EasyManua.ls Logo

ZyXEL Communications USG40W - Page 734

ZyXEL Communications USG40W
1090 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Chapter 38 IDP
ZyWALL USG Series User’s Guide
734
38.3.2.1 Understand the Vulnerability
Check the Zyxel Device logs when the attack occurs. Use web sites such as Google or Security Focus to
get as much information about the attack as you can. The more specific your signature, the less chance
it will cause false positives.
As an example, say you want to check if your router is being overloaded with DNS queries so you create
a signature to detect DNS query traffic.
38.3.2.2 Analyze Packets
Use the packet capture screen and a packet analyzer (also known as a network or protocol analyzer)
such as Wireshark or Ethereal to investigate some more.
Figure 509 DNS Query Packet Details

Table of Contents

Other manuals for ZyXEL Communications USG40W

Related product manuals