
Enabling control plane policing..........................................................................................................................................................................................................................36
Viewing firewall information.................................................................................................................................................................................................................................38
Showing firewall instance information.................................................................................................................................................................................................38
Showing firewall configuration on interfaces................................................................................................................................................................................... 39
Showing firewall configuration................................................................................................................................................................................................................. 39
Global Firewall Commands............................................................................................................................................................................................................................................. 41
clear firewall...................................................................................................................................................................................................................................................................42
security firewall............................................................................................................................................................................................................................................................43
show security firewall <interface>......................................................................................................................................................................................................................44
Firewall Commands........................................................................................................................................................................................................................................................... 45
security firewall all-ping <state>......................................................................................................................................................................................................................... 46
security firewall broadcast-ping <state>.........................................................................................................................................................................................................47
security firewall config-trap <state>................................................................................................................................................................................................................. 49
security firewall global-state-policy <protocol>........................................................................................................................................................................................50
security firewall name <name>........................................................................................................................................................................................................................... 52
security firewall name <name> default-action <action>........................................................................................................................................................................53
security firewall name <name> default-log <action>.............................................................................................................................................................................. 54
security firewall name <name> description <description>...................................................................................................................................................................55
security firewall name <name> rule <rule-number>................................................................................................................................................................................56
security firewall name <name> rule <rule-number> action <action>..............................................................................................................................................57
security firewall name <name> rule <rule-number> description <description>....................................................................................................................... 58
security firewall name <name> rule <rule-number> destination <destination>........................................................................................................................59
security firewall name <name> rule <rule-number> disable................................................................................................................................................................ 61
security firewall name <name> rule <rule-number> dscp <value>..................................................................................................................................................62
security firewall name <name> rule <rule-number> ethertype <type>..........................................................................................................................................63
security firewall name <name> rule <rule-number> fragment..........................................................................................................................................................64
security firewall name <name> rule <rule-number> icmp................................................................................................................................................................... 65
security firewall name <name> rule <rule-number> icmpv6..............................................................................................................................................................67
security firewall name <name> rule <rule-number> ipv6-route type <number>.................................................................................................................... 69
security firewall name <name> rule <rule-number> log........................................................................................................................................................................70
security firewall name <name> rule <rule-number> mark <action>..................................................................................................................................................71
security firewall name <name> rule <rule-number> pcp <number>...............................................................................................................................................73
security firewall name <name> rule <rule-number> police <limiting-method>........................................................................................................................74
security firewall name <name> rule <rule-number> protocol.............................................................................................................................................................76
security firewall name <name> rule <rule-number> source <source>........................................................................................................................................... 77
security firewall name <name> rule <rule-number> state <state>....................................................................................................................................................79
security firewall name <name> rule <rule-number> tcp flags <flags>.......................................................................................................................................... 80
security firewall session-log <protocol>..........................................................................................................................................................................................................81
security firewall tcp-strict.......................................................................................................................................................................................................................................83
interfaces dataplane <interface> firewall local <ruleset> ......................................................................................................................................................................84
interfaces loopback <interface> firewall local <ruleset>........................................................................................................................................................................ 85
Related commands.................................................................................................................................................................................................................................................. 86
Zone-Based Firewall Commands..............................................................................................................................................................................................................................87
clear zone-policy........................................................................................................................................................................................................................................................88
show zone-policy...................................................................................................................................................................................................................................................... 89
security zone-policy zone <zone>....................................................................................................................................................................................................................90
security zone-policy zone <zone> default-action <action>.................................................................................................................................................................. 91
security zone-policy zone <zone> description <description>............................................................................................................................................................92
security zone-policy zone <from-zone> to <to-zone>..........................................................................................................................................................................93
Brocade 5600 vRouter Firewall Configuration Guide
4 53-1004253-01