ZyXEL Communications ZyXEL ZyWALL IDP 10 User Manual
Page 110
![background image](/manuals/229687/110/background.png)
ZyWALL IDP10 User’s Guide
C-2
Index
IGMP Header .............................................6-28
Incoming.................................. 6-18, 6-24, 6-27
Inline..............................1-2, 2-4, 2-5, 3-4, 6-18
Internet Control Message Protocol (ICMP) . A-3
Intrusion Detection & Prevention (IDP .........1-2
Intrusions
Firewalls .................................................. B-1
Host ......................................................... B-1
IDP .......................................................... B-1
Introduction.............................................. A-1
Network ................................................... B-1
IP Ports........................................................ A-1
IP Spoofing.................................................. A-3
LAND........................................................... A-2
Local Upgrade..............................................8-7
Log Facility ...................................................7-4
Login.............................................................9-2
LOGS ...........................................................7-1
Macro Virus ................................................. A-4
Mail Server ............................................7-3, 7-5
Malicious Programs..................................... A-4
Management Information Base (MIB) ..........5-3
Matching Depth .................................6-29, 6-30
Matching Offset .................................6-29, 6-30
misuse ..........................................................6-1
Monitor ..........................1-2, 2-4, 2-5, 3-4, 6-18
MyDoom...............................................A-5, B-1
mySecurity Zone ...................................6-1, 6-2
Navigation Panel ..........................................2-4
Nimda ...................................................A-5, B-1
Nmap.................................................... A-4, 6-6
NTP Time Servers........................................8-2
OSI (Open System Interconnection .............6-1
OSI (Open System Interconnection) ..........6-22
Outgoing.................................. 6-18, 6-24, 6-27
Packet Content..................................6-29, 6-30
password.......... 2-1, 2-2, 2-4, 2-5, 8-1, 8-2, 9-2
Password......................................................8-1
Forget .......................................................8-1
Pattern Matching ..........................................1-2
Ping of Death............................................... A-1
Policy Actions ............................................ 6-15
Types..................................................... 6-15
Policy check..................................................4-3
Policy Check.................................................2-5
Policy Direction.............................................4-3
Policy Query .............................................. 6-17
Policy Search............................................. 6-17
Policy Severity ........................................... 6-14
Levels .................................................... 6-14
POP3 ........................................................... A-1
Porn .................................................. 6-12, 6-13
port scans ............................................. 1-1, 1-2
Pre-defined ...................................................2-5
Modify .................................................... 6-20
Update ................................................... 6-21
Protocol Anomaly .........................................1-2
PuTTY .................................................. 5-6, 5-7
Quick Start Guide .........................................2-1
Recipient(s) .......................................... 7-3, 7-5
Registering ....................................... 6-30, 6-31
Registration ..................................................2-5
Registration Status .................................... 6-31
Remote management...................................5-1
SNMP .......................................................5-2
SSH ..........................................................5-4
WWW .......................................................5-1
Remote Upgrade ..........................................8-8
REPORT........................................ 7-1, 7-2, 7-4
Report Schedule................................... 7-2, 7-3
Restart ................................................ 8-12, 9-4
Restore .......................................................8-11
Sasser ....................................................... 6-18
Scanning...................................................... A-3