ZoneDefense with Anti-Virus Scanning
ZoneDefense can also be used in conjunction with the NetDefendOS
Anti-Virus
scanning feature.
NetDefendOS can first identify a virus source through antivirus scanning and then block the
source by communicating with switches configured to work with ZoneDefense.
This feature can be activated via the following ALGs:
•
HTTP - ZoneDefense can block an HTTP server that is a virus source.
•
FTP - ZoneDefense can block a local FTP client that is uploading viruses.
•
SMTP - ZoneDefense can block a local SMTP client that is sending viruses with emails.
Anti-virus scanning is described further in
Section 6.5, “Anti-Virus Scanning”
and in the sections
covering the individual ALGs.
ZoneDefense Limitations
There are some differences in ZoneDefense operation depending on the switch model:
•
The first difference is the latency between the triggering of a blocking rule to the moment
when a switch actually starts blocking out the traffic matched by the rule. All switch models
require a short period of latency time to implement blocking once the rule is triggered. Some
models can activate blocking in less than a second while some models may require a minute
or more.
•
A second difference is the maximum number of rules supported by different switches. Some
switches support a maximum of 50 rules while others support up to 800 (usually, in order to
block a host or network, one rule per switch port is needed). When this limit has been
reached no more hosts or networks will be blocked out.
Important: Clearing the ACL rule set on the switch
ZoneDefense uses a range in the ACL rule set on the switch. To avoid potential conflicts
in these rules and guarantee the firewall's access control, it is strongly recommended
that the administrator clear the entire ACL rule set on the switch before performing the
ZoneDefense setup.
Chapter 12: ZoneDefense
848
Summary of Contents for NetDefendOS
Page 30: ...Figure 1 3 Packet Flow Schematic Part III Chapter 1 NetDefendOS Overview 30 ...
Page 32: ...Chapter 1 NetDefendOS Overview 32 ...
Page 144: ...Chapter 2 Management and Maintenance 144 ...
Page 284: ...Chapter 3 Fundamentals 284 ...
Page 392: ...Chapter 4 Routing 392 ...
Page 419: ... Host 2001 DB8 1 MAC 00 90 12 13 14 15 5 Click OK Chapter 5 DHCP Services 419 ...
Page 420: ...Chapter 5 DHCP Services 420 ...
Page 573: ...Chapter 6 Security Mechanisms 573 ...
Page 607: ...Chapter 7 Address Translation 607 ...
Page 666: ...Chapter 8 User Authentication 666 ...
Page 775: ...Chapter 9 VPN 775 ...
Page 819: ...Chapter 10 Traffic Management 819 ...
Page 842: ...Chapter 11 High Availability 842 ...
Page 866: ...Default Enabled Chapter 13 Advanced Settings 866 ...
Page 879: ...Chapter 13 Advanced Settings 879 ...