Table of Contents
Part III: Security.................................................................................... 241
Firewall................................................................................................................................... 243
11.1 Firewall Overview ............................................................................................................ 243
11.6 Asymmetrical Routes ....................................................................................................... 254
11.9 Firewall Rule Summary ................................................................................................... 259
11.11.1 Threshold Values .................................................................................................. 266
11.12 Threshold Screen ........................................................................................................... 266
11.13 Service .......................................................................................................................... 268
Chapter 12
12.1.2 IDS and IDP .......................................................................................................... 276
12.1.3 Host IDP ................................................................................................................ 276
12.1.4 Network IDP .......................................................................................................... 276
12.1.5 Example Intrusions ................................................................................................. 276
12.1.6 ZyWALL IDP .......................................................................................................... 278
Chapter 13
Configuring IDP..................................................................................................................... 279
13.1 Overview .......................................................................................................................... 279
13.1.1 Interfaces ............................................................................................................... 279
13.2 General Setup ................................................................................................................. 280
13.3 IDP Signatures ................................................................................................................ 282
13.3.1 Attack Types ........................................................................................................... 282
16
.............................................................................................. 261
............................................................................................................... 264
..................................................................................................... 265
...................................................................................................... 275
ZyWALL 5/35/70 Series User's Guide