10011 \nUsage: %1!s! [subnet] [subnet] ...\n\nRemarks: Creates an Add list of subnets.\n\nExample:\n\n add 128.238.220 157.59.244.1 \n\n\n
10110 Creates a Delete list of subnets. \n
10111 \nUsage: %1!s! [subnet] [[subnet]...] \n\nRemarks: Creates a delete list of subnets. \n\nExample: \n\n\n delete 128.238.220 157.59.244.1 \n\n
10210 Displays the selective binding settings in the registry. \n
10211 \nUsage: %1!s! \n\nRemarks: Displays the selective binding settings.\n\n
10310 Resets the selective binding settings to 'none' (listen on all interfaces). \n
10311 \nUsage: %1!s! \n\nRemarks: Reset the selective binding settings to 'none' (listen on all interfaces). \n\n
10410 Displays the selective binding state for each subnet on the system.
10411 \nUsage: %1!s! \n\nRemarks: Displays the selective binding state for each subnet on the system. \n\n
10510 Adds configuration entry to a table. \n
10511 Deletes configuration entry from a table. \n
10512 Displays information. \n
10513 Adds an RPC firewall filter. \n
10514 \nUsage: %1!s! \n\nRemarks: Adds an RPC firewall filter. \n A rule and one or more conditions must be added \n before adding a filter. \n\n\nExample: \n\n add filter \n\n\n
10515 Deletes RPC firewall filter(s). \n
10516 \nUsage: %1!s! [filterkey=]<string> \n\nParameters: \n\n Tag Value \n filterkey - Uuid of the RPC firewall filter to delete. \n Use all to delete all RPC firewall filters. \nRemarks: Deletes RPC firewall filter(s). \n\nExamples: \n\n delete filter filterkey=11111111-1111-1111-1111-111111111111 \n delete filter filterkey=all \n\n
10517 Lists all RPC firewall filters. \n
10518 \nUsage: %1!s! \n\nRemarks: Lists all RPC firewall filters. \n\nExample: \n\n show filter \n\n\n
10519 Adds a condition to an existing RPC firewall filter rule. \n
10520 \nUsage: %1!s! [field=]<string> [matchtype=]<string> [data=]<string> \n\nParameters: \n\n Tag Value \n field - One of the following values: \n For layer = um \n if_uuid if_version if_flag dcom_app_id image_name \n protocol auth_type auth_level sec_encrypt_alg \n sec_key_size remote_user_token local_addr_v4 \n local_addr_v6 remote_addr_v4 remote_addr_v6 \n local_port pipe \n For layer = epmap \n if_uuid if_version protocol auth_type auth_level \n sec_encrypt_alg sec_key_size remote_user_token \n local_addr_v4 local_addr_v6 remote_addr_v4 \n remote_addr_v6 local_port pipe \n For layer = ep_add \n process_with_if_uuid protocol ep_value ep_flags \n For layer = proxy_conn \n server_name server_port proxy_auth_type \n client_token client_cert_key_name client_cert_oid \n For layer = proxy_if \n if_uuid if_version server_name server_port \n proxy_auth_type client_token client_cert_key_length \n client_cert_oid \n matchtype - One of the following values: \n equal \n greater \n less \n greater_or_equal \n less_or_equal \n range \n all_set \n any_set \n none_set \n data - Value associated with the field paramter. \n\nRemarks: Adds a condition to the RPC firewall rule. \n\nExamples: \n\n add condition field=if_uuid matchtype=equal \n data=11111111-1111-1111-1111-111111111111 \n add condition field=protocol matchtype=equal data=ncacn_ip_tcp \n\n
10521 Adds an RPC firewall filter rule. \n
10522 \nUsage: %1!s! [layer=]<string> [actiontype=]<string> [[filterkey=]<string>] \n [[persistence=]volatile] [[audit=]enable] \n\nParameters: \n\n Tag Value \n layer - One of the following values: \n um \n epmap \n ep_add \n proxy_conn \n proxy_if \n actiontype - One of the following values: \n block \n permit \n continue \n persistence - Filter will be persistent. \n This is the default. \n filterkey - Uuid to uniquely identify the RPC firewall filter. \n audit - Enable auditing for this filter \n Only permit action type is allowed for audit rules. \n Audit rules are not allowed at ep_add layer. \n\nRemarks: Adds an RPC firewall filter rule. \n\nExamples: \n\n add rule layer=um actiontype=block \n add rule layer=epmap actiontype=permit \n filterkey=11111111-1111-1111-1111-111111111111 \n\n