Table of Contents

27.5.1 Setting the Interface’s Bandwidth ...........................................................................

385

27.5.2 SIP Any to WAN Bandwidth Management Example ..............................................

385

27.5.3 SIP WAN to Any Bandwidth Management Example ..............................................

386

27.5.4 HTTP Any to WAN Bandwidth Management Example ...........................................

386

27.5.5 FTP WAN to DMZ Bandwidth Management Example ............................................

386

27.5.6 FTP LAN to DMZ Bandwidth Management Example .............................................

387

27.6

Other Applications ...........................................................................................................

388

27.7

Application Patrol Screens ..............................................................................................

388

27.8

Application Patrol General ...............................................................................................

388

27.9

Application Patrol Applications ........................................................................................

390

27.9.1 Application Patrol Edit ............................................................................................

391

27.9.2 Application Patrol Policy Edit ................................................................................

393

27.10 Other Protocol Screen ..................................................................................................

395

27.10.1 Other Configuration Add/Edit ..............................................................................

397

27.11 Application Patrol Statistics ............................................................................................

399

27.11.1 Application Patrol Statistics: General Setup .........................................................

399

27.11.2 Application Patrol Statistics: Bandwidth Statistics ................................................

400

27.11.3 Application Patrol Statistics: Protocol Statistics ...................................................

400

Chapter 28

 

Anti-Virus...............................................................................................................................

403

28.1

Anti-Virus Overview .........................................................................................................

403

28.1.1 Types of Computer Viruses ...................................................................................

403

28.1.2 Computer Virus Infection and Prevention ..............................................................

403

28.1.3 Types of Anti-Virus Scanner ..................................................................................

404

28.2

Introduction to the ZyWALL Anti-Virus Scanner ..............................................................

404

28.2.1 How the ZyWALL Anti-Virus Scanner Works ........................................................

404

28.2.2 Notes About the ZyWALL Anti-Virus ......................................................................

405

28.3

Anti-Virus Summary .........................................................................................................

406

28.3.1 Anti-Virus Policy Edit ..............................................................................................

408

28.4

Anti-Virus Setting .............................................................................................................

410

28.5

Anti-Virus White List Add/Edit ..........................................................................................

412

28.6

Anti-Virus Black List Add/Edit ..........................................................................................

413

28.7

Signature Searching ........................................................................................................

413

Chapter 29

 

IDP.........................................................................................................................................

417

29.1

Introduction to IDP ...........................................................................................................

417

29.1.1 Host Intrusions .......................................................................................................

417

29.1.2 Network Intrusions .................................................................................................

417

29.1.3 IDP on the ZyWALL ...............................................................................................

417

29.1.4 Signatures ..............................................................................................................

418

29.2

Traffic Directions and Profiles ..........................................................................................

418

ZyWALL USG 1000 User’s Guide

21