29
IDP
This chapter introduces IDP (Intrusion, Detection and Prevention), IDP profiles, binding an IDP profile to a traffic direction, custom signatures and updating signatures. See Section
5.4.15on page 120 for related information on these screens.
29.1Introduction to IDP
An IDP system can detect malicious or suspicious packets and respond instantaneously. It is designed to detect
29.1.1 Host Intrusions
The goal of
You must install a host IDP directly on the system being protected. It works closely with the operating system, monitoring and intercepting system calls to the kernel or APIs in order to prevent attacks as well as log them.
Disadvantages of host IDPs are that you have to install them on each device (that you want to protect) in your network and due to the necessarily tight integration with the host operating system, future operating system upgrades could cause problems.
29.1.2 Network Intrusions
29.1.3 IDP on the ZyWALL
IDP on the ZyWALL protects against
| 417 |
ZyWALL USG 300 User’s Guide | |
|
|