27.5 Application Patrol Bandwidth Management Examples .................................................... 384
27.5.3 SIP WAN to Any Bandwidth Management Example .............................................. 386
27.5.4 HTTP Any to WAN Bandwidth Management Example ........................................... 386
27.5.6 FTP LAN to DMZ Bandwidth Management Example ............................................. 387
27.6 Other Applications ........................................................................................................... 388
27.9.2 Application Patrol Policy Edit ................................................................................ 393
Chapter 28
Anti-Virus............................................................................................................................... 403
28.1 Anti-Virus Overview ......................................................................................................... 403
28.3 Anti-Virus Summary ......................................................................................................... 406
28.3.1 Anti-Virus Policy Edit .............................................................................................. 408
28.4 Anti-Virus Setting ............................................................................................................. 410
28.5 Anti-Virus White List Add/Edit .......................................................................................... 412
28.6 Anti-Virus Black List Add/Edit .......................................................................................... 413
28.7 Signature Searching ........................................................................................................ 413
Chapter 29
IDP ......................................................................................................................................... 417
29.1 Introduction to IDP ........................................................................................................... 417
29.1.1 Host Intrusions ....................................................................................................... 417
29.1.2 Network Intrusions ................................................................................................. 417
29.1.3 IDP on the ZyWALL ............................................................................................... 417
ZyWALL USG 300 User's Guide
Table of Contents
21