ZyXEL p-662h-61 Guia Do Utilizador

Página de 561
Prestige 662HW Series User’s Guide
205
Chapter 17 Anti-Virus Packet Scan
For maximum protection, you must keep the pattern file up-to-date. 
17.2.1  Computer Virus Infection and Prevention
The follow describes a simplistic life cycle of a computer virus. 
A computer gets a copy of a virus from an unknown source (such as the Internet, e-mail, 
file sharing or any removable storage media). The virus is harmless until the execution of 
an infected program. 
The virus spreads to other files and programs on the computer. 
The infected files are unintentionally sent to another computer thus starting the spread of 
the virus. 
Once the virus is spread through the network, the number of infected networked 
computers can grow exponentially.  
To prevent the spread of viruses, you need to install host-based anti-virus software on a 
computer or buy an anti-virus system.  
17.3  Introduction to the Prestige Anti-virus Packet Scan
The Prestige has an integrated signature-based anti-virus packet scan. Set up the Prestige 
between your local network and the Internet. This way the Prestige can scan incoming traffic 
to your local network from the Internet. Thus the Prestige helps stop threats at the network 
edge before they reach the local host computers. 
Figure 85   Prestige Anti-virus Application  
Your Prestige is able to scan the following network traffic types for viruses: 
• HTTP (Hyper Text Transfer Protocol)
This is the most common protocol used on the Internet. HTTP is the primary protocol 
used for web sites and web browsers.
• Mail messages (SMPT, POP3)
• FTP (File Transfer Protocol)