Intrusion Detection And Prevention (Idp); Introduction To Idp; Firewalls And Intrusions; Figure 106 Network Intrusions - ZyXEL Communications ZYWALL P1 User Manual

Internet security appliance
Hide thumbs Also See for ZYWALL P1:
Table of Contents

Advertisement

C
H A P T E R
This chapter introduces some background information on IDP. Skip to the next chapter to see
how to configure IDP on your ZyWALL.

10.1 Introduction to IDP

An IDP system can detect malicious or suspicious packets and respond instantaneously. It can
detect anomalies based on violations of protocol standards (RFCs – Requests for Comments)
or traffic flows and abnormal flows such as port scans.
Figure 106 on page 171
web, FTP and mail servers, a firewall and/or NAT router connected to a broadband modem
(M) for Internet access.

Figure 106 Network Intrusions

10.2 Firewalls and Intrusions

Firewalls are designed to block clearly suspicious traffic and forward other traffic through.
Many exploits take advantage of weaknesses in the protocols that are allowed through the
firewall, so that once an inside server has been compromised it can be used as a backdoor to
launch attacks on other servers.
Firewalls are usually deployed at the network edge. However, many attacks (inadvertently) are
launched from within an organization. Virtual private networks (VPN), removable storage
devices and wireless networks may all provide access to the internal network without going
through the firewall.
ZyWALL P1 User's Guide
Intrusion Detection and
Prevention (IDP)
represents a typical business network consisting of a LAN containing
10
171

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents