
Chapter 21 IDP Commands
ZyWALL (ZLD) CLI Reference Guide
184
This table shows the IDP signature, anomaly, and system-protect activation commands.
21.2.1.1 Activate/Deactivate IDP Example
This example shows how to activate and deactivate signature-based IDP on the ZyWALL.
21.3 IDP Profile Commands
21.3.1 Global Profile Commands
Use these commands to rename or delete existing profiles and show IDP base profiles.
Table 95 IDP Activation
COMMAND DESCRIPTION
[no] idp
{signature | anomaly |
system-protect}
activate
Enables IDP signatures, anomaly detection, and/or system-protect. IDP signatures
use requires IDP service registration. If you don’t have a standard license, you can
register for a once-off trial one. Anomaly detection and the self-protect feature do
not require registration. The
no command disables the specified service.
idp system-protect
deactivate
Disables system-protect.
show idp
{signature | anomaly |
system-protect}
activation
Displays IDP signature, anomaly detection, or system protect service status.
idp reload Recovers the IDP signatures. You should only need to do this if instructed to do so
by a support technician.
Router# configure terminal
Router(config)# idp signature activate
Router(config)# show idp signature activation
idp signature activation: yes
Router(config)# no idp signature activate
Router(config)# show idp signature activation
idp signature activation: no
Table 96 Global Profile Commands
COMMAND DESCRIPTION
idp rename {signature |
anomaly} profile1 profile2
Rename an IDP signature or anomaly profile originally named profile1
to profile2.
no idp {signature | anomaly}
profile3
Delete an IDP signature or system protect profile named profile3.
show idp signature profile
signature all details
Lists the settings for all of the specified profile’s signatures. Use |more to
display the settings page by page.
show idp signature all
details
Lists the settings for all of the signatures. Use |more to display the
settings page by page.
show idp {signature |
anomaly} base profile
Displays all IDP signature or system protect base profiles.
Kommentare zu diesen Handbüchern