EasyManua.ls Logo

ZyXEL Communications USG FLEX H Series - 18.2 Anti-Malware Screen

ZyXEL Communications USG FLEX H Series
462 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Chapter 18 Anti-Malware
USG FLEX H Series User’s Guide
291
Simultaneous downloads of a file using multiple connections. For example, when you use FlashGet
to download sections of a file simultaneously.
Encrypted traffic. This could be password-protected files or VPN traffic where the Zyxel Device is not
the endpoint (pass-through VPN traffic).
Traffic through custom (non-standard) ports. The Zyxel Device scans whatever port number is
specified for FTP in the ALG screen.
Finding Out More
•See Section 18.5 on page 297 for anti-malware background information.
18.1.1 What You Can Do in this Chapter
Use the Anti-Malware screen (Section 18.2 on page 291) to turn anti-malware on or off. In addition,
you can set up anti-malware black (blocked) and white (allowed) lists of malware patterns.
Use the Allow List screen (Section 18.3 on page 293) to specify the file or encryption pattern to allow in
order to avoid false positives.
Use the Block List screen (Section 18.4 on page 295) to specify the file or encryption pattern that you
want to block.
18.2 Anti-Malware Screen
Click Security Service > Anti-Malware to display the configuration screen as shown next.
Click the Anti-Malware icon for more information on the Zyxel Device’s security features.
Note: See Subscription Services Available on page 92 for more information on the subscription
services for the two types of security packs.
Note: If Destroy infected file is disabled and log is set to no, the Zyxel Device will still perform
the scan but will not do anything else. It is recommended to enable at least one of the
two functions.
If Destroy infected file is disabled, any malicious file found can still be
executed by the end user after it is forwarded. The administrator would
have to inform the user if there is an infected file.

Table of Contents

Related product manuals