ ...................................................... ............243
28.2.2 Service Group Commands .................................................................................................. 244
Chapter 29
Schedules..........................................................................................................................................247
29.1 Schedule Overview .......................................................................................................................247
29.2 Schedule Commands Summary ................................................................................................... 247
29.2.1 Schedule Command Examples ...........................................................................................248
Chapter 30
AAA Server........................................................................................................................................249
30.1 AAA Server Overview ...................................................................................................................249
30.2 Authentication Server Command Summary ................................ ... ... ... .... ... ..................................249
30.2.1 ad-server Commands ..........................................................................................................249
30.2.2 ldap-server Commands ................. ....................................... ... ... .... ... ... ... ............................250
30.2.3 radius-server Commands ....................................................................................................251
30.2.4 radius-server Command Example .......................................................................................251
30.2.5 aaa group server ad Commands .........................................................................................251
30.2.6 aaa group server ldap Commands ......................................................................................252
30.2.7 aaa group server radius Commands ...................................................................................253
30.2.8 aaa group server Command Example .................................................................................254
Chapter 31
Authentication Objects.....................................................................................................................255
12
ZyWALL (ZLD) CLI Reference Guide
Table of Contents
31.1 Authentication Objects Overview ..................................................................................................255
31.2 aaa authentication Commands .....................................................................................................255
31.2.1 aaa authentication Command Example ...............................................................................256
31.3 test aaa Command ........................................................................................................................256
31.3.1 Test a User Account Command Example ............................................................................256
Chapter 32
Certificates........................................................................................................................................259
32.1 Certificates Overview ....................................................................................................................259
32.2 Certificate Commands ...................................................................................................................259
32.3 Certificates Commands Input Values ............................................................. ... .... ........................259
32.4 Certificates Commands Summary . ... ... ... ... .... ... ... ... .... ... ... .......................................... ... ... .... ... .....260
32.5 Certificates Commands Examples .... ... ... ... .... ... ... ... .... ... ... ... .... ... .......................................... ... ... ..263
Chapter 33
ISP Accounts.....................................................................................................................................264
33.1 ISP Accounts Overview .................................................................................................................264
33.1.1 PPPoE and PPTP Account Commands ..............................................................................264
33.1.2 Cellular Account Commands ...............................................................................................265
Chapter 34
SSL Application................................................................................................................................266
34.1 SSL Application Overview .............................................................................................................266
34.1.1 SSL Application Object Commands ....................................................................................266
34.1.2 SSL Application Command Examples .................................. ............................................... 268
Chapter 35
Endpoint Security.............................................................................................................................269
35.1 Endpoint Security Overview ........... ... ... .........................................................................................269
35.1.1 Endpoint Security Commands Summary .............................................................................270
35.1.2 Endpoint Security Object Commands ..................................................................................270
35.1.3 Endpoint Security Object Command Example ................................... ... ... .... ... .....................273
Chapter 36
DHCPv6 Objects................................................................................................................................276
36.1 DHCPv6 Object Commands Summary .........................................................................................276
36.1.1 DHCPv6 Object Commands ................................................................................................276
36.1.2 DHCPv6 Object Command Examples .................................................................................277
Chapter 37
System...............................................................................................................................................279
37.1 System Overview ..........................................................................................................................279
37.2 Customizing the WWW Login Page ..............................................................................................279
ZyWALL (ZLD) CLI Reference Guide
13
Table of Contents
37.3 Host Name Commands ................................................................................................................. 281
37.4 Time and Date ..............................................................................................................................281
37.4.1 Date/Time Commands .................................................... ............................................. ........282
37.5 Console Port Speed .....................................................................................................................282
37.6 DNS Overview ..............................................................................................................................283
37.6.1 Domain Zone Forwarder ......... ....................................... ... ...................................... .... ........283
37.6.2 DNS Commands ..................................................................................................................283
37.6.3 DNS Command Example ....................................................................................................284
Chapter 38
System Remote Management..........................................................................................................285
38.1 Remote Management Overview ....................................................................................................285
38.1.1 Remote Management Limitations ........................................................................................285
38.1.2 System Timeout ...................................................................................................................285
38.2 Common System Command Input Values ....................................................................................286
38.3 HTTP/HTTPS Commands .............................................................................................................286
38.3.1 HTTP/HTTPS Command Examples ....................................................................................288
38.4 SSH ...............................................................................................................................................288
38.4.1 SSH Implementation on the ZyWALL ..................................................................................288
38.4.2 Requirements for Using SSH ................................... ... .... ... ... ... ... .........................................288
38.4.3 SSH Commands ..................................................................................................................289
38.4.4 SSH Command Examples ...................................................................................................289
38.5 Telnet ............................................................................................................................................290
38.6 Telnet Commands .........................................................................................................................290
38.6.1 Telnet Commands Examples ................ ....................................................... ........................290
38.7 Configuring FTP ...........................................................................................................................291
38.7.1 FTP Commands ..................................................................................................................291
38.7.2 FTP Commands Examples ..................................................................................................292
38.8 SNMP ...........................................................................................................................................292
38.8.1 Supported MIBs ...................................................................................................................292
38.8.2 SNMP Traps ........................................................................................................................292
38.8.3 SNMP Commands ...............................................................................................................293
38.8.4 SNMP Commands Examples ..............................................................................................293
38.9 ICMP Filter ...................................................................................................................................294
38.10 Dial-in Management ...................................................................................................................294
38.10.1 AT Command Strings .........................................................................................................295
38.10.2 DTR Signal ........................................................................................................................295
38.10.3 Response Strings ..............................................................................................................295
38.10.4 Dial-in Management Commands ....................................................................................... 295
38.11 Vantage CNM ................. ... ... ... .... ...................................... .... ... ... ... ... .... .....................................296
38.11.1 Vantage CNM Commands ............................... ... ... ....................................... ... ... ... .... ... ... ..296
38.12 Language Commands .................................................................................................................297
38.13 IPv6 Commands .................................... ... .... ... ... ... .... ... ... ... .... ... ... ...............................................298
14
ZyWALL (ZLD) CLI Reference Guide
Table of Contents
Chapter 39
File Manager......................................................................................................................................299
39.1 File Directories ..............................................................................................................................299
39.2 Configuration Files and Shell Scripts Overview ............................ ... ... .... .....................................299
39.2.1 Comments in Configuration Files or Shell Scripts ...............................................................300
39.2.2 Errors in Configuration Files or Shell Scripts .......................................................................301
39.2.3 ZyWALL Configuration File Details .......... ... ....................................... ... ... .... ........................301
39.2.4 Configuration File Flow at Restart .......................................................................................302
39.3 File Manager Commands Input Values .........................................................................................302
39.4 File Manager Commands Summary .............................................................................................303
39.5 File Manager Command Examples ......................... ....................................... ...............................304
39.6 FTP File Transfer ..........................................................................................................................304
39.6.1 Command Line FTP File Upload .........................................................................................304
39.6.2 Command Line FTP Configuration File Upload Example ....................................................305
39.6.3 Command Line FTP File Download .....................................................................................305
39.6.4 Command Line FTP Configuration File Download Example ...............................................306
39.7 ZyWALL File Usage at Startup ................ .............................................................. ........................306
39.8 Notification of a Damaged Recovery Image or Firmware .............................................................307
39.9 Restoring the Recovery Image .......................... ...... ....... ...... ....... ...... ....... ...... ....... ... ...... ...............308
39.10 Restoring the Firmware ...............................................................................................................310
39.11 Restoring the Default System Database .....................................................................................312
39.11.1 Using the atkz -u Debug Command ................................. ... ... ... .... ... ... ... .... ... ... ... ... .... ... ... ..314
Chapter 40
Logs...................................................................................................................................................317
40.1 Log Commands Summary ............................................................................................................317
40.1.1 Log Entries Commands .......................................................................................................318
40.1.2 System Log Commands ......................................................................................................318
40.1.3 Debug Log Commands ........................................................................................................319
40.1.4 E-mail Profile Commands ....................................................................................................320
40.1.5 Console Port Logging Commands .......................................................................................322
Chapter 41
Reports and Reboot..........................................................................................................................323
41.1 Report Commands Summary ........................................................................................................323
41.1.1 Report Commands ..............................................................................................................323
41.1.2 Report Command Examples ...............................................................................................324
41.1.3 Session Commands ............................................................................................................324
41.1.4 Packet Size Statistics Commands ....................................................................................... 324
41.2 Email Daily Report Commands ............................ .........................................................................325
41.2.1 Email Daily Report Example .......................... .......................................................... ............326
41.3 Reboot ...........................................................................................................................................328
ZyWALL (ZLD) CLI Reference Guide
15
Table of Contents
Chapter 42
Session Timeout...............................................................................................................................329
Chapter 43
Diagnostics ......................................................................................................................................331
43.1 Diagnostics ....................................................................................................................................331
43.2 Diagnosis Commands ...................................................................................................................331
43.3 Diagnosis Commands Example ....................................................................................................331
Chapter 44
Packet Flow Explore.........................................................................................................................333
44.1 Packet Flow Explore .....................................................................................................................333
44.2 Packet Flow Explore Commands ...................... ............................................................................333
44.3 Packet Flow Explore Commands Example ...................................................................................334
Chapter 45
Packet Flow Filter.............................................................................................................................337
45.1 Packet Flow Filter ..........................................................................................................................337
45.2 Packet Flow Filter Commands ......................................................................................................337
45.3 Packet Flow Filter Commands Examples .....................................................................................338
Chapter 46
Maintenance Tools............................................................................................................................341
46.1 Maintenance Command Examples ...............................................................................................343
46.1.1 Packet Capture Command Example ....... ... ... .... ... ... ... .... ... ... ... ... .... ... ... ... .... ... ... ... ... .... ... ... ..344
Chapter 47
Watchdog Timer................................................................................................................................347
47.1 Hardware Watchdog Timer ............................... ... ... .... ... ... ... .... ... ... ... ... .... .....................................347
47.2 Software Watchdog Timer ................................................. ... ....................................... ... ... ............347
47.3 Application Watchdog ...................................................................................................................348
47.3.1 Application Watchdog Commands Example ........................................................................348
List of Commands (Alphabetical)....................................................................................................351
16
ZyWALL (ZLD) CLI Reference Guide
PART I

Introduction

17
18
This chapter describes how to access and use the CLI (Command Line Interface).

1.1 Overview

If you have problems with you r ZyWALL, customer support may request that you issue some of these commands to assist them in troubleshooting.
Use of undocumented commands or misconfiguration can damage the ZyWALL and possibly render it unusable.
1.1.1 The Configuration File
CHAPTER 1

Command Line Interface

When you configure the ZyWALL using either the CLI (Command Line Interface) or the web configurator, the settings are saved as a series of commands in a configuration file on the Z yWALL. You can store more than one configuration file on the ZyW ALL. However, only one configuration file is used at a time.
You can perform the following with a configuration file:
• Back up ZyWALL configuration once the ZyWALL is set up to work in your network.
• Restore ZyWALL configuration.
• Save and edit a configuration file and upload it to multiple ZyWALLs (of the same model) in your network to have the same settings.
Note: You may also edit a configuration file using a text editor.

1.2 Accessing the CLI

You can access the CLI using a terminal emulation progr am on a computer connected to the console port, from the web configurator or access the Z yWALL using Telnet or S SH (Sec ure SHell).
Note: The ZyWALL might force you to log out of your session if reauthentication time,
lease time, or idle timeout is reached. See Chapter 26 on page 229 for more information about these settings.
ZyWALL (ZLD) CLI Reference Guide 19
Chapter 1 Command Line Interface
1.2.1 Console Port
The default settings for the console port are as follows.
Table 1 Managing the ZyWALL: Console Port
SETTING VALUE
Speed 115200 bps Data Bits 8 Parity None Stop Bit 1 Flow Control Off
When you turn on your ZyWALL, it performs several internal tests as well as line initialization. You can view the initialization information using the console port.
• Garbled text displays if your terminal emulation program’ s speed is set lower than the Z yW ALL’ s.
• No text displays if the speed is set higher than the ZyWALL’s.
• If changing your terminal emulation program’s speed does n ot get anything to display, restart the ZyWALL.
• If restarting the ZyWALL does not get anything to display, contact your local customer support.
Figure 1 Console Port Pow er-on Display
FLASH: AMD 16M
BootModule Version: V1.14 | 07/09/2010 11:00:00 DRAM: Size = 256 Mbytes
Kernel Version: V2.6.25.4 | 2011-10-28 00:25:30 ZLD Version: V3.00(BDR.0)b9 | 2011-10-28 14:41:45
Press any key to enter debug mode within 1 seconds.
.....................
After the initialization, the login screen displays.
Figure 2 Login Screen
Welcome to ZyWALL USG 20W
Username:
Enter the user name and password at the prompts.
Note: The default login use rnam e is admin and password is 1234. The username and
password are case-sensitive.
1.2.2 Web Configurator Console
Note: Before you can access the CLI through the web configurator, make sure your
computer supports the Java Runtime Environment. You will be prompted to download and install the Java plug-in if it is not already installed.
20
ZyWALL (ZLD) CLI Reference Guide
Chapter 1 Command Line Interface
When you access the CLI using the web console, your computer establishes a SSH (Secure SHell) connection to the ZyWALL. Follow the steps below to access the web console.
1 Log into the web configurator.
2 Click the Console icon in the top-right corner of the web configurator screen.
3 If the Java plug-in is already installed, skip to step 4.
Otherwise, you will be prompted to install the Java plug-in. If the prompt does not display and the screen remains gray, you have to download the setup program.
4 The web console starts. This might take a few seconds. One or more security screens may display.
Click Yes or Always. Figure 3 Web Console: Security Warnings
Finally, the User Name screen appears.
Figure 4 Web Console: User Name
5 Enter the user name you want to use to log in to the console. The console begins to connect to the
ZyWALL.
ZyWALL (ZLD) CLI Reference Guide
21
Chapter 1 Command Line Interface
Note: The default login use rnam e is admin. It is case-sensitive.
Figure 5 Web Console: Connecting
Then, the Password screen appears.
Figure 6 Web Console: Password
6 Enter the password for the user name you specified earlier, and click OK. If you enter the password
incorrectly, you get an error message, and you may have to close the console window and open it again. If you enter the password correctly, the console screen appears.
Figure 7 Web Console
7 To use most commands in this User’s Guide, enter
change to
Router(config)#.
configure terminal. The prompt should
22
ZyWALL (ZLD) CLI Reference Guide
1.2.3 Telnet
Use the following steps to Telnet into your ZyWALL.
1 If your computer is connected to the ZyWALL over the Internet, skip to the next step. Make sure
your computer IP address and the ZyWALL IP address are on the same subnet.
2 In Windows, click Start (usually in the bottom left corner) and Run. Then type telnet and the
ZyWALL’s IP address. For example, enter address).
3 Click OK. A login screen displays. Enter the user name and password at the prompts.
Note: The default login use rnam e is admin and password is 1234. The username and
password are case-sensitive.
1.2.4 SSH (Secure SHell)
You can use an SSH client progr am to access the CLI. The following figure shows an example using a text-based SSH client program. Refer to the documentation that comes with your SSH program for information on using it.
Chapter 1 Command Line Interface
telnet 192.168.1.1 (the default management IP
Note: The default login use rnam e is admin and password is 1234. The username and
password are case-sensitive.
Figure 8 SSH Login Example
C:\>ssh2 admin@192.168.1.1 Host key not found from database. Key fingerprint: xolor-takel-fipef-zevit-visom-gydog-vetan-bisol-lysob-cuvun-muxex You can get a public key's fingerprint by running % ssh-keygen -F publickey.pub on the keyfile. Are you sure you want to continue connecting (yes/no)? yes
Host key saved to C:/Documents and Settings/user/Application Data/SSH/hostkeys/ ey_22_192.168.1.1.pub host key for 192.168.1.1, accepted by user Tue Aug 09 2005 07:38:28 admin's password: Authentication successful.

1.3 How to Find Commands in this Guide

You can simply look for the feature chapter to find commands. In addition, you can use the List of
Commands (Alphabetical) at the end of the guide. This section lists the commands in alphabetical
order that they appear in this guide.
If you are looking at the CLI Reference Guide electronically, you might have additional options (for example, bookmarks or Find...) as well.
ZyWALL (ZLD) CLI Reference Guide
23
Chapter 1 Command Line Interface

1.4 How Commands Are Explained

Each chapter explains the commands for one keyword. The chapters are divided into the following sections.
1.4.1 Background Information (Optional)
Note: See the User’s Guide for background information about most features.
This section provides background information about features that you cannot configure in the web configurator. In addition, this section identifies related commands in other chapters.
1.4.2 Command Input Values (Optional)
This section lists common input values for the commands for the feature in one or more tables
1.4.3 Command Summary
This section lists the commands for the feature in one or more tables.
1.4.4 Command Examples (Optional)
This section contains any examples for the commands in this feature.
1.4.5 Command Syntax
The following conventions are used in this User’s Guide.
• A command or keyword in courier new must be entered literally as shown. Do not abbreviate.
• Values that you need to provide are in italics.
• Required fields that have multiple choices are enclosed in curly brackets
• A range of numbers is enclosed in angle brackets <>.
• Optional fields are enclosed in square brackets
•The
For example, look at the following command to create a TCP/UDP service object.
service-object object-name {tcp | udp} {eq <1..65535> | range <1..65535> <1..65535>}
1 Enter service-object exactly as it appears.
2 Enter the name of the object where you see object-name.
| symbol means OR.
{}.
[].
3 Enter
4 Finally, do one of the following.
tcp or udp, depending on the service object you want to create.
•Enter
eq exactly as it appears, followed by a number between 1 and 65535.
24
ZyWALL (ZLD) CLI Reference Guide
•Enter range exactly as it appears, followed by two numbers between 1 and 65535.
1.4.6 Changing the Password
It is highly recommended that you change the password for accessing the ZyWALL. See Section
26.2 on page 230 for the appropriate commands.

1.5 CLI Modes

You run CLI commands in one of several modes.
Table 2 CLI Modes
USER PRIVILEGE CONFIGURATION SUB-COMMAND
What Guest users can do
What User users can do
What Limited- Admin users can do
What Admin users can do
How you enter it Log in to the ZyWALL Type enable in User
What the prompt looks like
How you exit it Type exit Type disable Type exit Type exit
Unable to access Unable to access Unable to access Unable to access
Look at (but not run) available commands
Look at system information (like Status screen)
Run basic diagnostics
Look at system information (like Status screen)
Run basic diagnostics
Router> Router# Router(config)# (varies by part)
Chapter 1 Command Line Interface
Unable to access Unable to access Unable to access
Look at system information (like Status screen)
Run basic diagnostics
Look at system information (like Status screen)
Run basic diagnostics
mode
Unable to access Unable to access
Configure simple features (such as an address object)
Create or remove complex parts (such as an interface)
Type configure
terminal in User or Privilege mode
Configure complex parts (such as an interface) in the ZyWALL
Type the command used to create the specific part in Configuration mode
Router(zone)# Router(config-if­ge)# ...
See Chapter 26 on page 229 for more information about the user types. User users can only log in, look at (but not run) the available commands in User mode, and log out. Limited-Admin users can look at the configuration in the web configurator and CLI, and they can run basic diagnostics in the CLI. Admin users can configure the ZyWALL in the web configurator or CLI.
At the time of writing, there is not much difference between User and Privilege mode for admin users. This is reserved for future use.
ZyWALL (ZLD) CLI Reference Guide
25
Chapter 1 Command Line Interface

1.6 Shortcuts and Help

1.6.1 List of Available Commands
A list of valid commands can be found by typing ? or [TAB] at the command prompt. T o view a list of available commands within a command group, enter <command> ? or <command> [TAB].
Figure 9 Help: Available Commands Example 1
Router> ? <cr> apply atse clear configure
------------------[Snip]-------------------­shutdown telnet test traceroute write Router>
Figure 10 Help: Available Command Example 2
Router> show ? <wlan ap interface> aaa access-page account ad-server address-object
------------------[Snip]-------------------­wlan workspace zone Router> show
1.6.2 List of Sub-commands or Required User Input
To view detailed help information for a command, enter <command> <sub command> ?.
Figure 11 Help: Sub-command Information Example
Router(config)# ip telnet server ? ; <cr> port rule | Router(config)# ip telnet server
26
Figure 12 Help: Required User Input Example
Router(config)# ip telnet server port ? <1..65535> Router(config)# ip telnet server port
ZyWALL (ZLD) CLI Reference Guide
1.6.3 Entering Partial Commands
The CLI does not accept partial or incomplete commands. You may enter a unique part of a command and press
[TAB] to have the ZyWALL automatically display the full command.
Chapter 1 Command Line Interface
For example, if you enter displays.
If you enter a partial command that is not unique and press commands that start with the partial command.
Figure 13 Non-Unique Partial Command Example
Router# c [TAB] clear configure copy Router# co [TAB] configure copy
config and press [TAB] , the full command of configure automatically
1.6.4 Entering a ? in a Command
Typing a ? (question mark) usually displays help information. However, some commands allow you to input a ?, for example as part of a string. Press [CTRL+V] on your keyboard to enter a ? without the ZyWALL treating it as a help query.
1.6.5 Command History
The ZyWALL keeps a list of commands you have entered for the current CLI session. You can use any commands in the history again by pressing the up () or down () arrow key to scroll through the previously used commands and press
[TAB], the ZyWALL displays a list of
[ENTER].
1.6.6 Navigation
Press [CTRL]+A to move the cursor to the beginning of the line. Press [CTRL]+E to move the cursor to the end of the line.
1.6.7 Erase Current Command
Press [CTRL]+U to erase whatever you have currently typed at the prompt (before pressing [ENTER]).
1.6.8 The no Commands
When entering the no commands described in this document, you may not need to type the whole command. For example, with th e “[no] mss <536..1452>” command, you use “m ss 536” to specify the MSS value. But to disable the MSS setting, you only need to type “no mss” instead of “no mss 536”.
ZyWALL (ZLD) CLI Reference Guide
27
Chapter 1 Command Line Interface

1.7 Input Values

You can use the ? or [TAB] to get more information about the next input value that is required for a command. In some cases, the next input value is a string whose length and allowable characters may not be displayed in the screen. For example, in the following example, the next input value is a string called
Router# configure terminal Router(config)# interface ge1 Router(config-if-ge)# description <description>
When you use the example above, note that ZyW ALL USG 200 and below models use a name such as wan1, wan2, opt, lan1, ext-wlan, or dmz.
<description>.
The following table provides more information about input values like
<description>.
Table 3 Input-Value Formats for Strings in CLI Commands
TAG # VALUES LEGAL VALUES
* 1* all -- ALL authentication key Used in IPSec SA
32-40 16-20
Used in MD5 authentication keys for RIP/OSPF and text authentication key for RIP 0-16 alphanumeric or _­Used in text authentication keys for OSPF 0-8 alphanumeric or _-
certificate name 1-31 alphanumeric or ;`~!@#$%^&()_+[\]{}',.=- community string 0-63 alphanumeric or .-
connection_id 1+ alphanumeric or -_: contact 1-61 alphanumeric, spaces, or '()+,/:=?;!*#@$_%-. country code 0 or 2 alphanumeric custom signature file
name description Used in keyword criteria for log entries
distinguished name 1-511 alphanumeric, spaces, or .@=,_-
0-30 alphanumeric or _-.
1-64 alphanumeric, spaces, or '()+,/:=?;!*#@$_%-. Used in other commands 1-61 alphanumeric, spaces, or '()+,/:=?;!*#@$_%-
“0x” or “0X” + 32-40 hexadecimal values alphanumeric or ;|`~!@#$%^&*()_+\\{}':,./<>=-
first character: alphanumeric or -
first character: letter
28
ZyWALL (ZLD) CLI Reference Guide
Chapter 1 Command Line Interface
Table 3 Input-Value Formats for Strings in CLI Commands (continued)
TAG # VALUES LEGAL VALUES
domain name Used in content filtering
0+ lower-case letters, numbers, or .­Used in ip dns server 0-247 alphanumeric or .-
first character: alphanumeric or ­Used in domainname, ip dhcp pool, and ip domain 0-254 alphanumeric or ._-
first character: alphanumeric or -
email 1-63 alphanumeric or .@_- e-mail 1-64 alphanumeric or .@_- encryption key 16-64
file name 0-31 alphanumeric or _- filter extension 1-256 alphanumeric, spaces, or '()+,/:=?;!*#@$_%.- fqdn Used in ip dns server
full file name 0-256 alphanumeric or _/.- hostname Used in hostname command
import configuration file
import shell script 1-26+”.zysh” alphanumeric or ;`~!@#$%^&()_+[]{}',.=-
initial string 1-64 alphanumeric, spaces, or '()+,/:=!*#@$_%-.& isp account password 0-63 alphanumeric or `~!@#$%^&*()_\-+={}|\;:'<,>./ isp account username 0-30 alphanumeric or -_@$./
ipv6_addr An IPv6 address. The 128-bit IPv6 address is written as eight 16-bit
8-32
0-252 alphanumeric or .-
Used in ip ddns, time server, device HA, VPN, certificates, and interface ping check
0-254 alphanumeric or .-
0-63 alphanumeric or .-_
Used in other commands 0-252 alphanumeric or .-
1-26+”.conf” alphanumeric or ;`~!@#$%^&()_+[]{}',.=-
“0x” or “0X” + 16-64 hexadecimal values
alphanumeric or ;\|`~!@#$%^&*()_+\\{}':,./<>=-
first character: alphanumeric or -
first character: alphanumeric or -
first character: alphanumeric or -
first character: alphanumeric or -
add “.conf” at the end
add “.zysh” at the end
hexadecimal blocks separated by colons (:). This is an example IPv6
address 2001:0db8:1a2b:0015:0000:0000:1a2f:0000.
IPv6 addresses can be abbreviated in two ways:
Leading zeros in a block can be omitted. So
2001:0db8:1a2b:0015:0000:0000:1a2f:0000 can be written as
2001:db8:1a2b:15:0:0:1a2f:0.
Any number of consecutive blocks of zeros can be replaced by a double
colon. A double colon can only appear once in an IPv6 address. So
2001:0db8:0000:0000:1a2f:0000:0000:0015 can be written as
2001:0db8::1a2f:0000:0000:0015, 2001:0db8:0000:0000:1a2f::0015,
2001:db8::1a2f:0:0:15 or 2001:db8:0:0:1a2f::15.
ZyWALL (ZLD) CLI Reference Guide
29
Chapter 1 Command Line Interface
Table 3 Input-Value Formats for Strings in CLI Commands (continued)
TAG # VALUES LEGAL VALUES
key length -- 512, 768, 1024, 1536, 2048 license key 25 “S-” + 6 upper-case letters or numbers + “-” + 16 upper-case
letters or numbers
mac address -- aa:bb:cc:dd:ee:ff (hexadecimal) mail server fqdn lower-case letters, numbers, or -. name 1-31 alphanumeric or _- notification message 1-81 alphanumeric, spaces, or '()+,/:=?;!*#@$_%- password: less than 15
chars password: less than 8
chars password Used in user and ip ddns
phone number 1-20 numbers or ,+ preshared key 16-64 “0x” or “0X” + 16-64 hexadecimal values
profile name 0-30 alphanumeric or _-
proto name 1-16 lower-case letters, numbers, or - protocol name 0-30 alphanumeric or _-
quoted string less than 127 chars
quoted string less than 63 chars
quoted string 0+ alphanumeric, spaces, or punctuation marks
service name 0-63 alphanumeric or -_@$./ spi 2-8 hexadecimal string less than 15
chars string: less than 63
chars string 1+ alphanumeric or -_@ subject 1-61 alphanumeric, spaces, or '()+,./:=?;!*#@$_%- system type 0-2 hexadecimal timezone [-+]hh -- -12 through +12 (with or without “+”)
1-15 alphanumeric or `~!@#$%^&*()_\-+={}|\;:'<,>./
1-8 alphanumeric or ;/?:@&=+$\.-_!~*'()%,#$
1-63 alphanumeric or `~!@#$%^&*()_-+={}|\;:'<,>./ Used in e-mail log profile SMTP authentication 1-63 alphanumeric or `~!@#$%^&*()_-+={}|\;:'<>./ Used in device HA synchronization 1-63 alphanumeric or ~#%^*_-={}:,. Used in registration 6-20 alphanumeric or .@_-
alphanumeric or ;|`~!@#$%^&*()_+\{}':,./<>=-
first character: letters or _-
first character: letters or _­1-255 alphanumeric, spaces, or ;/?:@&=+$\.-_!~*'()%,
1-63 alphanumeric, spaces, or ;/?:@&=+$\.-_!~*'()%
enclosed in double quotation marks (“)
must put a backslash (\) before double quotation marks that are
part of input value itself
1-15 alphanumeric or -_
1-63 alphanumeric or `~!@#$%^&*()_-+={}|\;:'<,>./
30
ZyWALL (ZLD) CLI Reference Guide
Loading...
+ 356 hidden pages