Part iii: security – ZyXEL Communications ZyXEL ZyWALL 2WG User Manual
Page 15
Table of Contents
ZyWALL 2WG User’s Guide
15
10.8.1 No Security ............................................................................................................. 190
10.8.2 Static WEP ............................................................................................................. 190
10.8.3 IEEE 802.1x Only ................................................................................................... 191
10.8.4 IEEE 802.1x + Static WEP ..................................................................................... 192
10.8.5 WPA, WPA2, WPA2-MIX ........................................................................................ 194
10.8.6 WPA-PSK, WPA2-PSK, WPA2-PSK-MIX ............................................................... 195
11.1 Firewall Overview ............................................................................................................ 201
11.2 Packet Direction Matrix .................................................................................................... 202
11.3 Packet Direction Examples .............................................................................................. 203
11.3.1 To VPN Packet Direction ........................................................................................ 204
11.3.2 From VPN Packet Direction ................................................................................... 206
11.3.3 From VPN To VPN Packet Direction ...................................................................... 207
11.4 Security Considerations ................................................................................................... 209
11.5 Firewall Rules Example ................................................................................................... 209
11.6 Asymmetrical Routes ........................................................................................................211
11.7 Firewall Default Rule (Router Mode) ................................................................................ 212
11.8 Firewall Default Rule (Bridge Mode) .............................................................................. 214
11.9 Firewall Rule Summary ................................................................................................... 215
11.10 Anti-Probing ............................................................................................................... 220
11.11 Firewall Thresholds ..................................................................................................... 221
11.12 Threshold Screen ........................................................................................................... 222
11.13 Service .......................................................................................................................... 224