ZyXEL Communications Unified Security Gateway ZyWALL 300 User Manual page 21

Unified security gateway
Hide thumbs Also See for Unified Security Gateway ZyWALL 300:
Table of Contents

Advertisement

27.4.5 Bandwidth Management Behavior ......................................................................... 382
27.5 Application Patrol Bandwidth Management Examples .................................................... 384
27.5.1 Setting the Interface's Bandwidth ........................................................................... 385
27.5.2 SIP Any to WAN Bandwidth Management Example .............................................. 385
27.5.3 SIP WAN to Any Bandwidth Management Example .............................................. 386
27.5.4 HTTP Any to WAN Bandwidth Management Example ........................................... 386
27.5.5 FTP WAN to DMZ Bandwidth Management Example ............................................ 386
27.5.6 FTP LAN to DMZ Bandwidth Management Example ............................................. 387
27.6 Other Applications ........................................................................................................... 388
27.7 Application Patrol Screens .............................................................................................. 388
27.8 Application Patrol General ............................................................................................... 388
27.9 Application Patrol Applications ........................................................................................ 390
27.9.1 Application Patrol Edit ............................................................................................ 391
27.9.2 Application Patrol Policy Edit ................................................................................ 393
27.10 Other Protocol Screen .................................................................................................. 395
27.10.1 Other Configuration Add/Edit .............................................................................. 397
27.11 Application Patrol Statistics ............................................................................................ 399
27.11.1 Application Patrol Statistics: General Setup ......................................................... 399
27.11.2 Application Patrol Statistics: Bandwidth Statistics ................................................ 400
27.11.3 Application Patrol Statistics: Protocol Statistics ................................................... 400
Chapter 28
Anti-Virus............................................................................................................................... 403
28.1 Anti-Virus Overview ......................................................................................................... 403
28.1.1 Types of Computer Viruses ................................................................................... 403
28.1.2 Computer Virus Infection and Prevention .............................................................. 403
28.1.3 Types of Anti-Virus Scanner .................................................................................. 404
28.2 Introduction to the ZyWALL Anti-Virus Scanner .............................................................. 404
28.2.1 How the ZyWALL Anti-Virus Scanner Works ........................................................ 404
28.2.2 Notes About the ZyWALL Anti-Virus ...................................................................... 405
28.3 Anti-Virus Summary ......................................................................................................... 406
28.3.1 Anti-Virus Policy Edit .............................................................................................. 408
28.4 Anti-Virus Setting ............................................................................................................. 410
28.5 Anti-Virus White List Add/Edit .......................................................................................... 412
28.6 Anti-Virus Black List Add/Edit .......................................................................................... 413
28.7 Signature Searching ........................................................................................................ 413
Chapter 29
IDP ......................................................................................................................................... 417
29.1 Introduction to IDP ........................................................................................................... 417
29.1.1 Host Intrusions ....................................................................................................... 417
29.1.2 Network Intrusions ................................................................................................. 417
29.1.3 IDP on the ZyWALL ............................................................................................... 417
ZyWALL USG 300 User's Guide
Table of Contents
21

Advertisement

Table of Contents
loading

Table of Contents