For maximum protection, you must keep the pattern file
12.2.1 Computer Virus Infection and Prevention
The follow describes a simplistic life cycle of a computer virus.
1A computer gets a copy of a virus from an unknown source (such as the Internet,
2The virus spreads to other files and programs on the computer.
3The infected files are unintentionally sent to another computer thus starting the spread of the virus.
4Once the virus is spread through the network, the number of infected networked computers can grow exponentially.
5To prevent the spread of viruses, you need to install
12.3Introduction to the ZyXEL Device Anti-virus Packet Scan
The ZyXEL Device has an integrated
Figure 107 ZyXEL Device
Your ZyXEL Device is able to scan the following network traffic types for viruses:
•HTTP (Hyper Text Transfer Protocol)
This is the most common protocol used on the Internet. HTTP is the primary protocol used for web sites and web browsers.
•Mail messages (SMPT, POP3)
•FTP (File Transfer Protocol)
204 | Chapter 12 |