Chapter 34 IDP
ZyWALL USG 300 User’s Guide
627
Network Intrusions
Network-based intrusions have the goal of bringing down a network or networks
by attacking computer(s), switch(es), router(s) or modem(s). If a LAN switch is
compromised for example, then the whole LAN is compromised. Host-based
intrusions may be used to cause network-based intrusions when the goal of the
host virus is to propagate attacks on the network, or attack computer/server
operating system vulnerabilities with the goal of bringing down the computer/
server. Typical “network-based intrusions” are SQL slammer, Blaster, Nimda
MyDoom etc.
Snort Signatures
You may want to refer to open source Snort signatures when creating custom
ZyWALL ones. Most Snort rules are written in a single line. Snort rules are divided
into two logical sections, the rule header and the rule options as shown in the
following example:
alert tcp any any -> 192.168.1.0/24 111 (content:”|00 01 a5|”;
msg:”mountd access”;)
The text up to the first parenthesis is the rule header and the section enclosed in
parenthesis contains the rule options. The words before the colons in the rule
options section are the option keywords.
The rule header contains the rule's:
• Action
• Protocol
• Source and destination IP addresses and netmasks
• Source and destination ports information.
The rule option section contains alert messages and information on which parts of
the packet should be inspected to determine if the rule action should be taken.
These are some equivalent Snort terms in the ZyWALL.
Table 170
ZyWALL - Snort Equivalent Terms
ZYWALL TERM
SNORT EQUIVALENT TERM
Type Of Service
tos
Identification
id
Fragmentation
fragbits
Fragmentation Offset
fragoffset
Time to Live
ttl
IP Options
ipopts
Содержание Unified Security Gateway ZyWALL 300
Страница 2: ......
Страница 30: ...Table of Contents ZyWALL USG 300 User s Guide 30 ...
Страница 31: ...31 PART I User s Guide ...
Страница 32: ...32 ...
Страница 38: ...Chapter 1 Introducing the ZyWALL ZyWALL USG 300 User s Guide 38 ...
Страница 46: ...Chapter 2 Features and Applications ZyWALL USG 300 User s Guide 46 ...
Страница 64: ...Chapter 3 Web Configurator ZyWALL USG 300 User s Guide 64 ...
Страница 74: ...Chapter 4 Installation Setup Wizard ZyWALL USG 300 User s Guide 74 ...
Страница 116: ...Chapter 6 Configuration Basics ZyWALL USG 300 User s Guide 116 ...
Страница 128: ...Chapter 7 Tutorials ZyWALL USG 300 User s Guide 128 Figure 73 Configuration Network Interface WLAN Add ...
Страница 184: ...Chapter 7 Tutorials ZyWALL USG 300 User s Guide 184 ...
Страница 221: ...221 PART II Technical Reference ...
Страница 222: ...222 ...
Страница 288: ...Chapter 11 Registration ZyWALL USG 300 User s Guide 288 ...
Страница 303: ...Chapter 13 Interfaces ZyWALL USG 300 User s Guide 303 Figure 269 Configuration Network Interface Ethernet Edit ...
Страница 320: ...Chapter 13 Interfaces ZyWALL USG 300 User s Guide 320 Figure 275 Configuration Network Interface Cellular Add ...
Страница 330: ...Chapter 13 Interfaces ZyWALL USG 300 User s Guide 330 Figure 278 Configuration Network Interface WLAN Add No Security ...
Страница 345: ...Chapter 13 Interfaces ZyWALL USG 300 User s Guide 345 Figure 286 Configuration Network Interface VLAN Edit ...
Страница 355: ...Chapter 13 Interfaces ZyWALL USG 300 User s Guide 355 Figure 288 Configuration Network Interface Bridge Add ...
Страница 378: ...Chapter 14 Trunks ZyWALL USG 300 User s Guide 378 ...
Страница 394: ...Chapter 15 Policy and Static Routes ZyWALL USG 300 User s Guide 394 ...
Страница 408: ...Chapter 16 Routing Protocols ZyWALL USG 300 User s Guide 408 ...
Страница 428: ...Chapter 19 NAT ZyWALL USG 300 User s Guide 428 ...
Страница 454: ...Chapter 23 Authentication Policy ZyWALL USG 300 User s Guide 454 ...
Страница 472: ...Chapter 24 Firewall ZyWALL USG 300 User s Guide 472 ...
Страница 479: ...Chapter 25 IPSec VPN ZyWALL USG 300 User s Guide 479 Figure 355 Configuration VPN IPSec VPN VPN Connection Edit IKE ...
Страница 490: ...Chapter 25 IPSec VPN ZyWALL USG 300 User s Guide 490 Figure 358 Configuration VPN IPSec VPN VPN Gateway Edit ...
Страница 534: ...Chapter 27 SSL User Screens ZyWALL USG 300 User s Guide 534 ...
Страница 536: ...Chapter 28 SSL User Application Screens ZyWALL USG 300 User s Guide 536 ...
Страница 544: ...Chapter 29 SSL User File Sharing ZyWALL USG 300 User s Guide 544 ...
Страница 638: ...Chapter 35 ADP ZyWALL USG 300 User s Guide 638 Figure 448 Profiles Protocol Anomaly ...
Страница 682: ...Chapter 37 Content Filter Reports ZyWALL USG 300 User s Guide 682 ...
Страница 700: ...Chapter 38 Anti Spam ZyWALL USG 300 User s Guide 700 ...
Страница 722: ...Chapter 39 Device HA ZyWALL USG 300 User s Guide 722 ...
Страница 738: ...Chapter 40 User Group ZyWALL USG 300 User s Guide 738 ...
Страница 744: ...Chapter 41 Addresses ZyWALL USG 300 User s Guide 744 ...
Страница 756: ...Chapter 43 Schedules ZyWALL USG 300 User s Guide 756 ...
Страница 772: ...Chapter 45 Authentication Method ZyWALL USG 300 User s Guide 772 ...
Страница 794: ...Chapter 46 Certificates ZyWALL USG 300 User s Guide 794 ...
Страница 806: ...Chapter 48 SSL Application ZyWALL USG 300 User s Guide 806 ...
Страница 811: ...Chapter 49 Endpoint Security ZyWALL USG 300 User s Guide 811 ...
Страница 866: ...Chapter 50 System ZyWALL USG 300 User s Guide 866 ...
Страница 873: ...Chapter 51 Log and Report ZyWALL USG 300 User s Guide 873 ...
Страница 886: ...Chapter 51 Log and Report ZyWALL USG 300 User s Guide 886 ...
Страница 916: ...Chapter 54 Packet Flow Explore ZyWALL USG 300 User s Guide 916 ...
Страница 918: ...Chapter 55 Reboot ZyWALL USG 300 User s Guide 918 ...
Страница 920: ...Chapter 56 Shutdown ZyWALL USG 300 User s Guide 920 ...
Страница 948: ...Chapter 58 Product Specifications ZyWALL USG 300 User s Guide 948 ...
Страница 1014: ...Appendix A Log Descriptions ZyWALL USG 300 User s Guide 1014 ...
Страница 1124: ...Appendix F Open Software Announcements ZyWALL USG 300 User s Guide 1124 ...
Страница 1156: ...Index ZyWALL USG 300 User s Guide 1156 ...