Chapter 34 IDP
ZyWALL USG 100/200 Series User’s Guide
617
34.6.3 IDP Service Groups
An IDP service group is a set of related packet inspection signatures.
Scan
A scan describes the action of searching a network for an exposed
service. An attack may then occur once a vulnerability has been
found. Scans occur on several network levels.
A network scan occurs at layer-3. For example, an attacker looks for
network devices such as a router or server running in an IP network.
A scan on a protocol is commonly referred to as a layer-4 scan. For
example, once an attacker has found a live end system, he looks for
open ports.
A scan on a service is commonly referred to a layer-7 scan. For
example, once an attacker has found an open port, say port 80 on a
server, he determines that it is a HTTP service run by some web
server application. He then uses a web vulnerability scanner (for
example, Nikto) to look for documented vulnerabilities.
Buffer Overflow
A buffer overflow occurs when a program or process tries to store
more data in a buffer (temporary data storage area) than it was
intended to hold. The excess information can overflow into adjacent
buffers, corrupting or overwriting the valid data held in them.
Intruders could run codes in the overflow buffer region to obtain
control of the system, install a backdoor or use the victim to launch
attacks on other devices.
Virus/Worm
A computer virus is a small program designed to corrupt and/or alter
the operation of other legitimate programs. A worm is a program that
is designed to copy itself from one computer to another on a network.
A worm’s uncontrolled replication consumes system resources, thus
slowing or stopping other tasks.
Backdoor/Trojan
A backdoor (also called a trapdoor) is hidden software or a hardware
mechanism that can be triggered to gain access to a program, online
service or an entire computer system. A Trojan horse is a harmful
program that is hidden inside apparently harmless programs or data.
Although a virus, a worm and a Trojan are different types of attacks,
they can be blended into one attack. For example, W32/Blaster and
W32/Sasser are blended attacks that feature a combination of a
worm and a Trojan.
Access Control
Access control refers to procedures and controls that limit or detect
access. Access control attacks try to bypass validation checks in order
to access network resources such as servers, directories, and files.
Web Attack
Web attacks refer to attacks on web servers such as IIS (Internet
Information Services).
Table 165
Policy Types (continued)
POLICY TYPE
DESCRIPTION
Table 166
IDP Service Groups
WEB_PHP WEB_MISC
WEB_IIS
WEB_FRONTPAGE
WEB_CGI WEB_ATTACKS
TFTP
TELNET
Summary of Contents for ZyWALL USG 100 Series
Page 2: ......
Page 30: ...Table of Contents ZyWALL USG 100 200 Series User s Guide 30 ...
Page 31: ...31 PART I User s Guide ...
Page 32: ...32 ...
Page 46: ...Chapter 2 Features and Applications ZyWALL USG 100 200 Series User s Guide 46 ...
Page 64: ...Chapter 3 Web Configurator ZyWALL USG 100 200 Series User s Guide 64 ...
Page 186: ...Chapter 7 Tutorials ZyWALL USG 100 200 Series User s Guide 186 ...
Page 223: ...Chapter 8 L2TP VPN Example ZyWALL USG 100 200 Series User s Guide 223 ...
Page 224: ...Chapter 8 L2TP VPN Example ZyWALL USG 100 200 Series User s Guide 224 ...
Page 225: ...225 PART II Technical Reference ...
Page 226: ...226 ...
Page 240: ...Chapter 9 Dashboard ZyWALL USG 100 200 Series User s Guide 240 ...
Page 284: ...Chapter 10 Monitor ZyWALL USG 100 200 Series User s Guide 284 ...
Page 372: ...Chapter 13 Interfaces ZyWALL USG 100 200 Series User s Guide 372 ...
Page 382: ...Chapter 14 Trunks ZyWALL USG 100 200 Series User s Guide 382 ...
Page 398: ...Chapter 15 Policy and Static Routes ZyWALL USG 100 200 Series User s Guide 398 ...
Page 412: ...Chapter 16 Routing Protocols ZyWALL USG 100 200 Series User s Guide 412 ...
Page 432: ...Chapter 19 NAT ZyWALL USG 100 200 Series User s Guide 432 ...
Page 437: ...Chapter 20 HTTP Redirect ZyWALL USG 100 200 Series User s Guide 437 ...
Page 438: ...Chapter 20 HTTP Redirect ZyWALL USG 100 200 Series User s Guide 438 ...
Page 460: ...Chapter 23 Authentication Policy ZyWALL USG 100 200 Series User s Guide 460 ...
Page 478: ...Chapter 24 Firewall ZyWALL USG 100 200 Series User s Guide 478 ...
Page 519: ...Chapter 25 IPSec VPN ZyWALL USG 100 200 Series User s Guide 519 ...
Page 520: ...Chapter 25 IPSec VPN ZyWALL USG 100 200 Series User s Guide 520 ...
Page 534: ...Chapter 26 SSL VPN ZyWALL USG 100 200 Series User s Guide 534 ...
Page 544: ...Chapter 27 SSL User Screens ZyWALL USG 100 200 Series User s Guide 544 ...
Page 546: ...Chapter 28 SSL User Application Screens ZyWALL USG 100 200 Series User s Guide 546 ...
Page 554: ...Chapter 29 SSL User File Sharing ZyWALL USG 100 200 Series User s Guide 554 ...
Page 639: ...Chapter 34 IDP ZyWALL USG 100 200 Series User s Guide 639 ...
Page 640: ...Chapter 34 IDP ZyWALL USG 100 200 Series User s Guide 640 ...
Page 661: ...Chapter 35 ADP ZyWALL USG 100 200 Series User s Guide 661 ...
Page 662: ...Chapter 35 ADP ZyWALL USG 100 200 Series User s Guide 662 ...
Page 694: ...Chapter 37 Content Filter Reports ZyWALL USG 100 200 Series User s Guide 694 ...
Page 712: ...Chapter 38 Anti Spam ZyWALL USG 100 200 Series User s Guide 712 ...
Page 734: ...Chapter 39 Device HA ZyWALL USG 100 200 Series User s Guide 734 ...
Page 750: ...Chapter 40 User Group ZyWALL USG 100 200 Series User s Guide 750 ...
Page 756: ...Chapter 41 Addresses ZyWALL USG 100 200 Series User s Guide 756 ...
Page 768: ...Chapter 43 Schedules ZyWALL USG 100 200 Series User s Guide 768 ...
Page 784: ...Chapter 45 Authentication Method ZyWALL USG 100 200 Series User s Guide 784 ...
Page 806: ...Chapter 46 Certificates ZyWALL USG 100 200 Series User s Guide 806 ...
Page 818: ...Chapter 48 SSL Application ZyWALL USG 100 200 Series User s Guide 818 ...
Page 828: ...Chapter 49 Endpoint Security ZyWALL USG 100 200 Series User s Guide 828 ...
Page 880: ...Chapter 50 System ZyWALL USG 100 200 Series User s Guide 880 ...
Page 920: ...Chapter 54 Reboot ZyWALL USG 100 200 Series User s Guide 920 ...
Page 922: ...Chapter 55 Shutdown ZyWALL USG 100 200 Series User s Guide 922 ...
Page 942: ...Chapter 56 Troubleshooting ZyWALL USG 100 200 Series User s Guide 942 ...
Page 954: ...Chapter 57 Product Specifications ZyWALL USG 100 200 Series User s Guide 954 ...
Page 1126: ...Appendix F Open Software Announcements ZyWALL USG 100 200 Series User s Guide 1126 ...