beautypg.com

ZyXEL Communications 5 Series User Manual

Page 15

background image

ZyWALL 5/35/70 Series User’s Guide

Table of Contents

15

10.9.1 Introduction to RADIUS ........................................................................200

10.9.1.1 Types of RADIUS Messages .......................................................200

10.9.2 EAP Authentication Overview ...............................................................201

10.10 Dynamic WEP Key Exchange ......................................................................202

10.11 Introduction to WPA ......................................................................................202

10.11.1 User Authentication .............................................................................202

10.11.2 Encryption ...........................................................................................202

10.12 WPA-PSK Application Example ...................................................................203

10.13 Introduction to RADIUS ................................................................................204

10.14 WPA with RADIUS Application Example ......................................................204

10.15 Wireless Client WPA Supplicants .................................................................205

10.16 Wireless Card .............................................................................................205

10.16.1 Static WEP ..........................................................................................207

10.16.2 WPA-PSK ...........................................................................................208

10.16.3 WPA ....................................................................................................210

10.16.4 IEEE 802.1x + Dynamic WEP ............................................................ 211

10.16.5 IEEE 802.1x + Static WEP ..................................................................212

10.16.6 IEEE 802.1x + No WEP ......................................................................214

10.16.7 No Access 802.1x + Static WEP .........................................................215

10.16.8 No Access 802.1x + No WEP .............................................................216

10.17 MAC Filter ...................................................................................................217

Chapter 11
Firewall ..................................................................................................................
219

11.1 Firewall Overview ..........................................................................................219

11.2 Packet Direction Matrix ..................................................................................220

11.3 Packet Direction Examples ............................................................................221

11.3.1 To VPN Packet Direction .......................................................................222

11.3.2 From VPN Packet Direction ..................................................................224

11.3.3 From VPN To VPN Packet Direction .....................................................225

11.4 Security Considerations .................................................................................226

11.5 Firewall Rules Example ..................................................................................227

11.6 Asymmetrical Routes .....................................................................................229

11.6.1 Asymmetrical Routes and IP Alias ........................................................229

11.7 Firewall Default Rule (Router Mode) ..............................................................230

11.8 Firewall Default Rule (Bridge Mode) ............................................................232

11.9 Firewall Rule Summary .................................................................................234

11.9.1 Firewall Edit Rule ..............................................................................235

11.10 Anti-Probing ..............................................................................................238

11.11 Firewall Thresholds ....................................................................................239

11.11.1 Threshold Values .................................................................................240

11.12 Threshold Screen .........................................................................................240

11.13 Service ........................................................................................................242