Table of Contents
9.1 Firewall Overview ............................................................................................................. 141
9.5 Firewall Rules Example ..................................................................................................... 148
9.6 Asymmetrical Routes ......................................................................................................... 150
9.9 Firewall Rule Summary .................................................................................................... 154
9.11.1 Threshold Values .................................................................................................... 161
9.12 Threshold Screen ............................................................................................................ 161
9.13 Service ............................................................................................................................ 163
Chapter 10
10.3 IDS and IDP .................................................................................................................... 172
10.4 Host IDP ......................................................................................................................... 172
10.5 Network IDP ................................................................................................................... 172
10.6 Example Intrusions .......................................................................................................... 172
10.6.1 SQL Slammer Worm .............................................................................................. 173
10.6.2 Blaster W32.Worm ................................................................................................. 173
10.6.3 Nimda ..................................................................................................................... 173
10.6.4 MyDoom ................................................................................................................. 173
10.7 ZyWALL IDP .................................................................................................................... 174
Configuring IDP..................................................................................................................... 175
11.1 Overview .......................................................................................................................... 175
11.2 General Setup .................................................................................................................. 175
11.3 IDP Signatures ................................................................................................................. 177
11.3.1 Attack Types ........................................................................................................... 177
11.3.2 Intrusion Severity .................................................................................................... 178
14
................................................................................................ 156
................................................................................................................. 159
....................................................................................................... 160
........................................................................................................ 171
ZyWALL P1 User's Guide