ZyXEL Communications ZyXEL ZyWALL IDP 10 User Manual
Page 8
ZyWALL IDP10 User’s Guide
viii Table of Contents
6.2
mySecurity Zone ............................................................................................................. 6-1
6.3
Signature Categories ...................................................................................................... 6-2
6.4
Configuring Pre-defined Policies................................................................................... 6-13
6.5
Update........................................................................................................................... 6-19
6.6
User-defined Policies .................................................................................................... 6-20
6.7
Registering your ZyWALL ............................................................................................. 6-28
Log and Report................................................................................................................................ IV
Chapter 7 Log and Report ............................................................................................................ 7-1
7.1
Logs................................................................................................................................. 7-1
7.2
Report.............................................................................................................................. 7-2
7.3
Alarm Schedule............................................................................................................... 7-4
Maintenance & CLI ........................................................................................................................... V
Chapter 8 Maintenance................................................................................................................. 8-1
8.1
Maintenance Overview.................................................................................................... 8-1
8.2
Password......................................................................................................................... 8-1
8.3
Time and Date................................................................................................................. 8-2
8.4
Firmware Upload............................................................................................................. 8-6
8.5
Configuration ................................................................................................................. 8-10
8.6
Restart........................................................................................................................... 8-12
Chapter 9 Command Line Interface Overview ........................................................................... 9-1
9.1
Command Syntax Conventions....................................................................................... 9-1
9.2
Login................................................................................................................................ 9-2
9.3
Commands ...................................................................................................................... 9-2
Appendices & Index........................................................................................................................ VI
Appendix A Introduction to Intrusions .......................................................................................A-1
A.1
Introduction to Ports ........................................................................................................A-1
A.2
Introduction to Denial of Service .....................................................................................A-1
A.3
DoS Examples.................................................................................................................A-1
A.4
Scanning .........................................................................................................................A-3
A.5
Malicious Programs.........................................................................................................A-4
A.6
Example Intrusions..........................................................................................................A-4
Appendix B Intrusion Protection.................................................................................................B-1
B.1
Firewalls and Intrusions ..................................................................................................B-1
B.2
Intrusion Detection and Prevention (IDP) .......................................................................B-1
B.3
Detection Methods ..........................................................................................................B-2
Appendix C Index..........................................................................................................................C-1