Page 461 / 944 Scroll up to view Page 456 - 460
Chapter 28 Application Patrol
ZyWALL USG 50 User’s Guide
461
Inbound
kbps
Type how much inbound bandwidth, in kilobits per second, this policy
allows the traffic to use. Inbound refers to the traffic the ZyWALL sends
to a connection’s initiator.
If you enter
0
here, this policy does not apply bandwidth management
for the matching traffic that the ZyWALL sends to the initiator. Traffic
with bandwidth management disabled (inbound and outbound are both
set to 0) is automatically treated as the lowest priority (7).
If the sum of the bandwidths for routes using the same next hop is
higher than the actual transmission speed, lower priority traffic may not
be sent if higher priority traffic uses all of the actual bandwidth.
Outbound
kbps
Type how much outbound bandwidth, in kilobits per second, this policy
allows the traffic to use. Outbound refers to the traffic the ZyWALL sends
out from a connection’s initiator.
If you enter
0
here, this policy does not apply bandwidth management
for the matching traffic that the ZyWALL sends out from the initiator.
Traffic with bandwidth management disabled (inbound and outbound are
both set to 0) is automatically treated as the lowest priority (7).
If the sum of the bandwidths for routes using the same next hop is
higher than the actual transmission speed, lower priority traffic may not
be sent if higher priority traffic uses all of the actual bandwidth.
Priority
This field displays when the inbound or outbound bandwidth
management is not set to 0. Enter a number between 1 and 7 to set the
priority for traffic that matches this policy. The smaller the number, the
higher the priority.
Traffic with a higher priority is given bandwidth before traffic with a
lower priority.
The ZyWALL uses a fairness-based (round-robin) scheduler to divide
bandwidth between traffic flows with the same priority.
The number in this field is ignored if the incoming and outgoing limits
are both set to 0. In this case the traffic is automatically treated as being
set to the lowest priority (7) regardless of this field’s configuration.
Maximize
Bandwidth
Usage
This field displays when the inbound or outbound bandwidth
management is not set to 0. Enable maximize bandwidth usage to let
the traffic matching this policy “borrow” any unused bandwidth on the
out-going interface.
After each application or type of traffic gets its configured bandwidth
rate, the ZyWALL uses the fairness- based scheduler to divide any
unused bandwidth on the out-going interface amongst applications and
traffic types that need more bandwidth and have maximize bandwidth
usage enabled.
Log
This field controls what kind of record the ZyWALL creates when traffic
matches this policy. See
Chapter 46 on page 723
for more on logs.
no
- the ZyWALL does not record anything
log
- the ZyWALL creates a record in the log
log alert
- the ZyWALL creates an alert
Table 134
AppPatrol > Other > Edit (continued)
LABEL
DESCRIPTION
Page 462 / 944
Chapter 28 Application Patrol
ZyWALL USG 50 User’s Guide
462
OK
Click
OK
to save your changes back to the ZyWALL.
Cancel
Click
Cancel
to exit this screen without saving your changes.
Table 134
AppPatrol > Other > Edit (continued)
LABEL
DESCRIPTION
Page 463 / 944
ZyWALL USG 50 User’s Guide
463
C
HAPTER
29
Anti-Virus
29.1
Overview
Use the ZyWALL’s anti-virus feature to protect your connected network from virus/
spyware infection. The ZyWALL checks traffic going in the direction(s) you specify
for signature matches. In the following figure the ZyWALL is set to check traffic
coming from the WAN zone (which includes two interfaces) to the LAN zone.
Figure 281
ZyWALL Anti-Virus Example
29.1.1
What You Can Do in this Chapter
Use the
General
screens (
Section 29.2 on page 466
) to turn anti-virus on or off,
set up anti-virus policies and check the anti-virus engine type and the anti-virus
license and signature status.
Use the
Black/White List
screen (
Section 29.3 on page 471
) to set up anti-
virus black (blocked) and white (allowed) lists of virus file patterns.
Use the
Signature
screen (
Section 29.6 on page 474
) to search signatures to
get more information about signatures.
Page 464 / 944
Chapter 29 Anti-Virus
ZyWALL USG 50 User’s Guide
464
29.1.2
What You Need to Know
Anti-Virus Engines
Subscribe to signature files for Kaspersky’s anti-virus engine. After the trial
expires, you need to purchase an iCard for the anti-virus engine you want to use
and register it in the
Registration > Service
screen. You must use the Kaspersky
anti-virus iCard for the Kaspersky anti-virus engine. See
Section 10.1 on page 209
for details.
Virus and Worm
A computer virus is a small program designed to corrupt and/or alter the
operation of other legitimate programs. A worm is a self-replicating virus that
resides in active memory and duplicates itself. The effect of a virus attack varies
from doing so little damage that you are unaware your computer is infected to
wiping out the entire contents of a hard drive to rendering your computer
inoperable.
ZyWALL Anti-Virus Scanner
The ZyWALL has a built-in signature database. Setting up the ZyWALL between
your local network and the Internet allows the ZyWALL to scan files transmitting
through the enabled interfaces into your network. As a network-based anti-virus
scanner, the ZyWALL helps stop threats at the network edge before they reach the
local host computers.
You can set the ZyWALL to examine files received through the following protocols:
FTP (File Transfer Protocol)
HTTP (Hyper Text Transfer Protocol)
SMTP (Simple Mail Transfer Protocol)
POP3 (Post Office Protocol version 3)
IMAP4 (Internet Message Access Protocol version 4)
How the ZyWALL Anti-Virus Scanner Works
The following describes the virus scanning process on the ZyWALL.
1
The ZyWALL first identifies SMTP, POP3, IMAP4, HTTP and FTP packets through
standard ports.
2
If the packets are not session connection setup packets (such as SYN, ACK and
FIN), the ZyWALL records the sequence of the packets.
Page 465 / 944
Chapter 29 Anti-Virus
ZyWALL USG 50 User’s Guide
465
3
The scanning engine checks the contents of the packets for virus.
4
If a virus pattern is matched, the ZyWALL removes the infected portion of the file
along with the rest of the file. The un-infected portion of the file before a virus
pattern was matched still goes through.
5
If the send alert message function is enabled, the ZyWALL sends an alert to the
file’s intended destination computer(s).
Note: Since the ZyWALL erases the infected portion of the file before sending it, you
may not be able to open the file.
Notes About the ZyWALL Anti-Virus
The following lists important notes about the anti-virus scanner:
1
The ZyWALL anti-virus scanner can detect polymorphic viruses.
2
When a virus is detected, an alert message is displayed in Microsoft Windows
computers. Refer to the user’s guide appendices
Appendix C on page 851
if your
Windows computer does not display the alert messages.
3
Changes to the ZyWALL’s anti-virus settings affect new sessions (not the sessions
that already existed before you applied the changed settings).
4
The ZyWALL does not scan the following file/traffic types:
• Simultaneous downloads of a file using multiple connections. For example,
when you use FlashGet to download sections of a file simultaneously.
• Encrypted traffic. This could be password-protected files or VPN traffic where
the ZyWALL is not the endpoint (pass-through VPN traffic).
Traffic through custom (non-standard) ports. The only exception is FTP traffic.
The ZyWALL scans whatever port number is specified for FTP in the ALG
screen.
• ZIP file(s) within a ZIP file.
Finding Out More
See
Section 6.5.18 on page 103
for related information on these screens.
See
Section 29.7 on page 477
for anti-virus background information.
29.1.3
Before You Begin
Before using anti-virus, see
Section 10.1 on page 209
for how to register for the
anti-virus service.
You may need to customize the zones (in the
Network
>
Zone
) used for the
anti-virus scanning direction.

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top