beautypg.com

Part iv: security – ZyXEL Communications NBG410W3G User Manual

Page 14

background image

Table of Contents

NBG410W3G Series User’s Guide

14

8.2 Wireless Security Overview ............................................................................................... 148

8.2.1 SSID ......................................................................................................................... 148
8.2.2 MAC Address Filter .................................................................................................. 148
8.2.3 User Authentication .................................................................................................. 149
8.2.4 Encryption ................................................................................................................ 149
8.2.5 Additional Installation Requirements for Using 802.1x ............................................. 151

8.3 Wireless Card ................................................................................................................... 151

8.3.1 SSID Profile ............................................................................................................. 153

8.4 Configuring Wireless Security ........................................................................................... 154

8.4.1 No Security ............................................................................................................... 156
8.4.2 Static WEP ............................................................................................................... 156
8.4.3 IEEE 802.1x Only ..................................................................................................... 157
8.4.4 IEEE 802.1x + Static WEP ....................................................................................... 158
8.4.5 WPA, WPA2, WPA2-MIX .......................................................................................... 160
8.4.6 WPA-PSK, WPA2-PSK, WPA2-PSK-MIX ................................................................. 161

8.5 MAC Filter ......................................................................................................................... 162

Part IV: Security ................................................................................... 165

Chapter 9
Firewall................................................................................................................................... 167

9.1 Firewall Overview ............................................................................................................. 167
9.2 Packet Direction Matrix ...................................................................................................... 168
9.3 Packet Direction Examples ................................................................................................ 169
9.4 Security Considerations ..................................................................................................... 170
9.5 Firewall Rules Example ..................................................................................................... 171
9.6 Asymmetrical Routes ......................................................................................................... 173

9.6.1 Asymmetrical Routes and IP Alias ........................................................................... 173

9.7 Firewall Default Rule ......................................................................................................... 173
9.8 Firewall Rule Summary .................................................................................................... 175

9.8.1 Firewall Edit Rule ................................................................................................. 177

9.9 Anti-Probing .................................................................................................................... 180
9.10 Firewall Thresholds ...................................................................................................... 181

9.10.1 Threshold Values ................................................................................................... 182

9.11 Threshold Screen ............................................................................................................. 182
9.12 Service ............................................................................................................................ 184

9.12.1 Firewall Edit Custom Service ................................................................................ 185

9.13 My Service Firewall Rule Example .................................................................................. 186

Chapter 10
Authentication Server........................................................................................................... 191