ZyWALL IDP 10 User’s Guide
IDP Policies
6-7
Figure 6-7 Worm/Virus Signatures
6.3.8 Backdoor/Trojan
A backdoor (also called a trapdoor) is
hidden
software or a hardware mechanism that can be triggered
to
gain access to a program, online service or an entire computer system. A Trojan horse is a harmful
program that s hidden inside apparently harmless programs or data.
To find a list of all backdoor/Trojan related signatures supported by the ZyWALL, do a policy search
by name or policy query by type (
Backdoor/Trojan
). The following screen shows some of the
backdoor/Trojan related signatures supported by the ZyWALL at the time of writing.
Summary of Contents for ZyXEL ZyWALL IDP 10
Page 1: ...ZyWALL IDP 10 Intrusion Detection Prevention Appliance User s Guide Version 1 July 2004 ...
Page 28: ......
Page 45: ...IDP III P Pa ar rt t I II II I IDP This part covers configuration of the IDP Policy screens ...
Page 46: ......
Page 60: ...ZyWALL IDP 10 User s Guide 6 14 IDP Policies Figure 6 13 Pre defined IDP Policies Summary ...
Page 106: ......