Figure 6-8 Backdoor/Trojan Signatures - ZyXEL Communications ZYWALL IDP 10 User Manual

Intrusion detection prevention appliance
Hide thumbs Also See for ZYWALL IDP 10:
Table of Contents

Advertisement

ZyWALL IDP 10 User's Guide

Figure 6-8 Backdoor/Trojan Signatures

6.3.9 Access Control
Access control refers to procedures and controls that limit or detect access. Access control is used
typically to control user access to network resources such as servers, directories, and files.
To find a list of all access control related signatures supported by the ZyWALL, do a policy search by
name or policy query by type (Access Control). The following screen shows some of the access
control related signatures supported by the ZyWALL at the time of writing.
6-8
IDP Policies

Advertisement

Table of Contents
loading

Table of Contents