Index
ZyWALL USG Series User’s Guide
1071
updating signatures 270
AppPatrol, see application patrol 270
ASAS (Authenex Strong Authentication System) 861
asymmetrical routes 575
allowing through the security policy 578
vs virtual interfaces 575
attacks
access control 722
backdoor 722
buffer overflow 722
Denial of Service (DoS) 614
DoS/DDoS 722
false negatives 717
false positives 717
IM 722
P2P 722
scan 722
severity of 720
spam 723
trapdoor 722
trojan 722
virus 145, 723, 739
worm 723
Authenex Strong Authentication System (ASAS) 861
authentication
in IPSec 617
LDAP/AD 862
server 860
authentication algorithms 632, 633
and active protocol 632
MD5 633
SHA1 633
Authentication Header, see AH
authentication method objects 869
and users 798
and WWW 927
create 870
example 869
authentication policy
exceptional services 493
Authentication server
RADIUS client 954
authentication server 952, 954
authentication type 155, 896
Authentication, Authorization, Accounting servers,
see AAA server
authorization server 860
Autonomous Systems (AS) 427
auxiliary interfaces 297
B
backdoor attacks 722
backing up configuration files 984
bandwidth
egress 344, 353
ingress 344, 353
bandwidth limit
troubleshooting 1029
bandwidth management 689
maximize bandwidth usage 417, 678
see also application patrol 689
troubleshooting 1029
Base DN 863
base profiles
in IDP 716
Batch import 596
BGP 432
Bind DN 863, 866
BitTorrent 722
black list 755, 758
anti-spam 751
Blaster 736
bookmarks 655
boot sector virus 749
bridge interfaces 297, 369
and virtual interfaces of members 370
basic characteristics 297
effect on routing table 369
member interfaces 369
virtual 327
bridges 368
buffer overflow 722
buffer overflow attacks 722
C
CA
and certificates 878
CA (Certificate Authority), see certificates