ZyWALL 5/35/70 Series User’s Guide
295
C
H A P T E R
1 4
Anti-Virus
This chapter introduces and shows you how to configure the anti-virus scanner.
14.1 Anti-Virus Overview
A computer virus is a small program designed to corrupt and/or alter the operation of other
legitimate programs. A worm is a self-replicating virus that resides in active memory and
duplicates itself. The effect of a virus attack varies from doing so little damage that you are
unaware your computer is infected to wiping out the entire contents of a hard drive to
rendering your computer inoperable.
14.1.1 Types of Computer Viruses
The following table describes some of the common computer viruses.
14.1.2 Computer Virus Infection and Prevention
The following describes a simple life cycle of a computer virus.
1
A computer gets a copy of a virus from a source such as the Internet, e-mail, file sharing
or any removable storage media. The virus is harmless until the execution of an infected
program.
2
The virus spreads to other files and programs on the computer.
Table 84
Common Computer Virus Types
TYPE
DESCRIPTION
File Infector
This is a small program that embeds itself in a legitimate program. A file infector is
able to copy and attach itself to other programs that are executed on an infected
computer.
Boot Sector Virus
This type of virus infects the area of a hard drive that a computer reads and
executes during startup. The virus causes computer crashes and to some extend
renders the infected computer inoperable.
Macro Virus
Macro viruses or Macros are small programs that are created to perform repetitive
actions. Macros run automatically when a file to which they are attached is
opened. Macros spread more rapidly than other types of viruses as data files are
often shared on a network.
E-mail Virus
E-mail viruses are malicious programs that spread through e-mail.
Polyrmorphic
Virus
A polymorphic virus (also known as a mutation virus) tries to evade detection by
changing a portion of its code structure after each execution or self replication.
This makes it harder for an anti-virus scanner to detect or intercept it.
A polymorphic virus can also belong to any of the virus types discussed above.
Summary of Contents for ZyWALL 35 Series
Page 2: ......
Page 8: ...Safety Warnings ZyWALL 5 35 70 Series User s Guide 8 ...
Page 52: ...List of Tables ZyWALL 5 35 70 Series User s Guide 52 ...
Page 54: ...54 ...
Page 60: ...Chapter 1 Getting to Know Your ZyWALL ZyWALL 5 35 70 Series User s Guide 60 ...
Page 86: ...Chapter 2 Introducing the Web Configurator ZyWALL 5 35 70 Series User s Guide 86 ...
Page 140: ...Chapter 4 Tutorials ZyWALL 5 35 70 Series User s Guide 140 ...
Page 146: ...Chapter 5 Registration ZyWALL 5 35 70 Series User s Guide 146 ...
Page 148: ...148 ...
Page 160: ...Chapter 6 LAN Screens ZyWALL 5 35 70 Series User s Guide 160 ...
Page 173: ...Chapter 8 WAN Screens ZyWALL 5 35 70 Series User s Guide 173 Figure 93 NETWORK WAN General ...
Page 202: ...Chapter 8 WAN Screens ZyWALL 5 35 70 Series User s Guide 202 ...
Page 212: ...Chapter 9 DMZ Screens ZyWALL 5 35 70 Series User s Guide 212 ...
Page 242: ...242 ...
Page 274: ...Chapter 11 Firewall ZyWALL 5 35 70 Series User s Guide 274 ...
Page 294: ...Chapter 13 Configuring IDP ZyWALL 5 35 70 Series User s Guide 294 ...
Page 320: ...Chapter 15 Anti Spam ZyWALL 5 35 70 Series User s Guide 320 ...
Page 342: ...Chapter 16 Content Filtering Screens ZyWALL 5 35 70 Series User s Guide 342 ...
Page 350: ...Chapter 17 Content Filtering Reports ZyWALL 5 35 70 Series User s Guide 350 ...
Page 424: ...Chapter 19 Certificates ZyWALL 5 35 70 Series User s Guide 424 ...
Page 430: ...430 ...
Page 448: ...Chapter 21 Network Address Translation NAT ZyWALL 5 35 70 Series User s Guide 448 ...
Page 474: ...Chapter 24 Bandwidth Management ZyWALL 5 35 70 Series User s Guide 474 ...
Page 514: ...Chapter 26 Remote Management ZyWALL 5 35 70 Series User s Guide 514 ...
Page 533: ...533 PART V Reports Logs and Maintenance Reports 535 Logs Screens 547 Maintenance 575 ...
Page 534: ...534 ...
Page 551: ...Chapter 31 Logs Screens ZyWALL 5 35 70 Series User s Guide 551 Figure 334 LOGS Log Settings ...
Page 592: ...Chapter 32 Maintenance ZyWALL 5 35 70 Series User s Guide 592 ...
Page 594: ...594 Troubleshooting 751 Product Specifications 757 ...
Page 602: ...Chapter 33 Introducing the SMT ZyWALL 5 35 70 Series User s Guide 602 ...
Page 622: ...Chapter 35 WAN and Dial Backup Setup ZyWALL 5 35 70 Series User s Guide 622 ...
Page 628: ...Chapter 36 LAN Setup ZyWALL 5 35 70 Series User s Guide 628 ...
Page 634: ...Chapter 37 Internet Access ZyWALL 5 35 70 Series User s Guide 634 ...
Page 638: ...Chapter 38 DMZ Setup ZyWALL 5 35 70 Series User s Guide 638 ...
Page 642: ...Chapter 39 Route Setup ZyWALL 5 35 70 Series User s Guide 642 ...
Page 658: ...Chapter 41 Remote Node Setup ZyWALL 5 35 70 Series User s Guide 658 ...
Page 662: ...Chapter 42 IP Static Route Setup ZyWALL 5 35 70 Series User s Guide 662 ...
Page 700: ...Chapter 45 Filter Configuration ZyWALL 5 35 70 Series User s Guide 700 ...
Page 738: ...Chapter 50 Remote Management ZyWALL 5 35 70 Series User s Guide 738 ...
Page 746: ...Chapter 51 IP Policy Routing ZyWALL 5 35 70 Series User s Guide 746 ...
Page 766: ...766 ...
Page 770: ...Appendix A Hardware Installation ZyWALL 5 35 70 Series User s Guide 770 ...
Page 780: ...Appendix C Removing and Installing a Fuse ZyWALL 5 35 70 Series User s Guide 780 ...
Page 802: ...Appendix D Setting up Your Computer s IP Address ZyWALL 5 35 70 Series User s Guide 802 ...
Page 816: ...Appendix F Common Services ZyWALL 5 35 70 Series User s Guide 816 ...
Page 852: ...Appendix J Importing Certificates ZyWALL 5 35 70 Series User s Guide 852 ...
Page 856: ...Appendix K Legal Information ZyWALL 5 35 70 Series User s Guide 856 ...
Page 862: ...Appendix L Customer Support ZyWALL 5 35 70 Series User s Guide 862 ...