Chapter 25 Security Policy
ZyWALL ATP Series User’s Guide
474
25.3 What You Can Do in this Chapter
• Use the
Security Policy Control
screens (
) to enable or disable policies,
asymmetrical routes, and manage and configure policies.
• Use the
Anomaly Detection and Prevention
(ADP) screens (
) to detect traffic
with protocol anomalies and take appropriate action.
• Use the
Session Control
screens (see
) to limit the number of concurrent NAT/
security policies traffic sessions a client can use.
25.3.1 What You Need to Know
Stateful Inspection
The Zyxel Device uses stateful inspection in its security policies. The Zyxel Device restricts access by
screening data packets against defined access rules. It also inspects sessions. For example, traffic from
one zone is not allowed unless it is initiated by a computer in another zone first.
Zones
A zone is a group of interfaces. Group the Zyxel Device’s interfaces into different zones based on your
needs. You can configure security policies for data passing between zones or even between interfaces.
Click this icon for more information on Application Patrol, which identifies traffic that
passes through the Zyxel Device, so you can decide what to do with specific types
of traffic. Traffic not recognized by application patrol is ignored.
• Security Service > Application Patrol
Click this icon for more information on Content Filter, which controls access to
specific web sites or web content.
• Security Service > Content Filter
Click this icon for more information on IPSec and SSL VPN. Internet Protocol Security
(IPSec) VPN connects IPSec routers or remote users using IPSec client software. SSL
VPN allows users to use a web browser for secure remote user login without need of
a VPN router or VPN client software.
• VPN > IPSec VPN
• VPN > SSL VPN
Click this icon to download VPN client software.
• VPN > IPSec VPN
• VPN > SSL VPN
Click this icon for more information on the Wireless AP Controller which sets how the
Zyxel Device allows APs to connect to the wireless network.
• Wireless > AP Management > Mgnt. AP List
Table 188 OneSecurity Icons (continued)
ONESECURITY ICON
SCREEN