Справочник Пользователя для ZyXEL Communications 5 Series
Chapter 14 Intrusion Detection and Prevention (IDP) Screens
ZyWALL 5/35/70 Series User’s Guide
294
Figure 174 SECURITY > IDP > Backup & Restore
To back up IDP signatures, click Backup and then choose a location and filename for the IDP
configuration set.
configuration set.
To restore previously saved IDP signatures, type in the location where the previously saved
file resides on your computer or click Browse ... to find it, then click Upload.
file resides on your computer or click Browse ... to find it, then click Upload.
To revert to the factory-default signature (
Active, Log, Alert
and/or
Action)
settings, click
Reset.
14.7 Technical Reference
This technical reference contains the following sections:
•
Firewalls and Intrusions
•
•
•
•
Firewalls and Intrusions
Firewalls are designed to block clearly suspicious traffic and forward other traffic through.
Many exploits take advantage of weaknesses in the protocols that are allowed through the
firewall, so that once an inside server has been compromised it can be used as a backdoor to
launch attacks on other servers.
Many exploits take advantage of weaknesses in the protocols that are allowed through the
firewall, so that once an inside server has been compromised it can be used as a backdoor to
launch attacks on other servers.
Firewalls are usually deployed at the network edge. However, many attacks (inadvertently) are
launched from within an organization. Virtual private networks (VPN), removable storage
devices and wireless networks may all provide access to the internal network without going
through the firewall.
launched from within an organization. Virtual private networks (VPN), removable storage
devices and wireless networks may all provide access to the internal network without going
through the firewall.