102
HEALTH CHECKING
The Health Checking table is a layer seven table. Instead of classifying the application
pattern, several packets that come from attacking tools can damage the host. Some of
the packets are assembled and stored in the file system and are detectable by
anti-virus software. Some packets try to get system authorized control and run as an
operating system’s administrator without storing to the file system. These packets are
invisible to almost all anti-virus software, but detectable by the DFL-M510. When
those packets come from a host and are detected, the corresponding field shows a
check mark to indicate the host has health concern problems.
Health-concern problems include network based worms, illegal agents, and tunnels.
Network based worms do not include common viruses, since they are easy to discover
by standard virus software.
Illegal agents include backdoors, trojans, spyware, and ad-ware.
Tunnels are host-based software. They provide a secure channel for communication.
The purpose is to break through a firewall and escape content inspecting. For example,
like soft ether, VNN, and VNC.
Содержание DFL-M510
Страница 2: ......
Страница 6: ...iv ...
Страница 60: ...51 When the settings are processed the following screen appears 5 Click OK to finish ...
Страница 63: ...54 PARAMETER TAB Click the Parameter tab The following screen appears This tab defines management parameters ...
Страница 80: ...71 3 Enter a file name and click Save 4 Click OK to confirm the export 5 Click OK to continue ...
Страница 95: ...86 5 Under Group Host select PM and click Apply ...
Страница 99: ...90 3 Input a pattern named Streaming 1 with category Streaming Media and TCP port 3001 4 Click Save ...
Страница 101: ...92 3 Input a rule name Web Chat 1 with category Web Control and servers 140 126 21 4 4 Click Save ...
Страница 104: ...95 2 Under Popup Message to User click Add 3 Type a description and the content of the message and click OK ...