beautypg.com

ZyXEL Communications 70 Series User Manual

Page 15

background image

ZyWALL 5/35/70 Series User’s Guide

15

Table of Contents

11.3.3.2 Service .........................................................................................217
11.3.3.3 Source Address ...........................................................................217
11.3.3.4 Destination Address ....................................................................217

11.4 Connection Direction Examples .....................................................................217

11.4.1 LAN To WAN Rules ...............................................................................217
11.4.2 WAN To LAN Rules ...............................................................................218

11.5 Alerts ..............................................................................................................218
11.6 Firewall Default Rule (Router Mode) ..............................................................219
11.7 Firewall Default Rule (Bridge Mode) ............................................................220
11.8 Firewall Rule Summary .................................................................................222

11.8.1 Firewall Edit Rule ..............................................................................223

11.9 Anti-Probing ................................................................................................226
11.10 Firewall Threshold .....................................................................................227

11.10.1 Threshold Values ................................................................................227
11.10.2 Half-Open Sessions ............................................................................227

11.10.2.1 TCP Maximum Incomplete and Blocking Time ..........................228

11.11 Service .........................................................................................................230

11.11.1 Firewall Edit Custom Service ..............................................................232
11.11.2 Predefined Services ............................................................................233

11.12 Example Firewall Rule ..................................................................................235

Chapter 12
Intrusion Detection and Prevention (IDP) ..........................................................
240

12.1 Introduction to IDP .......................................................................................240

12.1.1 Firewalls and Intrusions ........................................................................240
12.1.2 IDS and IDP .........................................................................................241
12.1.3 Host IDP ..............................................................................................241
12.1.4 Network IDP .........................................................................................241
12.1.5 Example Intrusions ...............................................................................242

12.1.5.1 SQL Slammer Worm ...................................................................242
12.1.5.2 Blaster W32.Worm ......................................................................242
12.1.5.3 Nimda ..........................................................................................242
12.1.5.4 MyDoom ......................................................................................243

12.1.6 ZyWALL IDP .........................................................................................243

Chapter 13
Configuring IDP....................................................................................................
244

13.1 Overview ........................................................................................................244

13.1.1 Interfaces ..............................................................................................244

13.2 General Setup ................................................................................................245
13.3 IDP Signatures ...............................................................................................246

13.3.1 Attack Types .........................................................................................246
13.3.2 Intrusion Severity ..................................................................................248

This manual is related to the following products: