EasyManua.ls Logo

ZyXEL Communications ZYWALL 35 - Chapter 12 Intrusion Detection and Prevention (IDP); Introduction to IDP; Firewalls and Intrusions; Figure 158 Network Intrusions

ZyXEL Communications ZYWALL 35
872 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
ZyWALL 5/35/70 Series User’s Guide
275
CHAPTER 12
Intrusion Detection and
Prevention (IDP)
This chapter introduces some background information on IDP. Skip to the next chapter to see
how to configure IDP on your ZyWALL.
12.1 Introduction to IDP
An IDP system can detect malicious or suspicious packets and respond instantaneously. It can
detect anomalies based on violations of protocol standards (RFCs – Requests for Comments)
or traffic flows and abnormal flows such as port scans.
Figure 158 on page 275 represents a typical business network consisting of a LAN, a DMZ
(DeMilitarized Zone) containing the company web, FTP, mail servers etc., a firewall and/or
NAT router connected to a broadband modem (M) for Internet access.
Figure 158 Network Intrusions
12.1.1 Firewalls and Intrusions
Firewalls are designed to block clearly suspicious traffic and forward other traffic through.
Many exploits take advantage of weaknesses in the protocols that are allowed through the
firewall, so that once an inside server has been compromised it can be used as a backdoor to
launch attacks on other servers.

Table of Contents

Other manuals for ZyXEL Communications ZYWALL 35

Related product manuals