Table of Contents
27.5.1 Setting the Interface’s Bandwidth ...........................................................................
385
27.5.2 SIP Any to WAN Bandwidth Management Example ..............................................
27.5.3 SIP WAN to Any Bandwidth Management Example ..............................................
386
27.5.4 HTTP Any to WAN Bandwidth Management Example ...........................................
27.5.5 FTP WAN to DMZ Bandwidth Management Example ............................................
27.5.6 FTP LAN to DMZ Bandwidth Management Example .............................................
387
27.6
Other Applications ...........................................................................................................
388
27.7
Application Patrol Screens ..............................................................................................
27.8
Application Patrol General ...............................................................................................
27.9
Application Patrol Applications ........................................................................................
390
27.9.1 Application Patrol Edit ............................................................................................
391
27.9.2 Application Patrol Policy Edit ................................................................................
393
27.10 Other Protocol Screen ..................................................................................................
395
27.10.1 Other Configuration Add/Edit ..............................................................................
397
27.11 Application Patrol Statistics ............................................................................................
399
27.11.1 Application Patrol Statistics: General Setup .........................................................
27.11.2 Application Patrol Statistics: Bandwidth Statistics ................................................
400
27.11.3 Application Patrol Statistics: Protocol Statistics ...................................................
Chapter 28
Anti-Virus...............................................................................................................................
403
28.1
Anti-Virus Overview .........................................................................................................
28.1.1 Types of Computer Viruses ...................................................................................
28.1.2 Computer Virus Infection and Prevention ..............................................................
28.1.3 Types of Anti-Virus Scanner ..................................................................................
404
28.2
Introduction to the ZyWALL Anti-Virus Scanner ..............................................................
28.2.1 How the ZyWALL Anti-Virus Scanner Works ........................................................
28.2.2 Notes About the ZyWALL Anti-Virus ......................................................................
405
28.3
Anti-Virus Summary .........................................................................................................
406
28.3.1 Anti-Virus Policy Edit ..............................................................................................
408
28.4
Anti-Virus Setting .............................................................................................................
410
28.5
Anti-Virus White List Add/Edit ..........................................................................................
412
28.6
Anti-Virus Black List Add/Edit ..........................................................................................
413
28.7
Signature Searching ........................................................................................................
Chapter 29
IDP.........................................................................................................................................
417
29.1
Introduction to IDP ...........................................................................................................
29.1.1 Host Intrusions .......................................................................................................
29.1.2 Network Intrusions .................................................................................................
29.1.3 IDP on the ZyWALL ...............................................................................................
29.1.4 Signatures ..............................................................................................................
418
29.2
Traffic Directions and Profiles ..........................................................................................
ZyWALL USG 1000 User’s Guide
21