ZyXEL Communications USG-50 - V2.21 ED 1 Podręcznik Użytkownika Strona 14

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 390
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 13
Table of Contents
ZyWALL (ZLD) CLI Reference Guide
14
19.5.3 Configuring the L2TP VPN Settings Example .....................................................................165
19.5.4 Configuring the Policy Route for L2TP Example .................................................................166
Chapter 20
Application Patrol.............................................................................................................................167
20.1 Application Patrol Overview ..........................................................................................................167
20.2 Application Patrol Commands Summary ......................................................................................167
20.2.1 Pre-defined Application Commands ....................................................................................168
20.2.2 Rule Commands for Pre-defined Applications .....................................................................168
20.2.3 Exception Commands for Pre-defined Applications ............................................................170
20.2.4 Other Application Commands ..............................................................................................171
20.2.5 Rule Commands for Other Applications ..............................................................................171
20.2.6 General Commands for Application Patrol ..........................................................................172
Chapter 21
Anti-Virus...........................................................................................................................................177
21.1 Anti-Virus Overview .......................................................................................................................177
21.2 Anti-virus Commands ....................................................................................................................177
21.2.1 General Anti-virus Commands ............................................................................................178
21.2.2 Zone to Zone Anti-virus Rules .............................................................................................178
21.2.3 White and Black Lists ..........................................................................................................180
21.2.4 Signature Search Anti-virus Command ...............................................................................181
21.3 Update Anti-virus Signatures ........................................................................................................182
21.3.1 Update Signature Examples ................................................................................................183
21.4 Anti-virus Statistics ........................................................................................................................183
21.4.1 Anti-virus Statistics Example ...............................................................................................184
Chapter 22
IDP Commands .................................................................................................................................185
22.1 Overview .......................................................................................................................................185
22.2 General IDP Commands ...............................................................................................................185
22.2.1 IDP Activation ......................................................................................................................185
22.3 IDP Profile Commands ..................................................................................................................186
22.3.1 Global Profile Commands ....................................................................................................186
22.3.2 IDP Zone to Zone Rules ......................................................................................................187
22.3.3 Editing/Creating IDP Signature Profiles ...............................................................................188
22.3.4 Editing/Creating Anomaly Profiles .......................................................................................188
22.3.5 Editing System Protect ........................................................................................................192
22.3.6 Signature Search .................................................................................................................192
22.4 IDP Custom Signatures .................................................................................................................195
22.4.1 Custom Signature Examples ...............................................................................................196
22.5 Update IDP Signatures .................................................................................................................199
22.5.1 Update Signature Examples ................................................................................................200
Przeglądanie stron 13
1 2 ... 9 10 11 12 13 14 15 16 17 18 19 ... 389 390

Komentarze do niniejszej Instrukcji

Brak uwag