ZyWALL IDP 10 User’s Guide
IDP Policies
6-9
Figure 6-9 Access Control Signatures
6.3.10 Web Attack
Web attack signatures refer to attacks on web servers such as IIS.
To find a list of all web attack related signatures supported by the ZyWALL, do a policy search by
name or policy query by type (
Web Attack
). The following screen shows some of the web attack
related signatures supported by the ZyWALL at the time of writing.
Summary of Contents for ZyXEL ZyWALL IDP 10
Page 1: ...ZyWALL IDP 10 Intrusion Detection Prevention Appliance User s Guide Version 1 July 2004 ...
Page 28: ......
Page 45: ...IDP III P Pa ar rt t I II II I IDP This part covers configuration of the IDP Policy screens ...
Page 46: ......
Page 60: ...ZyWALL IDP 10 User s Guide 6 14 IDP Policies Figure 6 13 Pre defined IDP Policies Summary ...
Page 106: ......