ZyXEL Communications ZyWALL 10/10 Uživatelská příručka

Procházejte online nebo si stáhněte Uživatelská příručka pro Směrovače ZyXEL Communications ZyWALL 10/10. ZyXEL Communications ZyWALL 10/10 User`s guide Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 124
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků

Shrnutí obsahu

Strany 1 - ZyWALL IDP 10

ZyWALL IDP 10Intrusion Detection and Prevention ApplianceUser’s GuideVer si on 2 . 03/2005

Strany 2 - Copyright

ZyWALL IDP 10 User’s GuideTable of Contents 106.3.14 Policy Actions ...

Strany 3 - Statement

ZyWALL IDP 10 User’s GuideChapter 8 Maintenance 100After you see a “configuration upload successful” screen, you must then wait one minute before logg

Strany 4 - Safety Warnings

ZyWALL IDP 10 User’s Guide101 Chapter 8 Maintenance

Strany 5 - ZyXEL Limited Warranty

ZyWALL IDP 10 User’s GuideChapter 9 Command Line Interface Overview 102CHAPTER 9Command Line InterfaceOverview This chapter briefly introduces the co

Strany 6 - Customer Support

ZyWALL IDP 10 User’s Guide103 Chapter 9 Command Line Interface Overview [on|off] means that you can use either on or off.6 “Command” refers to a comma

Strany 7 - 7 Customer Support

ZyWALL IDP 10 User’s GuideChapter 9 Command Line Interface Overview 104detect vpnbypass <ON/OFF> Allow/disallow bypass of VPN packets it doesn’

Strany 8 - Table of Contents

ZyWALL IDP 10 User’s Guide105 Chapter 9 Command Line Interface Overview Remote snmp on <LAN+MGMT/WAN+MGMT/MGMT/ALL>Enable remote snmp access fro

Strany 9

ZyWALL IDP 10 User’s GuideChapter 9 Command Line Interface Overview 106Help Displays a “help” messageReset Resets the ZyWALL to the factory defaults

Strany 10

ZyWALL IDP 10 User’s Guide107 Chapter 9 Command Line Interface Overview

Strany 11 - Appendix B

ZyWALL IDP 10 User’s GuideAppendix A Introduction to Intrusions 108Appendix AIntroduction to IntrusionsIntroduction to PortsComputers share informatio

Strany 12 - List of Figures

ZyWALL IDP 10 User’s Guide109 Appendix A Introduction to IntrusionsPing of DeathPing of Death uses a "ping" utility to create an IP packet t

Strany 13

ZyWALL IDP 10 User’s Guide11 Table of ContentsIntroduction to Ports ...

Strany 14 - List of Tables

ZyWALL IDP 10 User’s GuideAppendix A Introduction to Intrusions 110Figure 63 SYN FloodLAND Attack In a LAND attack, hackers flood SYN packets into t

Strany 15 - 15 List of Tables

ZyWALL IDP 10 User’s Guide111 Appendix A Introduction to IntrusionsFigure 64 Smurf AttackTracerouteTraceroute is a utility used to determine the pat

Strany 16 - Syntax Conventions

ZyWALL IDP 10 User’s GuideAppendix A Introduction to Intrusions 112A TCP connect() call is used to open a connection to every interesting port on the

Strany 17 - Graphics Icons Key

ZyWALL IDP 10 User’s Guide113 Appendix A Introduction to IntrusionsExample IntrusionsThe following are some examples of intrusions.SQL Slammer WormW32

Strany 18 - CHAPTER 1

ZyWALL IDP 10 User’s GuideAppendix A Introduction to Intrusions 114MyDoomMyDoom W32.Mydoom.A@mm (also known as W32.Novarg.A) is a mass-mailing worm th

Strany 19 - 1.2 Features

ZyWALL IDP 10 User’s Guide115 Appendix A Introduction to Intrusions

Strany 20 - 1.3 Application Examples

ZyWALL IDP 10 User’s GuideAppendix B Intrusion Protection 116Appendix BIntrusion ProtectionFirewalls and IntrusionsFirewalls are designed to block cle

Strany 21

ZyWALL IDP 10 User’s Guide117 Appendix B Intrusion ProtectionNetwork Intrusions Network-based intrusions have the goal of bringing down a network or n

Strany 22

ZyWALL IDP 10 User’s GuideAppendix B Intrusion Protection 118The protocol decode engine first applies rules defined by the appropriate RFCs to look fo

Strany 23

ZyWALL IDP 10 User’s Guide119 Appendix B Intrusion Protection

Strany 24 - CHAPTER 2

ZyWALL IDP 10 User’s GuideList of Figures 12List of FiguresFigure 1 ZyWALL ...

Strany 25 - Figure 7 Login Screen

ZyWALL IDP 10 User’s GuideIndex 120IndexNumerics10/100Mbps 36110V AC 4230V AC 4AAbnormal Working Conditions 5AC 4Access control 60Accessories 4Activat

Strany 26

ZyWALL IDP 10 User’s Guide121 IndexDNS server 30, 31DoS 19Basics 108Types 108duplex 36, 37Dust 4Ee-Donkey 53Electric Shock 4Electrocution 4E-MAIL 85E-

Strany 27 - 2.1.1 Navigation Panel

ZyWALL IDP 10 User’s GuideIndex 122License 2Lightning 4Liquids, Corrosive 4Local Upgrade 96Log Facility 88Login 103LOGS 84MMacro Virus 112Mail Server

Strany 28

ZyWALL IDP 10 User’s Guide123 IndexQQualified Service Personnel 4Quick Start Guide 24RRadio Communications 3Radio Frequency Energy 3Radio Interference

Strany 29

ZyWALL IDP 10 User’s GuideIndex 124syslog 27, 28, 30, 31, 32TTampering 5TCP connect() 112TCP Header 79TCP/IP 108TCP_RST 37Teardrop 109Telephone 6Telev

Strany 30 - CHAPTER 3

ZyWALL IDP 10 User’s Guide13 List of FiguresFigure 39 Search Example ...

Strany 31 - 3.2 Introduction to VLANs

ZyWALL IDP 10 User’s GuideList of Tables 14List of TablesTable 1 Web Configurator HOME Screen ...

Strany 32 - Chapter 3 General Settings 32

ZyWALL IDP 10 User’s Guide15 List of Tables

Strany 33 - 3.3.1 State

ZyWALL IDP 10 User’s GuidePreface 16PrefaceCongratulations on your purchase of the ZyWALL IDP 10. About This User's GuideCongratulations on your

Strany 34 - Table 6 General: State

ZyWALL IDP 10 User’s Guide17 PrefaceGraphics Icons KeyPrestige Computer ModemSwitch Firewall ServerIntrusion Block an intrusion Security Hole

Strany 35 - 35 Chapter 3 General Settings

ZyWALL IDP 10 User’s GuideChapter 1 Introducing the ZyWALL IDP 10 18CHAPTER 1Introducing the ZyWALL IDP 10This chapter introduces the main features an

Strany 36 - CHAPTER 4

ZyWALL IDP 10 User’s Guide19 Chapter 1 Introducing the ZyWALL IDP 10Figure 1 ZyWALL1.2 FeaturesLAN, WAN and Management PortsYou can also manage the

Strany 37 - 4.3 Stealth

ZyWALL IDP 10 User’s GuideCopyright 2CopyrightCopyright © 2005 by ZyXEL Communications Corporation.The contents of this publication may not be reprodu

Strany 38 - 4.4 Policy Check

ZyWALL IDP 10 User’s GuideChapter 1 Introducing the ZyWALL IDP 10 20• Traffic flow anomalies where certain applications such as peer-to-peer applicati

Strany 39 - 4.4.1 Policy Direction

ZyWALL IDP 10 User’s Guide21 Chapter 1 Introducing the ZyWALL IDP 10Figure 2 Installation Example 1In installation example 2 (see Figure 3 on page 2

Strany 40

ZyWALL IDP 10 User’s GuideChapter 1 Introducing the ZyWALL IDP 10 22Figure 4 Installation Example 3In installation example 4 (see Figure 5 on page 2

Strany 41

ZyWALL IDP 10 User’s Guide23 Chapter 1 Introducing the ZyWALL IDP 10

Strany 42 - CHAPTER 5

ZyWALL IDP 10 User’s GuideChapter 2 Introducing the Web Configurator 24CHAPTER 2Introducing the WebConfiguratorThis chapter describes how to access th

Strany 43 - 5.2 Configuring WWW

ZyWALL IDP 10 User’s Guide25 Chapter 2 Introducing the Web ConfiguratorFigure 7 Login Screen4 You should see a screen asking you to change your pass

Strany 44 - 5.3 SNMP

ZyWALL IDP 10 User’s GuideChapter 2 Introducing the Web Configurator 26Figure 9 Web Configurator HOME ScreenUse submenus to configure ZyWALL feature

Strany 45

ZyWALL IDP 10 User’s Guide27 Chapter 2 Introducing the Web Configurator2.1.1 Navigation PanelAfter you enter the password, use the sub-menus on the na

Strany 46 - 5.3.3 SNMP Configuration

ZyWALL IDP 10 User’s GuideChapter 2 Introducing the Web Configurator 282.4 Example Configuration SettingsThe following table shows an example setup f

Strany 47 - 5.4 SSH Overview

ZyWALL IDP 10 User’s Guide29 Chapter 2 Introducing the Web ConfiguratorGateway 10. 10. 1.254 (switch or router on LAN or DMZ)State INLINE Ports Settin

Strany 48 - Figure 21 How SSH Works

ZyWALL IDP 10 User’s Guide3 Federal Communications Commission (FCC) Interference StatementFederal CommunicationsCommission (FCC) InterferenceStatement

Strany 49 - 5.5.1 Example Using SSH

ZyWALL IDP 10 User’s GuideChapter 3 General Settings 30CHAPTER 3General SettingsThis chapter describes how to configure the ZyWALL’s TCP, VLAN and Sta

Strany 50 - Figure 23 PuTTY Settings

ZyWALL IDP 10 User’s Guide31 Chapter 3 General Settings3.2 Introduction to VLANsA VLAN (Virtual Local Area Network) allows a physical network to be p

Strany 51

ZyWALL IDP 10 User’s GuideChapter 3 General Settings 32The VLAN ID associates a frame with a specific VLAN and provides the information that switches

Strany 52 - CHAPTER 6

ZyWALL IDP 10 User’s Guide33 Chapter 3 General SettingsFigure 11 General: VLANThe following table describes the fields in this screen.3.3.1 StateTo

Strany 53 - 6.3 Signature Categories

ZyWALL IDP 10 User’s GuideChapter 3 General Settings 34Table 6 General: StateLABEL DESCRIPTIONDevice Operation State SetupDevice Operation State:Inl

Strany 54 - 6.3.2 IM

ZyWALL IDP 10 User’s Guide35 Chapter 3 General Settings

Strany 55 - 6.3.4 DoS/DDoS

ZyWALL IDP 10 User’s GuideChapter 4 Interface Screens 36CHAPTER 4Interface ScreensThis chapter shows you how to configure the ZyWALL ports.4.1 10/100

Strany 56 - 6.3.5 Scan

ZyWALL IDP 10 User’s Guide37 Chapter 4 Interface ScreensFigure 13 Interface: LinkThe following table describes the fields in this screen.4.3 Stealt

Strany 57 - 6.3.6 Buffer Overflow

ZyWALL IDP 10 User’s GuideChapter 4 Interface Screens 38Figure 14 Interface: StealthThe following table describes the fields in this screen.4.4 Pol

Strany 58 - 6.3.7 Virus/Worm

ZyWALL IDP 10 User’s Guide39 Chapter 4 Interface ScreensFigure 15 Policy Checking4.4.1 Policy DirectionDo not confuse policy check with a policy ru

Strany 59 - 6.3.8 Backdoor/Trojan

ZyWALL IDP 10 User’s GuideSafety Warnings 4Safety WarningsFor your safety, be sure to read and follow all warning notices and instructions.• Do NOT op

Strany 60 - 6.3.9 Access Control

ZyWALL IDP 10 User’s GuideChapter 4 Interface Screens 40Figure 16 Interface: Policy CheckThe following table describes the fields in this screen.Tab

Strany 61 - 6.3.10 Web Attack

ZyWALL IDP 10 User’s Guide41 Chapter 4 Interface Screens

Strany 62 - 6.3.11 Porn

ZyWALL IDP 10 User’s GuideChapter 5 Remote Management 42CHAPTER 5Remote ManagementThe remote management screens allow you to which ports are allowed w

Strany 63 - 6.3.12 Others

ZyWALL IDP 10 User’s Guide43 Chapter 5 Remote ManagementHTTPS connection requests from an SSL-aware web browser go to port 443 (by default) on the ZyW

Strany 64 - 6.3.13 Policy Severity

ZyWALL IDP 10 User’s GuideChapter 5 Remote Management 445.3 SNMPSimple Network Management Protocol is a protocol used for exchanging management infor

Strany 65 - 6.3.14 Policy Actions

ZyWALL IDP 10 User’s Guide45 Chapter 5 Remote ManagementFigure 18 SNMP Management ModelAn SNMP managed network consists of two main types of compone

Strany 66 - Chapter 6 IDP Policies 66

ZyWALL IDP 10 User’s GuideChapter 5 Remote Management 46• GetNext - Allows the manager to retrieve the next object variable from a table or list withi

Strany 67 - 67 Chapter 6 IDP Policies

ZyWALL IDP 10 User’s Guide47 Chapter 5 Remote ManagementThe following table describes the fields in this screen.5.4 SSH OverviewUnlike Telnet or FTP,

Strany 68 - 6.4.1 Search Example

ZyWALL IDP 10 User’s GuideChapter 5 Remote Management 485.4.2 SSH Implementation on the ZyWALLYour ZyWALL supports SSH version 1.5 using RSA authenti

Strany 69 - 6.4.2 Query Example

ZyWALL IDP 10 User’s Guide49 Chapter 5 Remote ManagementFigure 22 Remote Management: SSH The following table describes the fields in this screen.5.5

Strany 70 - 6.4.3 Modify Screen

ZyWALL IDP 10 User’s Guide5 ZyXEL Limited WarrantyZyXEL Limited WarrantyZyXEL warrants to the original end user (purchaser) that this product is free

Strany 71 - 71 Chapter 6 IDP Policies

ZyWALL IDP 10 User’s GuideChapter 5 Remote Management 50Figure 23 PuTTY Settings4 You may see a PuTTY security alert next. Click Ye s to continue.F

Strany 72 - 6.5 Update

ZyWALL IDP 10 User’s Guide51 Chapter 5 Remote ManagementFigure 25 ZyWALL Command Interface Login Screen

Strany 73 - 6.6 User-defined Policies

ZyWALL IDP 10 User’s GuideChapter 6 IDP Policies 52CHAPTER 6IDP PoliciesThis chapter describes how to configure your ZyWALL’s IDP settings.6.1 IDP Ov

Strany 74 - Chapter 6 IDP Policies 74

ZyWALL IDP 10 User’s Guide53 Chapter 6 IDP PoliciesFor more information on mySecurity zone, please visit http://www.mysecurity.zyxel.com.6.3 Signatur

Strany 75 - 75 Chapter 6 IDP Policies

ZyWALL IDP 10 User’s GuideChapter 6 IDP Policies 54Figure 26 P2P Signatures6.3.2 IMIM (Instant Messaging) refers to chat applications. Chat is real

Strany 76 - Chapter 6 IDP Policies 76

ZyWALL IDP 10 User’s Guide55 Chapter 6 IDP PoliciesFigure 27 IM (Chat) Signatures6.3.3 SPAMSpam is unsolicited "junk" e-mail sent to larg

Strany 77 - 77 Chapter 6 IDP Policies

ZyWALL IDP 10 User’s GuideChapter 6 IDP Policies 56Figure 29 DoS/DDoS Signatures6.3.5 ScanScan refers to all port, IP or vulnerability scans. Hacke

Strany 78 - Chapter 6 IDP Policies 78

ZyWALL IDP 10 User’s Guide57 Chapter 6 IDP PoliciesFigure 30 Scan Signatures6.3.6 Buffer OverflowA buffer overflow occurs when a program or process

Strany 79 - 79 Chapter 6 IDP Policies

ZyWALL IDP 10 User’s GuideChapter 6 IDP Policies 58Figure 31 Buffer Overflow Signatures6.3.7 Virus/WormA computer virus is a small program designed

Strany 80 - 6.6.2 Packet Content Example

ZyWALL IDP 10 User’s Guide59 Chapter 6 IDP PoliciesFigure 32 Worm/Virus Signatures6.3.8 Backdoor/TrojanA backdoor (also called a trapdoor) is hidde

Strany 81 - 6.7 Registering your ZyWALL

ZyWALL IDP 10 User’s GuideCustomer Support 6Customer SupportPlease have the following information ready when you contact customer support.• Product mo

Strany 82 - Table 21 Registering ZyWALL

ZyWALL IDP 10 User’s GuideChapter 6 IDP Policies 60Figure 33 Backdoor/Trojan Signatures6.3.9 Access ControlAccess control refers to procedures and

Strany 83 - 83 Chapter 6 IDP Policies

ZyWALL IDP 10 User’s Guide61 Chapter 6 IDP PoliciesFigure 34 Access Control Signatures6.3.10 Web AttackWeb attack signatures refer to attacks on we

Strany 84 - CHAPTER 7

ZyWALL IDP 10 User’s GuideChapter 6 IDP Policies 62Figure 35 Web Attack Signatures6.3.11 PornThe ZyWALL can block web sites if their URLs contain c

Strany 85 - 7.2 Report

ZyWALL IDP 10 User’s Guide63 Chapter 6 IDP PoliciesFigure 36 Porn Signatures6.3.12 OthersThis category refers to signatures for attacks that do not

Strany 86 - Table 23 Report: E-Mail

ZyWALL IDP 10 User’s GuideChapter 6 IDP Policies 64Figure 37 Others Signatures6.3.13 Policy SeverityIntrusions are assigned a severity level based

Strany 87 - 7.2.2 Syslog

ZyWALL IDP 10 User’s Guide65 Chapter 6 IDP Policies6.3.14 Policy ActionsThe following table describes the (configurable) actions for a policy.6.4 Co

Strany 88 - 7.3 Alarm Schedule

ZyWALL IDP 10 User’s GuideChapter 6 IDP Policies 66Figure 38 Pre-defined IDP Policies SummaryTable 16 Selecting Pre-defined PoliciesLABEL DESCRIPT

Strany 89 - Table 25 Alarm

ZyWALL IDP 10 User’s Guide67 Chapter 6 IDP PoliciesPolicy Search You can search for policies based on policy name or ID number. Select By Name or By P

Strany 90 - CHAPTER 8

ZyWALL IDP 10 User’s GuideChapter 6 IDP Policies 686.4.1 Search ExampleThe following screen displays when you perform a search for the “Sasser” virus

Strany 91 - 8.3 Time and Date

ZyWALL IDP 10 User’s Guide69 Chapter 6 IDP PoliciesFigure 39 Search Example6.4.2 Query ExampleThe following screen shows severe and high impact DoS

Strany 92 - Chapter 8 Maintenance 92

ZyWALL IDP 10 User’s Guide7 Customer SupportUNITED [email protected] +44 (0) 1344 30304408707 555779 (UK only) www.zyxel.co.uk ZyXEL Communic

Strany 93 - Table 28 Time and Date

ZyWALL IDP 10 User’s GuideChapter 6 IDP Policies 70Figure 40 Query Example6.4.3 Modify ScreenClick Modify in Pre-defined IDP Policies Summary6-13 t

Strany 94 - Chapter 8 Maintenance 94

ZyWALL IDP 10 User’s Guide71 Chapter 6 IDP PoliciesFigure 41 Pre-defined Policies: ModifyTable 17 Pre-defined IDP PoliciesLABEL DESCRIPTIONALL Sel

Strany 95 - 8.4 Firmware Upload

ZyWALL IDP 10 User’s GuideChapter 6 IDP Policies 726.5 UpdateThe ZyWALL comes with a “pre-defined” set of policies that can be regularly updated. Reg

Strany 96 - Chapter 8 Maintenance 96

ZyWALL IDP 10 User’s Guide73 Chapter 6 IDP Policies6.6 User-defined PoliciesYou need some knowledge of packet header types and OSI (Open System Inter

Strany 97 - 97 Chapter 8 Maintenance

ZyWALL IDP 10 User’s GuideChapter 6 IDP Policies 74Figure 43 User-defined PoliciesTable 19 User-defined PoliciesLABEL DESCRIPTIONEnable User-defin

Strany 98 - 8.5 Configuration

ZyWALL IDP 10 User’s Guide75 Chapter 6 IDP PoliciesAlarm An alarm is an action (an e-mail is sent) to be taken on the policy when a packet matches a r

Strany 99 - 8.5.2 Restore Configuration

ZyWALL IDP 10 User’s GuideChapter 6 IDP Policies 766.6.1 Configuring a User-defined IDP PolicyAll “policy attributions” have a logical AND relationsh

Strany 100 - 8.6 Restart

ZyWALL IDP 10 User’s Guide77 Chapter 6 IDP PoliciesFigure 44 Configuring a User-defined IDP Policy

Strany 101 - 101 Chapter 8 Maintenance

ZyWALL IDP 10 User’s GuideChapter 6 IDP Policies 78Table 20 Configuring a User-defined IDP PolicyLABEL DESCRIPTIONAttributions The “attributions” de

Strany 102 - CHAPTER 9

ZyWALL IDP 10 User’s Guide79 Chapter 6 IDP PoliciesSource IP Select whether the policy applies to source packets that match (Equal), don’t match (Not

Strany 103 - 9.3 Commands

ZyWALL IDP 10 User’s GuideTable of Contents 8Table of ContentsCopyright ...

Strany 104

ZyWALL IDP 10 User’s GuideChapter 6 IDP Policies 806.6.2 Packet Content ExampleIn the following example, the rule is for the IP protocol, so the payl

Strany 105

ZyWALL IDP 10 User’s Guide81 Chapter 6 IDP Policies6.7 Registering your ZyWALLUse the Registration screen to enable IDP service on the ZyWALL. You ne

Strany 106

ZyWALL IDP 10 User’s GuideChapter 6 IDP Policies 82Figure 45 Registering ZyWALLTable 21 Registering ZyWALLLABEL DESCRIPTIONRegistration StatusThis

Strany 107

ZyWALL IDP 10 User’s Guide83 Chapter 6 IDP Policies

Strany 108 - Introduction to Intrusions

ZyWALL IDP 10 User’s GuideChapter 7 Log and Report 84CHAPTER 7Log and ReportThis chapter describes how to use the Log and Report screens.7.1 LogsTo v

Strany 109 - SYN Attack

ZyWALL IDP 10 User’s Guide85 Chapter 7 Log and Report7.2 ReportYou can send logs by e-mail or send them to a syslog server.7.2.1 E-MailUse the E-Mai

Strany 110 - Smurf Attack

ZyWALL IDP 10 User’s GuideChapter 7 Log and Report 86Figure 47 Report: E-MailThe following table describes the fields in this screen.Table 23 Repo

Strany 111 - Scanning

ZyWALL IDP 10 User’s Guide87 Chapter 7 Log and Report7.2.2 SyslogSyslog logging sends a log to an external syslog server used to store logs. Figure 4

Strany 112 - Malicious Programs

ZyWALL IDP 10 User’s GuideChapter 7 Log and Report 887.3 Alarm ScheduleAn alarm is a “warning log” generated by an event that warrants more serious a

Strany 113 - Example Intrusions

ZyWALL IDP 10 User’s Guide89 Chapter 7 Log and ReportTable 25 AlarmLABEL DESCRIPTIONAlarm ScheduleActive Select this field to activate your ZyWALL&a

Strany 114

ZyWALL IDP 10 User’s Guide9 Table of ContentsChapter 4Interface Screens ...

Strany 115

ZyWALL IDP 10 User’s GuideChapter 8 Maintenance 90CHAPTER 8Maintenance8.1 Maintenance OverviewUse the maintenance screens to change the ZyWALL passwo

Strany 116 - Intrusion Protection

ZyWALL IDP 10 User’s Guide91 Chapter 8 Maintenance8.2.1 Forget PasswordIf you forgot your password, then you will have to reset it to the factory def

Strany 117 - Detection Methods

ZyWALL IDP 10 User’s GuideChapter 8 Maintenance 928.3.1 Pre-defined NTP Time Servers ListThe ZyWALL uses the following pre-defined list of NTP time s

Strany 118 - Anomaly Analysis

ZyWALL IDP 10 User’s Guide93 Chapter 8 MaintenanceFigure 52 Maintenance: Time SettingTable 28 Time and DateLABEL DESCRIPTIONCurrent Time and DateC

Strany 119

ZyWALL IDP 10 User’s GuideChapter 8 Maintenance 948.3.2 Time Server SynchronizationClick the Synchronize Now button to get the time and date from the

Strany 120 - Numerics

ZyWALL IDP 10 User’s Guide95 Chapter 8 MaintenanceFigure 53 Synchronization in ProcessClick the Return button to go back to the Time and Date screen

Strany 121 - 121 Index

ZyWALL IDP 10 User’s GuideChapter 8 Maintenance 96Figure 56 Maintenance: F/W UploadTable 29 Maintenance: F/W UploadLABEL DESCRIPTIONLocal UpgradeF

Strany 122 - Index 122

ZyWALL IDP 10 User’s Guide97 Chapter 8 MaintenanceAfter you see the Firmware Upload in Process screen, wait two minutes before logging into the ZyWALL

Strany 123 - 123 Index

ZyWALL IDP 10 User’s GuideChapter 8 Maintenance 98Figure 58 Network Temporarily DisconnectedAfter two minutes, log in again and check your new firmw

Strany 124 - Index 124

ZyWALL IDP 10 User’s Guide99 Chapter 8 MaintenanceFigure 60 Maintenance: Configuration8.5.1 Backup ConfigurationBackup Configuration allows you to

Komentáře k této Příručce

Žádné komentáře