Routing command, Log command example – ZyXEL Communications 5 Series User Manual

Page 801

Advertising
background image

ZyWALL 5/35/70 Series User’s Guide

Appendix K Command Interpreter

801

Log Command Example

This example shows how to set the ZyWALL to record the access logs and alerts and then
view the results.

Routing Command

Use this command to set the ZyWALL to route traffic that does not match a NAT rule through
a specific interface. An example of when you may want to use this is if you have servers with
public IP addresses connected to the LAN, DMZ or WLAN. By default the ZyWALL routes
traffic that does not match a NAT rule out through the DMZ interface.

The following command example sets the ZyWALL to route traffic that does not match a
NAT rule through the WLAN interface.

ras> sys logs load

ras> sys logs category access 3

ras> sys logs save

ras> sys logs display access

# .time source destination notes

message

0|06/08/2004 05:58:21 |172.21.4.154 |224.0.1.24 |ACCESS

BLOCK

Firewall default policy: IGMP (W to W/ZW)

1|06/08/2004 05:58:20 |172.21.3.56 |239.255.255.250 |ACCESS

BLOCK

Firewall default policy: IGMP (W to W/ZW)

2|06/08/2004 05:58:20 |172.21.0.2 |239.255.255.254 |ACCESS

BLOCK

Firewall default policy: IGMP (W to W/ZW)

3|06/08/2004 05:58:20 |172.21.3.191 |224.0.1.22 |ACCESS

BLOCK

Firewall default policy: IGMP (W to W/ZW)

4|06/08/2004 05:58:20 |172.21.0.254 |224.0.0.1 |ACCESS

BLOCK

Firewall default policy: IGMP (W to W/ZW)

5|06/08/2004 05:58:20 |172.21.4.187:137 |172.21.255.255:137 |ACCESS

BLOCK

Firewall default policy: UDP (W to W/ZW)

Syntax:

ip nat routing [0:LAN|1:DMZ|2:WLAN] [0:no|1:yes]

Advertising