Part iv: security – ZyXEL Communications NBG410W3G User Manual
Page 14

Table of Contents
NBG410W3G Series User’s Guide
14
8.2.1 SSID ......................................................................................................................... 148
8.2.2 MAC Address Filter .................................................................................................. 148
8.2.3 User Authentication .................................................................................................. 149
8.2.4 Encryption ................................................................................................................ 149
8.2.5 Additional Installation Requirements for Using 802.1x ............................................. 151
8.4.1 No Security ............................................................................................................... 156
8.4.2 Static WEP ............................................................................................................... 156
8.4.3 IEEE 802.1x Only ..................................................................................................... 157
8.4.4 IEEE 802.1x + Static WEP ....................................................................................... 158
8.4.5 WPA, WPA2, WPA2-MIX .......................................................................................... 160
8.4.6 WPA-PSK, WPA2-PSK, WPA2-PSK-MIX ................................................................. 161
9.1 Firewall Overview ............................................................................................................. 167
9.2 Packet Direction Matrix ...................................................................................................... 168
9.3 Packet Direction Examples ................................................................................................ 169
9.4 Security Considerations ..................................................................................................... 170
9.5 Firewall Rules Example ..................................................................................................... 171
9.6 Asymmetrical Routes ......................................................................................................... 173
9.7 Firewall Default Rule ......................................................................................................... 173
9.8 Firewall Rule Summary .................................................................................................... 175
9.9 Anti-Probing .................................................................................................................... 180
9.10 Firewall Thresholds ...................................................................................................... 181
9.11 Threshold Screen ............................................................................................................. 182
9.12 Service ............................................................................................................................ 184