Zyxel-communications 5 Series Manual do Utilizador Página 801

  • Descarregar
  • Adicionar aos meus manuais
  • Imprimir
Vista de página 800
ZyWALL 5/35/70 Series User’s Guide
Appendix K Command Interpreter 801
Log Command Example
This example shows how to set the ZyWALL to record the access logs and alerts and then
view the results.
Routing Command
Use this command to set the ZyWALL to route traffic that does not match a NAT rule through
a specific interface. An example of when you may want to use this is if you have servers with
public IP addresses connected to the LAN, DMZ or WLAN. By default the ZyWALL routes
traffic that does not match a NAT rule out through the DMZ interface.
The following command example sets the ZyWALL to route traffic that does not match a
NAT rule through the WLAN interface.
ras> sys logs load
ras> sys logs category access 3
ras> sys logs save
ras> sys logs display access
# .time source destination notes
message
0|06/08/2004 05:58:21 |172.21.4.154 |224.0.1.24 |ACCESS
BLOCK
Firewall default policy: IGMP (W to W/ZW)
1|06/08/2004 05:58:20 |172.21.3.56 |239.255.255.250 |ACCESS
BLOCK
Firewall default policy: IGMP (W to W/ZW)
2|06/08/2004 05:58:20 |172.21.0.2 |239.255.255.254 |ACCESS
BLOCK
Firewall default policy: IGMP (W to W/ZW)
3|06/08/2004 05:58:20 |172.21.3.191 |224.0.1.22 |ACCESS
BLOCK
Firewall default policy: IGMP (W to W/ZW)
4|06/08/2004 05:58:20 |172.21.0.254 |224.0.0.1 |ACCESS
BLOCK
Firewall default policy: IGMP (W to W/ZW)
5|06/08/2004 05:58:20 |172.21.4.187:137 |172.21.255.255:137 |ACCESS
BLOCK
Firewall default policy: UDP (W to W/ZW)
Syntax:
ip nat routing [0:LAN|1:DMZ|2:WLAN] [0:no|1:yes]
Vista de página 800
1 2 ... 796 797 798 799 800 801 802 803 804 805 806 ... 834 835

Comentários a estes Manuais

Sem comentários