beautypg.com

List of figures – ZyXEL Communications ZyXEL ZyWALL IDP 10 User Manual

Page 9

background image

ZyWALL IDP10 User’s Guide

List of Figures

ix

List of Figures

Figure 1-1 ZyWALL ............................................................................................................................................ 1-1

Figure 1-2 Installation Example 1........................................................................................................................ 1-3

Figure 1-3 Installation Example 2........................................................................................................................ 1-4

Figure 1-4 Installation Example 3........................................................................................................................ 1-5

Figure 1-5 Installation Example 4........................................................................................................................ 1-6

Figure 2-1 Default Web Configurator IP Address ................................................................................................ 2-1

Figure 2-2 Login Screen ...................................................................................................................................... 2-2

Figure 2-3 Change Password Screen ................................................................................................................... 2-2

Figure 2-4 Web Configurator HOME Screen....................................................................................................... 2-3

Figure 3-1 General: Device.................................................................................................................................. 3-1

Figure 3-2 General: VLAN .................................................................................................................................. 3-3

Figure 3-3 General: State ..................................................................................................................................... 3-4

Figure 4-1 Interface: Link.................................................................................................................................... 4-1

Figure 4-2 Interface: Stealth ................................................................................................................................ 4-2

Figure 4-3 ZyWALL Policy Check ...................................................................................................................... 4-3

Figure 4-4 Interface: Policy Check ...................................................................................................................... 4-4

Figure 5-1 Remote Management: WWW ............................................................................................................ 5-1

Figure 5-2 SNMP Management Model................................................................................................................ 5-2

Figure 5-3 Remote Management: SNMP............................................................................................................. 5-4

Figure 5-4 SSH Communication Example........................................................................................................... 5-5

Figure 5-5 How SSH Works ................................................................................................................................ 5-5

Figure 5-6 Remote Management: SSH ................................................................................................................ 5-6

Figure 5-7 PuTTY settings................................................................................................................................... 5-7

Figure 5-8 PuTTY Security Alert......................................................................................................................... 5-7

Figure 5-9 ZyWALL Command Interface Login Screen ..................................................................................... 5-8

Figure 6-1 P2P Signatures.................................................................................................................................... 6-2

Figure 6-2 IM (Chat) Signatures.......................................................................................................................... 6-3

Figure 6-3 Spam Signatures................................................................................................................................. 6-4

Figure 6-4 DoS/DDoS Signatures........................................................................................................................ 6-4

Figure 6-5 Scan Signatures .................................................................................................................................. 6-5

Figure 6-6 Buffer Overflow Signatures ............................................................................................................... 6-6

Figure 6-7 Worm/Virus Signatures ...................................................................................................................... 6-7

Figure 6-8 Backdoor/Trojan Signatures............................................................................................................... 6-8

Figure 6-9 Access Control Signatures.................................................................................................................. 6-9

Figure 6-10 Web Attack Signatures ................................................................................................................... 6-10