ZyXEL 35 Guia Do Utilizador
ZyWALL 35 Support Notes
All contents copyright (c) 2006 ZyXEL Communications Corporation.
245
Proactive protection: hands-on best practice for threat management using ZyWALL 5 UTM
Scenario
A typical SMB network, as illustrated in the above figure, may be segmented into Intranet (trusted
network), DMZ for Internet-facing servers and Internet (distrusted networks).
In Intranet, there are tens of company employees having to access the Internet resources. They need to do
web browsing, send/receive emails via company mail server, using hotmail or Google Gmail, doing file
download upload and even having IM application to increase productivity.
In the DMZ, they will host couple Internet-facing servers, including DNS, web, email and ftp servers to
provide services to their customers/partners.
From Internet, public users may need to access the servers in DMZ.
In addition to basic access control lists deployed on ZyWALL 5 UTM, IT staff must have additional
application layer of protection. It should inspect traffics from/to these network segments to ensure
malicious activities will not take place.
To protect computer networks against virus intrusions and attacks from Internet
1. For Mixed Environment
Following example will demonstrate how to use ZyWALL 5 UTM to prevent virus and worms from entering
the intranet and DMZ networks behind ZyWALL.
Since most virus and worms are coming from the internet, thus all incoming traffic from internet (WAN) to
intranet (LAN and DMZ) should be inspected. Configure your ZyWALL 5 UTM based on this example will