EasyManua.ls Logo

ZyXEL Communications USG FLEX H Series - Page 452

ZyXEL Communications USG FLEX H Series
462 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
USG FLEX H Series User’s Guide
452
file infector virus 289
macro virus 289
malware life cycle 289
malware types 289
mutation virus 289
packet types 289
polymorphic virus 289
scanner types 297
statistics 76
virus 289
worm 289
anti-virus
EICAR 292
e-mail virus 289
polymorphic virus 289
statistics 76, 79
troubleshooting 425, 426
updating signatures 95, 96
Application Layer Gateway, see ALG
application patrol 232
actions 232
and security policy 232
classification 232
exceptions 232
port-less 232
ports 233
service ports 233
troubleshooting 425, 429, 431
asymmetrical routes 192
allowing through the security policy 194
vs virtual interfaces 192
attacks
access control 307
backdoor 308
buffer overflow 308
DoS/DDoS 308
IM 308
P2P 308
scan 308
trapdoor 308
trojan 308
virus 289, 309
worm 309
authentication
in IPSec 177, 178, 182
server 343
authentication algorithms 160
and active protocol 160
MD5 161
SHA1 161
Authentication Header, see AH
authentication method objects
and users 332
authentication server 375, 377
Authentication, Authorization, Accounting servers,
see AAA server
authorization server 343
auxiliary interfaces 99
B
backdoor attacks 308
backing up configuration files 403
bandwidth capacity
cable types 43
bandwidth management 232
see also application patrol 232
Base DN 343
Bind DN 343
BitTorrent 308
Blaster 312
Botnet 275
bridge interfaces 99, 122
and virtual interfaces of members 123
effect on routing table 123
member interfaces 123
bridges 122
Brute Force Attack 275
buffer overflow 308
buffer overflow attacks 308
C
CA
and certificates 378
CA (Certificate Authority), see certificates
cable types 43
capturing packets 414
CAT 5 cable 43
CAT 5e cable 43
CAT 6 cable 43

Table of Contents

Related product manuals