beautypg.com

List of tables – ZyXEL Communications ZyXEL ZyWALL IDP 10 User Manual

Page 11

background image

ZyWALL IDP10 User’s Guide

List of Tables

xi

List of Tables

Table 2-1 Web Configurator HOME Screen ........................................................................................................ 2-4

Table 2-2 Screens Summary ................................................................................................................................ 2-5

Table 2-3 Example Configuration Settings .......................................................................................................... 2-6

Table 3-1 General: Device ................................................................................................................................... 3-2

Table 3-2 General: VLAN.................................................................................................................................... 3-3

Table 3-3 General: State....................................................................................................................................... 3-4

Table 4-1 Interface: Link...................................................................................................................................... 4-2

Table 4-2 Interface: Stealth .................................................................................................................................. 4-3

Table 4-3 Interface: Policy Check........................................................................................................................ 4-4

Table 5-1 Remote Management: WWW.............................................................................................................. 5-2

Table 5-2 SNMP Traps......................................................................................................................................... 5-3

Table 5-3 Remote Management: SNMP .............................................................................................................. 5-4

Table 5-4 Remote Management: SSH.................................................................................................................. 5-6

Table 6-1 Policy Severity................................................................................................................................... 6-12

Table 6-2 Policy Actions.................................................................................................................................... 6-13

Table 6-3 Selecting Pre-defined Policies ........................................................................................................... 6-15

Table 6-4 Pre-defined IDP Policies.................................................................................................................... 6-18

Table 6-5 Update Policies .................................................................................................................................. 6-20

Table 6-6 User-defined Policies ......................................................................................................................... 6-21

Table 6-7 Configuring a User-defined IDP Policy ............................................................................................. 6-25

Table 6-8 Registering ZyWALL ........................................................................................................................ 6-29

Table 7-1 View Log.............................................................................................................................................. 7-2

Table 7-2 Report: E-Mail ..................................................................................................................................... 7-3

Table 7-3 Report: syslog ...................................................................................................................................... 7-4

Table 7-4 Alarm ................................................................................................................................................... 7-5

Table 8-1 Maintenance: Password ....................................................................................................................... 8-1

Table 8-2 Default Time Servers ........................................................................................................................... 8-3

Table 8-3 Time and Date...................................................................................................................................... 8-4

Table 8-4 Maintenance: F/W Upload................................................................................................................... 8-7

Table 8-5 Restore Configuration........................................................................................................................ 8-11

Table 9-1 Commands Summary........................................................................................................................... 9-2

Table A-1 Common IP Ports ............................................................................................................................... A-1

Table A-2 Common Malicious Programs............................................................................................................ A-4