Table of Contents
ZyWALL ATP Series User’s Guide
17
28.3.1 URL Threat Filter White List Screen
...................................................................................
593
28.3.2 URL Threat Filter Black List Screen
....................................................................................
594
Chapter 29
IDP
.....................................................................................................................................................
596
29.1 Overview
.....................................................................................................................................
596
29.1.1 What You Can Do in this Chapter
...................................................................................
596
29.1.2 What You Need To Know
.................................................................................................
596
29.1.3 Before You Begin
...............................................................................................................
596
29.2 The IDP Screen
............................................................................................................................
597
29.2.1 Query Example
..................................................................................................................
601
29.3 IDP Custom Signatures
..............................................................................................................
602
29.3.1 Add / Edit Custom Signatures
.........................................................................................
603
29.3.2 Custom Signature Example
.............................................................................................
607
29.3.3 Applying Custom Signatures
............................................................................................
609
29.3.4 Verifying Custom Signatures
............................................................................................
610
29.4 The White List Screen
.................................................................................................................
610
29.5 IDP Technical Reference
...........................................................................................................
611
Chapter 30
Sandboxing
......................................................................................................................................
614
30.1 Overview
.....................................................................................................................................
614
30.1.1 What You Need to Know
.................................................................................................
615
30.2 Sandboxing Screen
....................................................................................................................
615
Chapter 31
Email Security
...................................................................................................................................
618
31.1 Overview
.....................................................................................................................................
618
31.1.1 What You Can Do in this Chapter
...................................................................................
618
31.1.2 What You Need to Know
.................................................................................................
618
31.2 Before You Begin
........................................................................................................................
619
31.3 The Email Security Screen
..........................................................................................................
620
31.4 The Black List / White List Screen
...............................................................................................
622
31.4.1 The Black or White List Add/Edit Screen
.........................................................................
623
31.4.2 Regular Expressions in Black or White List Entries
...........................................................
625
31.5 Email Security Technical Reference
.........................................................................................
625
Chapter 32
SSL Inspection
...................................................................................................................................
629
32.1 Overview
.....................................................................................................................................
629
32.1.1 What You Can Do in this Chapter
...................................................................................
629
32.1.2 What You Need To Know
.................................................................................................
629
32.1.3 Before You Begin
...............................................................................................................
630