List of figures – ZyXEL Communications ZyXEL ZyWALL IDP 10 User Manual
Page 9
![background image](/manuals/229687/9/background.png)
ZyWALL IDP10 User’s Guide
List of Figures
ix
List of Figures
Figure 1-1 ZyWALL ............................................................................................................................................ 1-1
Figure 1-2 Installation Example 1........................................................................................................................ 1-3
Figure 1-3 Installation Example 2........................................................................................................................ 1-4
Figure 1-4 Installation Example 3........................................................................................................................ 1-5
Figure 1-5 Installation Example 4........................................................................................................................ 1-6
Figure 2-1 Default Web Configurator IP Address ................................................................................................ 2-1
Figure 2-2 Login Screen ...................................................................................................................................... 2-2
Figure 2-3 Change Password Screen ................................................................................................................... 2-2
Figure 2-4 Web Configurator HOME Screen....................................................................................................... 2-3
Figure 3-1 General: Device.................................................................................................................................. 3-1
Figure 3-2 General: VLAN .................................................................................................................................. 3-3
Figure 3-3 General: State ..................................................................................................................................... 3-4
Figure 4-1 Interface: Link.................................................................................................................................... 4-1
Figure 4-2 Interface: Stealth ................................................................................................................................ 4-2
Figure 4-3 ZyWALL Policy Check ...................................................................................................................... 4-3
Figure 4-4 Interface: Policy Check ...................................................................................................................... 4-4
Figure 5-1 Remote Management: WWW ............................................................................................................ 5-1
Figure 5-2 SNMP Management Model................................................................................................................ 5-2
Figure 5-3 Remote Management: SNMP............................................................................................................. 5-4
Figure 5-4 SSH Communication Example........................................................................................................... 5-5
Figure 5-5 How SSH Works ................................................................................................................................ 5-5
Figure 5-6 Remote Management: SSH ................................................................................................................ 5-6
Figure 5-7 PuTTY settings................................................................................................................................... 5-7
Figure 5-8 PuTTY Security Alert......................................................................................................................... 5-7
Figure 5-9 ZyWALL Command Interface Login Screen ..................................................................................... 5-8
Figure 6-1 P2P Signatures.................................................................................................................................... 6-2
Figure 6-2 IM (Chat) Signatures.......................................................................................................................... 6-3
Figure 6-3 Spam Signatures................................................................................................................................. 6-4
Figure 6-4 DoS/DDoS Signatures........................................................................................................................ 6-4
Figure 6-5 Scan Signatures .................................................................................................................................. 6-5
Figure 6-6 Buffer Overflow Signatures ............................................................................................................... 6-6
Figure 6-7 Worm/Virus Signatures ...................................................................................................................... 6-7
Figure 6-8 Backdoor/Trojan Signatures............................................................................................................... 6-8
Figure 6-9 Access Control Signatures.................................................................................................................. 6-9
Figure 6-10 Web Attack Signatures ................................................................................................................... 6-10