Chapter 1 Introduction
USG FLEX H Series User’s Guide
24
Figure 8 About
This table describes the fields in this screen.
Reference
Use the Reference button to view which configuration settings reference to the object.
For example, go to Object > Zone to select an entry, then click Reference to open the References
screen. The References screen displays which settings are using the selected entry.
Figure 9 Reference
Table 5 About
LABEL DESCRIPTION
Current Version This shows the firmware version of the Zyxel Device.
Released Date This shows the date (yyyy-mm-dd) and time (hh:mm:ss) when the firmware is released.
System
Protection
Signature
This shows the system protection signature version of the Zyxel Device. These signatures do not
require a license. The Zyxel Device will synch with the Cloud Helper Server every day to update
these signatures automatically.
System protection signatures protect your Zyxel Device and local networks from web attacks,
such as command injection, cross-site scripting and path traversal.
Command injection: This is an attack in which an attacker uses the Zyxel Device vulnerabilities
to execute commands to control your Zyxel Device.
Cross-site scripting: This is an attack in which an attacker implants malicious scripts in a website.
When you visit this website, the malicious scripts are sent and executed on your web browser.
Path traversal: This is an attack that allows an attacker to access files you store in the web root
folder.