TMS zl Management and Configuration Guide ST.1.0.090213

A-28
Threat Management Services zl Module Command-Line Reference
Global Configuration Context
To configure a unicast access policy (and optionally specify a user group),
enter the following command:
Syntax: [no] access-policy [group <name>] <source zone> <destination zone>
<action> {<protocol> | [service <service>]} <source address> [source port] <destina-
tion address> [<destination port>] [extended options]
Replace <name> with the name of the user group you are creating.
The available promontories and options for the command are shown in
Table A-6. At the end of the access-policy command, you can append various
optional keywords, which are listed in Table A-6 as extended options.
To create a multicast access policy, enter the following command:
Syntax: [no] access-policy multicast <source zone> <destination zone> <action>
< protocol | service <service object> > <source address> [source port] <destination
address> [destination port] [extended options]
The available promontories and options for the command are shown in
Table A-6. At the end of the access-policy command, you can append various
optional keywords, which are listed in Table A-6 as extended options.
Table A-6. Access-policy Command Options
Parameter Options
source zone internal
external
•dmz
zone1
zone2
zone3
zone4
zone5
zone6
self