beautypg.com

ZyXEL Communications ZyXEL ZyWALL IDP 10 User Manual

Page 8

background image

ZyWALL IDP10 User’s Guide

viii Table of Contents

6.2

mySecurity Zone ............................................................................................................. 6-1

6.3

Signature Categories ...................................................................................................... 6-2

6.4

Configuring Pre-defined Policies................................................................................... 6-13

6.5

Update........................................................................................................................... 6-19

6.6

User-defined Policies .................................................................................................... 6-20

6.7

Registering your ZyWALL ............................................................................................. 6-28

Log and Report................................................................................................................................ IV

Chapter 7 Log and Report ............................................................................................................ 7-1

7.1

Logs................................................................................................................................. 7-1

7.2

Report.............................................................................................................................. 7-2

7.3

Alarm Schedule............................................................................................................... 7-4

Maintenance & CLI ........................................................................................................................... V

Chapter 8 Maintenance................................................................................................................. 8-1

8.1

Maintenance Overview.................................................................................................... 8-1

8.2

Password......................................................................................................................... 8-1

8.3

Time and Date................................................................................................................. 8-2

8.4

Firmware Upload............................................................................................................. 8-6

8.5

Configuration ................................................................................................................. 8-10

8.6

Restart........................................................................................................................... 8-12

Chapter 9 Command Line Interface Overview ........................................................................... 9-1

9.1

Command Syntax Conventions....................................................................................... 9-1

9.2

Login................................................................................................................................ 9-2

9.3

Commands ...................................................................................................................... 9-2

Appendices & Index........................................................................................................................ VI

Appendix A Introduction to Intrusions .......................................................................................A-1

A.1

Introduction to Ports ........................................................................................................A-1

A.2

Introduction to Denial of Service .....................................................................................A-1

A.3

DoS Examples.................................................................................................................A-1

A.4

Scanning .........................................................................................................................A-3

A.5

Malicious Programs.........................................................................................................A-4

A.6

Example Intrusions..........................................................................................................A-4

Appendix B Intrusion Protection.................................................................................................B-1

B.1

Firewalls and Intrusions ..................................................................................................B-1

B.2

Intrusion Detection and Prevention (IDP) .......................................................................B-1

B.3

Detection Methods ..........................................................................................................B-2

Appendix C Index..........................................................................................................................C-1