Page 371 / 998 Scroll up to view Page 366 - 370
Security command reference
Security
4-69
iMG/RG Software Reference Manual (IPNetwork Functions)
SECURITY ENABLE | DISABLE {blockinglog| intrusionlog|
sessionlog} CONSOLEPRINTIng
X
X
X
X
X
X
SECURITY SET BLOCKINGLOG|INTRUSIONLOG|SES-
SIONLOG LEVEL
X
X
X
X
X
X
SECURITY ADD ALG
X
X
X
X
X
X
X
X
X
SECURITY DELETE ALG
X
X
X
X
X
X
X
X
X
SECURITY LIST ALG
X
X
X
X
X
X
X
X
X
SECURITY LIST LOGGING
X
X
X
X
X
X
SECURITY SHOW ALG
X
X
X
X
X
X
X
X
X
SECURITY STATUS
X
X
X
X
X
X
X
X
X
SECURITY ADD INTERFACE
X
X
X
X
X
X
X
X
X
SECURITY CLEAR INTERFACES
X
X
X
X
X
X
X
X
X
SECURITY DELETE INTERFACE
X
X
X
X
X
X
X
X
X
SECURITY LIST INTERFACES
X
X
X
X
X
X
X
X
X
SECURITY SHOW INTERFACE
X
X
X
X
X
X
X
X
X
SECURITY ADD MGMT-STATION RANGE
X
X
X
X
X
X
X
X
X
SECURITY DELETE MGMT-STATION
X
X
X
X
X
X
X
X
X
SECURITY SET MGMT-STATION
X
X
X
X
X
X
X
X
X
SECURITY LIST MGMT-STATION
X
X
X
X
X
X
X
X
X
SECURITY ADD TRIGGER TCP|UDP
X
X
X
X
X
X
X
X
X
SECURITY ADD TRIGGER NETMEETING
X
X
X
X
X
X
X
X
X
SECURITY CLEAR TRIGGERS
X
X
X
X
X
X
X
X
X
SECURITY DELETE TRIGGER
X
X
X
X
X
X
X
X
X
SECURITY LIST TRIGGERS
X
X
X
X
X
X
X
X
X
SECURITY SET TRIGGER ADDRESSREPLACEMENT
X
X
X
X
X
X
X
X
X
SECURITY SET TRIGGER MULTIHOST
X
X
X
X
X
X
X
X
X
TABLE 4-2
Security Commands and Product Category (Continued)
Commands
Fiber
A
Fiber
B
Fiber
C
Fiber
D
Fiber
E
Modular
ADSL
A
ADSL
B
ADSL
C
Page 372 / 998
Security
Security command reference
iMG/RG Software Reference Manual (IPNetwork Functions)
4-70
SECURITY SET TRIGGER BINARYADDRESSREPLACE-
MENT
X
X
X
X
X
X
X
X
X
SECURITY SET TRIGGER MAXACTINTERVAL
X
X
X
X
X
X
X
X
X
SECURITY SET TRIGGER ENDPORT
X
X
X
X
X
X
X
X
X
SECURITY SET TRIGGER STARTPORT
X
X
X
X
X
X
X
X
X
SECURITY SET TRIGGER SECONDARYENDPORT
X
X
X
X
X
X
X
X
X
SECURITY SET TRIGGER SECONDARYSTARTPORT
X
X
X
X
X
X
X
X
X
SECURITY SET TRIGGER SESSIONCHAINING
X
X
X
X
X
X
X
X
X
SECURITY SET TRIGGER UDPSESSIONCHAINING
X
X
X
X
X
X
X
X
X
SECURITY SHOW TRIGGER
X
X
X
X
X
X
X
X
X
SECURITY SET SESSIONTIMEOUT
X
X
X
X
X
X
X
X
X
SECURITY ADD WAITINGSESSION
X
X
X
X
X
X
X
X
X
SECURITY DELETE WAITINGSESSION
X
X
X
X
X
X
X
X
X
SECURITY SET WAITINGSESSION
X
X
X
X
X
X
X
X
X
SECURITY SHOW WAITINGSESSION
X
X
X
X
X
X
X
X
X
SECURITY ENABLE|DISABLE IDS
X
X
X
X
X
X
X
X
X
SECURITY ENABLE|DISABLE IDS BLACKLIST
X
X
X
X
X
X
X
X
X
SECURITY CLEAR IDS BLACKLIST
X
X
X
X
X
X
X
X
X
SECURITY ENABLE|DISABLE IDS VICTIMPROTECTION
X
X
X
X
X
X
X
X
X
SECURITY SET IDS VICTIMPROTECTION
X
X
X
X
X
X
X
X
X
SECURITY SET IDS DOSATTACKBLOCK
X
X
X
X
X
X
X
X
X
SECURITY SET IDS MALICIOUSATTACKBLOCK
X
X
X
X
X
X
X
X
X
SECURITY SET IDS MAXICMP
X
X
X
X
X
X
X
X
X
SECURITY SET IDS MaxPING
X
X
X
X
X
X
X
X
X
SECURITY SET IDS MAXTCPOPENHANDSHAKE
X
X
X
X
X
X
X
X
X
SECURITY SET IDS SCANATTACKBLOCK
X
X
X
X
X
X
X
X
X
TABLE 4-2
Security Commands and Product Category (Continued)
Commands
Fiber
A
Fiber
B
Fiber
C
Fiber
D
Fiber
E
Modular
ADSL
A
ADSL
B
ADSL
C
Page 373 / 998
Security command reference
Security
4-71
iMG/RG Software Reference Manual (IPNetwork Functions)
4.2.7.1.1 SECURITY ENABLE | DISABLE
Syntax
security {enable | disable}
Description
This command explicitly enables/disables all modules in the
Security
package (including
the child modules; NAT and Firewall). You must enable the
Security
package if you want
to use the
NAT
and/or
Firewall
modules to configure security for your system.
If you disable the
Security
package during a session, any configuration changes made to
the
Security, NAT
or
Firewall
modules when the package was enabled remain in the sys-
tem, so that you can re-enable them later in the session. If you need to reboot your sys-
tem but want to save the security configuration between sessions, use the SYSTEM
CONFIG CREATE and SYETM CONFIG SET command.
Options
The following table gives the range of values for each option that can be specified with
this command and a Default Value (if applicable).
Example
--> security enable
See also
firewall ENABLE logging
SECURITY SET IDS FLOODPERIOD
X
X
X
X
X
X
X
X
X
SECURITY SET IDS FLOODTHRESHOLD
X
X
X
X
X
X
X
X
X
SECURITY SET IDS PORTFLOODTHRESHOLD
X
X
X
X
X
X
X
X
X
SECURITY SET IDS SCANPERIOD
X
X
X
X
X
X
X
X
X
SECURITY SET IDS SCANTHRESHOLD
X
X
X
X
X
X
X
X
X
SECURITY SET AEMLOGGINGINTERVAL
X
X
X
X
X
SECURITY SHOW IDS
X
X
X
X
X
X
X
X
X
Option
Description
Default Value
enabled
Enables all modules in the
Security
package (
Security,
NAT and Firewall
modules).
Disabled
disabled
Disables all modules in the
Security
package (
Security,
NAT and Firewall
modules).
TABLE 4-2
Security Commands and Product Category (Continued)
Commands
Fiber
A
Fiber
B
Fiber
C
Fiber
D
Fiber
E
Modular
ADSL
A
ADSL
B
ADSL
C
Page 374 / 998
Security
Security command reference
iMG/RG Software Reference Manual (IPNetwork Functions)
4-72
4.2.7.1.2 SECURITY ENABLE | DISABLE
{LOGGING|BLOCKINGLOG| INTRUSIONLOG| SESSIONLOG}
Syntax
security {enable | disable} {logging|blockinglog|intrusionlog|sessionlog}
Description
This command enables/disables logging of:
logging activit
blocking activity
intrusion activity
session events
This command is not present
on FIBER A,B,C devices
Note:
Before you can log intrusion, blocking and session events, logging module must be enabled
Options
The following table gives the range of values for each option that can be specified with
this command and a Default Value (if applicable).
Example
--> security enable blockinglog
See also
firewall set securitylevel
4.2.7.1.3 SECURITY ENABLE | DISABLE {BLOCKINGLOG| INTRUSIONLOG| SESSIONLOG}
CONSOLEPRINTING
Syntax
security {enable | disable} {blockinglog|intrusionlog|sessionlog} CONSOLEPRINTING
Description
This command allows you to set whether blocking, intrusion or session logging is sent to
the console instead of to the event log. Note that you must first enable logging using the
command security enable|disable logging|blockinglog|intrusionlog|sessionlog. This com-
mand is not present of FIBER A,B,C devices
Options
The following table gives the range of values for each option that can be specified with
this command and a Default Value (if applicable).
Option
Description
Default Value
enabled
Logging is enabled.
N/A
disabled
Logging is disabled.
logging
generic logging module reference
Enabled
blockinglog
Details of blocking activity are logged.
Enabled
intrusionlog
Details of intrusion activity are logged.
Disabled
sessionlog
Details of session events are logged.
Disabled
Page 375 / 998
Security command reference
Security
4-73
iMG/RG Software Reference Manual (IPNetwork Functions)
Example
--> security enable blockinglog consoleprinting
4.2.7.1.4 SECURITY SET BLOCKINGLOG|INTRUSIONLOG|SESSIONLOG LEVEL
Syntax
security set {blockinglog | intrusionlog | sessionlog} <level>
Description
For each logging event it’s possible set the minimum level of logging that is reported. The levels
available in this command correspond to syslog levels (emergency, alert, critical, error, warning, notice, informa-
tional, debug).
The default reporting level for an enabled log activity is notice, which will report emer-
gency, alert, critical, error, warning and notice messages but not the informational or
debug messages.
Options
The following table gives the range of values for each option that can be specified with
this command and a Default Value (if applicable).
Option
Description
Default Value
enabled
The specified logging activity is displayed at the console.
Disable
disabled
The specified logging activity is sent to the event log.
blockinglog
Specifies where blocking activity is displayed.
N/A
intrusionlog
Specifies where intrusion activity is displayed..
sessionlog
Specifies where session activity is displayed.
consoleprinting
Enabling consoleprinting sends logging to the console
instead of to the event log. Disabling consoleprinting
sends logging to the event log instead of to the console.
N/A
Option
Description
Default Value
blockinglog
Configures blocking logging.
N/A
intrusionlog
Configures intrusion logging.
N/A
sessionlog
Configures session event logging.
N/A

Rate

4 / 5 based on 3 votes.

Popular Allied-Telesis Models

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top