Chapter 31 IDP
ZyWALL USG 2000 User’s Guide
499
31.6.2 Policy Types
This section describes IDP policy types, also known as attack types, as categorized
in the ZyWALL. You may refer to these types when categorizing your own custom
rules.
Cancel
Click Cancel to return to the profile summary page without saving any
changes.
Save
If you want to configure more than one screen for an IDP profile, click
Save to save the configuration to the ZyWALL, but remain in the same
page. You may then go to another profile screen (tab) in order to
complete the profile. Click OK in the final profile screen to complete the
profile.
Table 147
Anti-X > IDP > Profile > Group View (continued)
LABEL
DESCRIPTION
Table 148
Policy Types
POLICY TYPE
DESCRIPTION
P2P
Peer-to-peer (P2P) is where computing devices link directly to each
other and can directly initiate communication with each other; they
do not need an intermediary. A device can be both the client and the
server. In the ZyWALL, P2P refers to peer-to-peer applications such
as e-Mule, e-Donkey, BitTorrent, iMesh, etc.
IM
IM (Instant Messenger) refers to chat applications. Chat is real-time,
text-based communication between two or more users via networks-
connected computers. After you enter a chat (or chat room), any
room member can type a message that will appear on the monitors of
all the other participants.
SPAM
Spam is unsolicited “junk” e-mail sent to large numbers of people to
promote products or services.
DoS/DDoS
The goal of Denial of Service (DoS) attacks is not to steal
information, but to disable a device or network on the Internet.
A Distributed Denial of Service (DDoS) attack is one in which multiple
compromised systems attack a single target, thereby causing denial
of service for users of the targeted system.
Scan
A scan describes the action of searching a network for an exposed
service. An attack may then occur once a vulnerability has been
found. Scans occur on several network levels.
A network scan occurs at layer-3. For example, an attacker looks for
network devices such as a router or server running in an IP network.
A scan on a protocol is commonly referred to as a layer-4 scan. For
example, once an attacker has found a live end system, he looks for
open ports.
A scan on a service is commonly referred to a layer-7 scan. For
example, once an attacker has found an open port, say port 80 on a
server, he determines that it is a HTTP service run by some web
server application. He then uses a web vulnerability scanner (for
example, Nikto) to look for documented vulnerabilities.
Summary of Contents for ZyXEL ZyWALL USG-1000
Page 2: ......
Page 30: ...30 ...
Page 58: ...Chapter 3 Web Configurator ZyWALL USG 2000 User s Guide 58 ...
Page 84: ...Chapter 4 Wizard Setup ZyWALL USG 2000 User s Guide 84 ...
Page 136: ...Chapter 6 Tutorials ZyWALL USG 2000 User s Guide 136 ...
Page 166: ...Chapter 9 Signature Update ZyWALL USG 2000 User s Guide 166 ...
Page 168: ...168 ...
Page 234: ...Chapter 11 Trunks ZyWALL USG 2000 User s Guide 234 ...
Page 248: ...Chapter 12 Policy and Static Routes ZyWALL USG 2000 User s Guide 248 ...
Page 272: ...Chapter 15 DDNS ZyWALL USG 2000 User s Guide 272 ...
Page 287: ...Chapter 16 Virtual Servers ZyWALL USG 2000 User s Guide 287 ...
Page 288: ...Chapter 16 Virtual Servers ZyWALL USG 2000 User s Guide 288 ...
Page 307: ...307 PART III Firewall Firewall 309 ...
Page 308: ...308 ...
Page 326: ...Chapter 20 Firewall ZyWALL USG 2000 User s Guide 326 ...
Page 328: ...328 ...
Page 370: ...Chapter 21 IPSec VPN ZyWALL USG 2000 User s Guide 370 ...
Page 392: ...Chapter 23 SSL User Screens ZyWALL USG 2000 User s Guide 392 ...
Page 394: ...Chapter 24 SSL User Application Screens ZyWALL USG 2000 User s Guide 394 ...
Page 402: ...Chapter 25 SSL User File Sharing ZyWALL USG 2000 User s Guide 402 ...
Page 412: ...Chapter 27 L2TP VPN ZyWALL USG 2000 User s Guide 412 ...
Page 440: ...Chapter 28 L2TP VPN Example ZyWALL USG 2000 User s Guide 440 ...
Page 441: ...441 PART V Application Patrol Application Patrol 443 ...
Page 442: ...442 ...
Page 470: ...470 ...
Page 531: ...Chapter 32 ADP ZyWALL USG 2000 User s Guide 531 Figure 371 Profiles Protocol Anomaly ...
Page 540: ...Chapter 32 ADP ZyWALL USG 2000 User s Guide 540 ...
Page 566: ...Chapter 33 Content Filtering ZyWALL USG 2000 User s Guide 566 ...
Page 574: ...Chapter 34 Content Filter Reports ZyWALL USG 2000 User s Guide 574 ...
Page 593: ...593 PART VII Device HA Device HA 595 ...
Page 594: ...594 ...
Page 614: ...614 ...
Page 636: ...Chapter 38 Addresses ZyWALL USG 2000 User s Guide 636 ...
Page 660: ...Chapter 41 AAA Server ZyWALL USG 2000 User s Guide 660 ...
Page 686: ...Chapter 43 Certificates ZyWALL USG 2000 User s Guide 686 ...
Page 698: ...Chapter 45 SSL Application ZyWALL USG 2000 User s Guide 698 ...
Page 699: ...699 PART IX System System 701 ...
Page 700: ...700 ...
Page 750: ...750 ...
Page 776: ...Chapter 48 Logs ZyWALL USG 2000 User s Guide 776 ...
Page 794: ...Chapter 49 Reports ZyWALL USG 2000 User s Guide 794 ...
Page 796: ...Chapter 50 Diagnostics ZyWALL USG 2000 User s Guide 796 ...
Page 798: ...Chapter 51 Reboot ZyWALL USG 2000 User s Guide 798 ...
Page 812: ...Chapter 53 Product Specifications ZyWALL USG 2000 User s Guide 812 ...
Page 814: ...814 ...
Page 874: ...Appendix A Log Descriptions ZyWALL USG 2000 User s Guide 874 ...
Page 956: ...Appendix E Open Software Announcements ZyWALL USG 2000 User s Guide 956 ...
Page 960: ...Appendix F Legal Information ZyWALL USG 2000 User s Guide 960 ...