List of tables – ZyXEL Communications ZyXEL ZyWALL IDP 10 User Manual
Page 11
ZyWALL IDP10 User’s Guide
List of Tables
xi
List of Tables
Table 2-1 Web Configurator HOME Screen ........................................................................................................ 2-4
Table 2-2 Screens Summary ................................................................................................................................ 2-5
Table 2-3 Example Configuration Settings .......................................................................................................... 2-6
Table 3-1 General: Device ................................................................................................................................... 3-2
Table 3-2 General: VLAN.................................................................................................................................... 3-3
Table 3-3 General: State....................................................................................................................................... 3-4
Table 4-1 Interface: Link...................................................................................................................................... 4-2
Table 4-2 Interface: Stealth .................................................................................................................................. 4-3
Table 4-3 Interface: Policy Check........................................................................................................................ 4-4
Table 5-1 Remote Management: WWW.............................................................................................................. 5-2
Table 5-2 SNMP Traps......................................................................................................................................... 5-3
Table 5-3 Remote Management: SNMP .............................................................................................................. 5-4
Table 5-4 Remote Management: SSH.................................................................................................................. 5-6
Table 6-1 Policy Severity................................................................................................................................... 6-12
Table 6-2 Policy Actions.................................................................................................................................... 6-13
Table 6-3 Selecting Pre-defined Policies ........................................................................................................... 6-15
Table 6-4 Pre-defined IDP Policies.................................................................................................................... 6-18
Table 6-5 Update Policies .................................................................................................................................. 6-20
Table 6-6 User-defined Policies ......................................................................................................................... 6-21
Table 6-7 Configuring a User-defined IDP Policy ............................................................................................. 6-25
Table 6-8 Registering ZyWALL ........................................................................................................................ 6-29
Table 7-1 View Log.............................................................................................................................................. 7-2
Table 7-2 Report: E-Mail ..................................................................................................................................... 7-3
Table 7-3 Report: syslog ...................................................................................................................................... 7-4
Table 7-4 Alarm ................................................................................................................................................... 7-5
Table 8-1 Maintenance: Password ....................................................................................................................... 8-1
Table 8-2 Default Time Servers ........................................................................................................................... 8-3
Table 8-3 Time and Date...................................................................................................................................... 8-4
Table 8-4 Maintenance: F/W Upload................................................................................................................... 8-7
Table 8-5 Restore Configuration........................................................................................................................ 8-11
Table 9-1 Commands Summary........................................................................................................................... 9-2
Table A-1 Common IP Ports ............................................................................................................................... A-1
Table A-2 Common Malicious Programs............................................................................................................ A-4