• 7z Archive (7z) | • AVI Video (avi) | • BMP Image (bmp) | • BZ2 Archive (bz2) |
• Executables (exe) | • Macromedia Flash Data (swf) | • GIF Image (gif) | • GZ Archive (gz) |
• JPG Image (jpg) | • MOV Video (mov) | • MP3 Audio (mp3) | • MPG Video (mpg) |
• MS Office Document (doc...) | • PDF Document (pdf) | • PNG Image (png) | • RAR Archive (rar) |
• RM Video (rm) | • RTF Document (rtf) | • TIFF Image (tif) | • WAV Audio (wav) |
• ZIP Archive (zip) |
label | description |
---|---|
General Setting | |
Enable | Select this checkbox to activate the anti-malware feature to protect your connected network from infection and the installation of malicious software. Selecting this checkbox also activates Threat Intelligence Machine Learning (TIML). TIML signatures come from the sandboxing inspection results and helps the Zyxel Device block possible malicious or suspicious files. |
Scan and detect EICAR test virus | Select this option to have the Zyxel Device check for an EICAR test file and treat it in the same way as a real malware file. The EICAR test file is a standardized test file for signature based anti-malware scanners. When the scanner detects the EICAR file, it responds in the same way as if it found real malware. The EICAR file can also be compressed to test whether the anti-malware software can detect it in a compressed file.EICAR |
Scan Mode | |
Express Mode | In this mode you can define which types of files are scanned using the File Type For Scan fields. The Zyxel Device then scans files by sending each file’s hash value to a cloud database using cloud query. This is the fastest scan mode. |
Stream Mode | In this mode the Zyxel Device scans all files for viruses using anti-malware signatures to detect known virus pattens, and Threat Intelligence Machine Learning. Threat Intelligence Machine Learning is a master cloud database containing malware patterns learned from all Zyxel Devices. This is the deepest scan mode. |
Hybrid Mode | In this mode you can define which types of files are scanned using the File Type For Scan fields. The Zyxel Device then scans files by sending each file’s hash value to a cloud database using cloud query. It also scans files using anti-malware signatures, and Threat Intelligence Machine Learning. This mode combines Express mode and Stream mode to offers a balance of speed and security. |
File Type For Scan | |
Available File Types | File types that can be checked by the Zyxel Device are listed here. Note that the files on this list are currently bypassed. To use this feature on a specific file type, click this file type and then click the right arrow button. See available file types in File Scanning Cloud Query Supported File Types. |
Applied File Types | File types that will be checked are listed here. If you don’t want a file type to be checked, click this file type and then click the left arrow button. |
Destroy infected file | When you select this check box, if a malware signature is matched, the Zyxel Device overwrites the infected portion of the file with zeros before being forwarded to the user. The uninfected portion of the file will pass through unmodified. |
Log | These are the log options: • no: Do not create a log when a packet matches a signature. • log: Create a log on the Zyxel Device when a packet matches a signature. • log alert: An alert is an emailed log for more serious events that may need more immediate attention. Select this option to have the Zyxel Device send an alert when a packet matches a signature(s). |
Check White List | Select this check box to have the Zyxel Device not perform the anti-malware check on files with names that match the white list patterns. |
Add | Click this to create a new entry. |
Edit | Select an entry and click this to be able to modify it. |
Remove | Select an entry and click this to delete it. |
Activate | To turn on an entry, select it and click Activate. |
Inactivate | To turn off an entry, select it and click Inactivate. |
Status | The activate (light bulb) icon is lit when the entry is active and dimmed when the entry is inactive. |
# | This is the entry’s index number in the list. |
File Pattern | This is the file name pattern. If a file’s name matches this pattern, the Zyxel Device does not check the file for malware. |
Check Black List | Select this check box to log and delete files with names that match the black list patterns. |
Add | Click this to create a new entry. |
Edit | Select an entry and click this to be able to modify it. |
Remove | Select an entry and click this to delete it. |
Activate | To turn on an entry, select it and click Activate. |
Inactivate | To turn off an entry, select it and click Inactivate. |
Status | The activate (light bulb) icon is lit when the entry is active and dimmed when the entry is inactive. |
# | This is the entry’s index number in the list. |
File Pattern | This is the file name pattern. If a file’s name that matches this pattern, the Zyxel Device logs and then destroys the file. |
File decompression | |
Enable file decompression (ZIP and RAR) | Select this check box to have the Zyxel Device scan a compressed file (the file does not need to have a “zip” or “rar” file extension). The Zyxel Device first decompresses the file and then scans the contents for malware. The Zyxel Device decompresses a compressed file once. The Zyxel Device does NOT decompress any file(s) within a compressed file. |
Destroy compressed files that could not be decompressed | When you select this check box, the Zyxel Device deletes compressed files that use password encryption. Select this check box to have the Zyxel Device delete any compressed files that it cannot decompress. The Zyxel Device cannot decompress password protected files or a file within another compressed file. There are also limits to the number of compressed files that the Zyxel Device can concurrently decompress. The Zyxel Device’s firmware package cannot go through the Zyxel Device with this check box enabled. The Zyxel Device classifies the firmware package as a file that cannot be decompressed and then deletes it. Clear this check box when you download a firmware package from the Zyxel website. It’s OK to upload a firmware package to the Zyxel Device with the check box selected. |
Signature Information | The following fields display information on the current signature set that the Zyxel Device is using. |
Current Version | This field displays the signature set version number currently used by the Zyxel Device. This number gets larger as the set is enhanced. |
Released Date | This field displays the date and time the set was released. |
Threat Intelligence Machine Learning | The following fields display information on the Threat Intelligence Machine Learning signatures that the Zyxel Device is using. |
Current Version | This field displays the TIML version number currently used by the Zyxel Device. |
Released Date | This field displays the date and time this version was released. |
Update Signatures | Click this link to go to the screen you can use to download signatures from the update server. |
Apply | Click Apply to save your changes. |
Reset | Click Reset to return the screen to its last-saved settings. |
LABEL | Description |
---|---|
Check White List | Select this check box to have the Zyxel Device not perform the anti-malware check on files with names or algorithm (MD5 Hash) that match the white list patterns. |
Add | Click this to create a new entry. |
Edit | Select an entry and click this to be able to modify it. |
Remove | Select an entry and click this to delete it. |
Activate | To turn on an entry, select it and click Activate. |
Inactivate | To turn off an entry, select it and click Inactivate. |
# | This is the entry’s index number in the list. |
Status | The activate (light bulb) icon is lit when the entry is active and dimmed when the entry is inactive. |
Type | This field displays the type (MD5 Hash or File Pattern) used to distinguish whether a file should be allowed. Select the type (MD5 Hash or File Pattern) that you want to use to distinguish whether a file should be allowed. |
Value | This field displays the file or encryption pattern of the entry. Enter the file or encryption pattern for this entry. Specify a pattern to identify the names of files that the Zyxel Device should not scan for viruses. • Use up to 80 characters. Alphanumeric characters, underscores (_), dashes (-), question marks (?) and asterisks (*) are allowed. • A question mark (?) lets a single character in the file name vary. For example, use “a?.zip” (without the quotation marks) to specify aa.zip, ab.zip and so on. • Wildcards (*) let multiple files match the pattern. For example, use “*a.zip” (without the quotation marks) to specify any file that ends with “a.zip”. A file named “testa.zip would match. There could be any number (of any type) of characters in front of the “a.zip” at the end and the file name would still match. A file named “test.zipa” for example would not match. • A * in the middle of a pattern has the Zyxel Device check the beginning and end of the file name and ignore the middle. For example, with “abc*.zip”, any file starting with “abc” and ending in “.zip” matches, no matter how many characters are in between. • The whole file name has to match if you do not use a question mark or asterisk. • If you do not use a wildcard, the Zyxel Device checks up to the first 80 characters of a file name. |
Apply | Click Apply to save your changes back to the Zyxel Device. |
Reset | Click Reset to return the screen to its last-saved settings. |
LABEL | Description |
---|---|
Check Black List | Select this check box to log and delete files with names or encryption algorithm (MD5 Hash) that match the black list patterns. |
Add | Click this to create a new entry. |
Edit | Select an entry and click this to be able to modify it. |
Remove | Select an entry and click this to delete it. |
Activate | To turn on an entry, select it and click Activate. |
Inactivate | To turn off an entry, select it and click Inactivate. |
# | This is the entry’s index number in the list. |
Status | The activate (light bulb) icon is lit when the entry is active and dimmed when the entry is inactive. |
Type | This field displays the type (MD5 Hash or File Pattern) used to distinguish whether a file should be blocked. Select the type (MD5 Hash or File Pattern) that you want to use to distinguish whether a file should be blocked. |
Value | This field displays the file or encryption pattern of the entry. Enter a file pattern that would cause the Zyxel Device to log and modify this file. • Use up to 80 characters. Alphanumeric characters, underscores (_), dashes (-), question marks (?) and asterisks (*) are allowed. • A question mark (?) lets a single character in the file name vary. For example, use “a?.zip” (without the quotation marks) to specify aa.zip, ab.zip and so on. • Wildcards (*) let multiple files match the pattern. For example, use “*a.zip” (without the quotation marks) to specify any file that ends with “a.zip”. A file named “testa.zip would match. There could be any number (of any type) of characters in front of the “a.zip” at the end and the file name would still match. A file named “test.zipa” for example would not match. • A * in the middle of a pattern has the Zyxel Device check the beginning and end of the file name and ignore the middle. For example, with “abc*.zip”, any file starting with “abc” and ending in “.zip” matches, no matter how many characters are in between. • The whole file name has to match if you do not use a question mark or asterisk. • If you do not use a wildcard, the Zyxel Device checks up to the first 80 characters of a file name. |
Apply | Click Apply to save your changes back to the Zyxel Device. |
Reset | Click Reset to return the screen to its last-saved settings. |
LABEL | Description |
---|---|
Signatures Search | Enter the name, part of the name or keyword of the signature(s) you want to find and click Search. This search is not case-sensitive and accepts numerical strings. |
Query Result | |
# | This is the entry’s index number in the list. |
Name | This is the name of the anti-malware signature. Click the Name column heading to sort your search results in ascending or descending order according to the signature name. Click a signature’s name to see details about the malware. |
Router# configure terminal Router(config)# secure-policy-style advance Router(config)# show secure-policy-style status secure-policy-style: advance |
Label | Description |
---|---|
Add | Click this to create a new entry. Select an entry and click Add to create a new entry after the selected entry. |
Edit | Double-click an entry or select it and click Edit to open a screen where you can modify the entry’s settings. |
Remove | Select an entry and click Remove to delete the selected entry. |
# | This field is a sequential value showing the number of the profile. The profile order is not important. |
Name | This displays the name of the profile created. |
Description | This displays the description of the profile. |
label | description |
---|---|
General Setting | |
Name | Type the name of the profile. You may use 1-31 alphanumeric characters, underscores(_), or dashes (-), but the first character cannot be a number. This value is case-sensitive. These are valid, unique profile names: • MyProfile • mYProfile • Mymy12_3-4 These are invalid profile names: • 1mYProfile • My Profile • MyProfile? • Whatalongprofilename123456789012 |
Description | Type a description for the profile rule to help identify the purpose of rule. You may use 1-31 alphanumeric characters, underscores (_), or dashes (-), but the first character cannot be a number. This value is case-sensitive. This field is optional. |
Actions When Matched | |
Destroy infected file | When you select this check box, if a malware signature is matched, the Zyxel Device overwrites the infected portion of the file with zeros before being forwarded to the user. The uninfected portion of the file will pass through unmodified. |
Log | These are the log options: • no: Do not create a log when a packet matches a signature. • log: Create a log on the Zyxel Device when a packet matches a signature. • log alert: An alert is an emailed log for more serious events that may need more immediate attention. Select this option to have the Zyxel Device send an alert when a packet matches a signature(s). |
Scan Options | |
Check White List | Select this check box to have the Zyxel Device not perform the anti-malware check on files with names that match the white list patterns. |
Check Black List | Select this check box to log and delete files with names that match the black list patterns. |
File decompression | |
Enable file decompression (ZIP and RAR) | Select this check box to have the Zyxel Device scan a compressed file (the file does not need to have a “zip” or “rar” file extension). The Zyxel Device first decompresses the file and then scans the contents for malware. The Zyxel Device decompresses a compressed file once. The Zyxel Device does NOT decompress any file(s) within a compressed file. |
Destroy compressed files that could not be decompressed | When you select this check box, the Zyxel Device deletes compressed files that use password encryption. Select this check box to have the Zyxel Device delete any compressed files that it cannot decompress. The Zyxel Device cannot decompress password protected files or a file within another compressed file. There are also limits to the number of compressed files that the Zyxel Device can concurrently decompress. The Zyxel Device’s firmware package cannot go through the Zyxel Device with this check box enabled. The Zyxel Device classifies the firmware package as a file that cannot be decompressed and then deletes it. Clear this check box when you download a firmware package from the Zyxel website. It’s OK to upload a firmware package to the Zyxel Device with the check box selected. |
OK | Click OK to save your changes back to the Zyxel Device. |
Cancel | Click Cancel to exit this screen without saving. |
label | description |
---|---|
General Setting | |
Enable | Select this checkbox to activate the anti-malware feature to protect your connected network from infection and the installation of malicious software. Selecting this checkbox also activates Threat Intelligence Machine Learning (TIML). TIML signatures come from the sandboxing inspection results and helps the Zyxel Device block possible malicious or suspicious files. |
Inspect all traffic, setting: | Select this to have all traffic inspected by the default_profile. You cannot rename or delete the default_profile profile, but you can edit it by clicking the link here. |
Inspect by policy | If you configured a specific profile in the Profile tab for this service, select this to have specific traffic inspected by that profile. You must bind the profile to a policy in Security Policy > Policy Control. |
Scan and detect EICAR test virus | Select this option to have the Zyxel Device check for an EICAR test file and treat it in the same way as a real malware file. The EICAR test file is a standardized test file for signature based anti-malware scanners. When the scanner detects the EICAR file, it responds in the same way as if it found real malware. The EICAR file can also be compressed to test whether the anti-malware software can detect it in a compressed file.EICAR |
Scan Mode | |
Express Mode | In this mode you can define which types of files are scanned using the File Type For Scan fields. The Zyxel Device then scans files by sending each file’s hash value to a cloud database using cloud query. This is the fastest scan mode. |
Stream Mode | In this mode the Zyxel Device scans all files for viruses using anti-malware signatures to detect known virus pattens, and Threat Intelligence Machine Learning. Threat Intelligence Machine Learning is a master cloud database containing malware patterns learned from all Zyxel Devices. This is the deepest scan mode. |
Hybrid Mode | In this mode you can define which types of files are scanned using the File Type For Scan fields. The Zyxel Device then scans files by sending each file’s hash value to a cloud database using cloud query. It also scans files using anti-malware signatures, and Threat Intelligence Machine Learning. This mode combines Express mode and Stream mode to offers a balance of speed and security. |
File Type For Scan | |
Available File Types | File types that can be checked by the Zyxel Device are listed here. Note that the files on this list are currently bypassed. To use this feature on a specific file type, click this file type and then click the right arrow button. See available file types in File Scanning Cloud Query Supported File Types. |
Applied File Types | File types that will be checked are listed here. If you don’t want a file type to be checked, click this file type and then click the left arrow button. |
Signature Information | The following fields display information on the current signature set that the Zyxel Device is using. |
Current Version | This field displays the signature set version number currently used by the Zyxel Device. This number gets larger as the set is enhanced. |
Released Date | This field displays the date and time the set was released. |
Threat Intelligence Machine Learning | The following fields display information on the Threat Intelligence Machine Learning signatures that the Zyxel Device is using. |
Current Version | This field displays the TIML version number currently used by the Zyxel Device. |
Released Date | This field displays the date and time this version was released. |
Update Signatures | Click this link to go to the screen you can use to download signatures from the update server. |
Apply | Click Apply to save your changes. |
Reset | Click Reset to return the screen to its last-saved settings. |
Router# configure terminal Router(config)# secure-policy-style general Router(config)# show secure-policy-style status secure-policy-style: general |