Chapter 26 Application Patrol/BWM
ZyWALL USG 50-H User’s Guide
398
26.1.2 What You Need to Know About Application Patrol/BWM
"
The ZyWALL checks firewall rules before it checks application patrol rules for
traffic going through the ZyWALL.
If you want to use a service, make sure both the firewall and application patrol allow the
service’s packets to go through the ZyWALL.
Application patrol examines every TCP and UDP connection passing through the ZyWALL
and identifies what application is using the connection. Then, you can specify, by application,
whether or not the ZyWALL continues to route the connection.
Configurable Application Policies
The ZyWALL has policies for individual applications. For each policy, you can specify the
default action the ZyWALL takes once it identifies one of the service’s connections.
You can also specify custom policies that have the ZyWALL forward, drop, or reject a
service’s connections based on criteria that you specify (like the source zone, destination zone,
original destination port of the connection, schedule, user, source, and destination
information). Your custom policies take priority over the policy’s default settings.
Classification of Applications
There are two ways the ZyWALL can identify the application. The first is called auto. The
ZyWALL looks at the IP payload (OSI level-7) and attempts to match it with known patterns
for specific applications. Usually, this occurs at the beginning of a connection, when the
payload is more consistent across connections, and the ZyWALL examines several packets to
make sure the match is correct.
"
The ZyWALL allows the first eight packets to go through the firewall,
regardless of the application patrol policy for the application. The ZyWALL
examines these first eight packets to identify the application.
In the second approach (called service ports). The ZyWALL uses only OSI level-4
information, such as ports, to identify what application is using the connection. This approach
is available in case the ZyWALL identifies a lot of “false positives” for a particular
application.
Bandwidth Management
When you allow an application, you can restrict the bandwidth it uses or even the bandwidth
that particular features in the application (like voice, video, or file sharing) use. This restriction
may be ineffective in certain cases, however, such as using MSN to send files via P2P.
Содержание ZyWall USG 50-H Series
Страница 2: ......
Страница 10: ...Safety Warnings ZyWALL USG 50 H User s Guide 10...
Страница 28: ...Table of Contents ZyWALL USG 50 H User s Guide 28...
Страница 30: ...30...
Страница 34: ...Chapter 1 Introducing the ZyWALL ZyWALL USG 50 H User s Guide 34...
Страница 40: ...Chapter 2 Features and Applications ZyWALL USG 50 H User s Guide 40...
Страница 92: ...Chapter 5 Configuration Basics ZyWALL USG 50 H User s Guide 92...
Страница 130: ...Chapter 6 Tutorials ZyWALL USG 50 H User s Guide 130...
Страница 146: ...146...
Страница 156: ...Chapter 8 Interface ZyWALL USG 50 H User s Guide 156 Figure 128 Network Interface Ethernet Edit wan2...
Страница 157: ...Chapter 8 Interface ZyWALL USG 50 H User s Guide 157 Figure 129 Network Interface Ethernet Edit lan1...
Страница 208: ...Chapter 8 Interface ZyWALL USG 50 H User s Guide 208 Figure 161 Network Interface Bridge Add...
Страница 224: ...Chapter 9 Trunks ZyWALL USG 50 H User s Guide 224...
Страница 250: ...Chapter 12 Zones ZyWALL USG 50 H User s Guide 250...
Страница 280: ...Chapter 16 ALG ZyWALL USG 50 H User s Guide 280...
Страница 286: ...Chapter 17 IP MAC Binding ZyWALL USG 50 H User s Guide 286...
Страница 287: ...287 PART III Firewall Firewall 289...
Страница 288: ...288...
Страница 304: ...Chapter 18 Firewall ZyWALL USG 50 H User s Guide 304...
Страница 306: ...306...
Страница 313: ...Chapter 19 IPSec VPN ZyWALL USG 50 H User s Guide 313 Figure 238 VPN IPSec VPN VPN Connection Edit IKE...
Страница 356: ...Chapter 21 SSL User Screens ZyWALL USG 50 H User s Guide 356...
Страница 358: ...Chapter 22 SSL User Application Screens ZyWALL USG 50 H User s Guide 358...
Страница 368: ...Chapter 24 L2TP VPN ZyWALL USG 50 H User s Guide 368...
Страница 394: ...Chapter 25 L2TP VPN Example ZyWALL USG 50 H User s Guide 394...
Страница 395: ...395 PART V Application Patrol Application Patrol BWM 397...
Страница 396: ...396...
Страница 421: ...421 PART VI Anti X ADP 423...
Страница 422: ...422...
Страница 429: ...Chapter 27 ADP ZyWALL USG 50 H User s Guide 429 Figure 359 Profiles Traffic Anomaly...
Страница 432: ...Chapter 27 ADP ZyWALL USG 50 H User s Guide 432 Figure 360 Profiles Protocol Anomaly...
Страница 440: ...Chapter 27 ADP ZyWALL USG 50 H User s Guide 440...
Страница 442: ...442...
Страница 462: ...Chapter 29 Addresses ZyWALL USG 50 H User s Guide 462...
Страница 474: ...Chapter 31 Schedules ZyWALL USG 50 H User s Guide 474...
Страница 484: ...Chapter 32 AAA Server ZyWALL USG 50 H User s Guide 484...
Страница 506: ...Chapter 34 Certificates ZyWALL USG 50 H User s Guide 506...
Страница 510: ...Chapter 35 SSL Application ZyWALL USG 50 H User s Guide 510...
Страница 511: ...511 PART VIII System System 513...
Страница 512: ...512...
Страница 552: ...552...
Страница 568: ...Chapter 38 Logs ZyWALL USG 50 H User s Guide 568 Figure 464 Maintenance Log Log Setting Edit System Log...
Страница 584: ...Chapter 40 Diagnostics ZyWALL USG 50 H User s Guide 584...
Страница 586: ...Chapter 41 Reboot ZyWALL USG 50 H User s Guide 586...
Страница 596: ...Chapter 43 Product Specifications ZyWALL USG 50 H User s Guide 596...
Страница 598: ...598...
Страница 636: ...Appendix A Log Descriptions ZyWALL USG 50 H User s Guide 636...
Страница 640: ...Appendix B Common Services ZyWALL USG 50 H User s Guide 640...
Страница 646: ...Appendix C Importing Certificates ZyWALL USG 50 H User s Guide 646...