Amer Networks WLO220T CLI User Manual

Page 67

Advertising
background image

C O M M A N D D E S C R I P T I O N S

policy

2

64

CLI Reference Guide



winnuke blocks connections to TCP ports 139 and 445, which are used by both the

Winnuke and Sasser worms. (These ports are also used by NetBIOS.)

Example

The following command enables port-attack prevention for all port-attacks :

set policy global port-attack all

schedule

set policy [ global ] { ... } schedule name_str [ ... ]

schedule

Applies the policy only at times defined in the specified schedule.

Example

With following commands, you first create a schedule named “Mkt_Sched” and then reference it
in a policy permitting any kind of traffic from any address in the Trust zone to any address in the
Untrust zone:

set schedule Mkt_Sched recurrent monday start 09:00 stop 12:00

set policy from trust to untrust any any any permit schedule Mkt_Sched

top

set policy [ global ] [ ... ] top

schedule

Places the policy at the top of the access control list (ACL). The policy at the top of the ACL
has the highest precedence.

Example

The following command:

• Permits any kind of service from any address in the Trust zone to any address in the Untrust zone

• Assigns to the policy an ID value of 30

• Places the policy at the top of the ACL

set policy id 30 top from trust to untrust any any any permit

top-talkers

set policy ... [top-talkers] schedule schedule-name

top-talkers

Marks this policy as a top-talkers candidate.

Example

The following command creates the policy to allow the https traffic from any address at the
untrust zone to web-server (10.10.10.100) at the trust zone and marks this policy as top-talkers
candidate:

Advertising
This manual is related to the following products: