3 idp signatures, 1 attack types – ZyXEL Communications 5 Series User Manual
Page 257

ZyWALL 5/35/70 Series User’s Guide
Chapter 13 Configuring IDP
257
13.3 IDP Signatures
The rules that define how to identify and respond to intrusions are called “signatures”. Click
SECURITY > IDP > Signatures to see the ZyWALL’s signatures.
13.3.1 Attack Types
Click SECURITY > IDP > Signature. The Attack Type list box displays all intrusion types
supported by the ZyWALL. Other covers all intrusion types not covered by other types listed.
From, To
Select the directions of travel of packets that you want to check. Select or clear a
row or column’s first check box (with the interface label) to select or clear the
interface’s whole row or column.
You could for example have the ZyWALL check packets traveling between the
LAN and the WAN interfaces (From WAN1 to LAN, From WAN2 to LAN, From
LAN To WAN1, and From LAN To WAN2).
Note: Depending on your network topology and traffic load,
selecting every packet direction may affect the ZyWALL’s
performance.
From LAN To LAN means packets traveling from a computer on one LAN
subnet to a computer on another LAN subnet via the LAN interface of the
ZyWALL. The ZyWALL does not check packets traveling from a LAN computer
to another LAN computer on the same subnet.
From WAN1 To WAN1 means packets that come in through the WAN 1
interface and the ZyWALL routes back out through the WAN 1 interface.
From VPN means traffic that came into the ZyWALL through a VPN tunnel and
is going to the selected “to” interface. For example, From VPN To LAN specifies
the VPN traffic that is going to the LAN or terminating at the ZyWALL’s LAN
interface. The ZyWALL checks the traffic after decrypting it.
To VPN is traffic that comes in through the selected “from” interface and goes
out through any VPN tunnel. For example, From LAN To VPN specifies the
traffic that is coming from the LAN and going out through a VPN tunnel. The
ZyWALL checks the traffic before encrypting it.
From VPN To VPN means traffic that comes in through a VPN tunnel and goes
out through (another) VPN tunnel. This is the case when the ZyWALL is the hub
in a hub-and-spoke VPN. The ZyWALL checks the traffic after decrypting it
(before encrypting it again).
Note: The VPN connection directions apply to the traffic going to
or from the ZyWALL’s VPN tunnels. They do not apply to
other VPN traffic for which the ZyWALL is not one of the
gateways (VPN pass-through traffic).
Apply
Click this button to save your changes back to the ZyWALL.
Reset
Click this button to begin configuring this screen afresh.
Table 74 SECURITY > IDP > General Setup
LABEL
DESCRIPTION