ZyXEL Communications Internet Security Appliance ZyWALL5UTM 4.0 User Manual
Page 13

ZyWALL 5/35/70 Series User’s Guide
13
Table of Contents
9.12 WPA-PSK Application Example .....................................................................184
9.13 Introduction to RADIUS ..................................................................................185
9.14 WPA with RADIUS Application Example ........................................................185
9.15 Wireless Client WPA Supplicants ...................................................................186
9.16.1 Static WEP ............................................................................................188
9.16.2 WPA-PSK .............................................................................................189
9.16.3 WPA ......................................................................................................191
9.16.4 IEEE 802.1x + Dynamic WEP ..............................................................192
9.16.5 IEEE 802.1x + Static WEP ....................................................................193
9.16.6 IEEE 802.1x + No WEP ........................................................................194
9.16.7 No Access 802.1x + Static WEP ...........................................................195
9.16.8 No Access 802.1x + No WEP ...............................................................196
10.2.1 Packet Filtering Firewalls ......................................................................198
10.2.2 Application-level Firewalls ....................................................................198
10.2.3 Stateful Inspection Firewalls .................................................................199
10.3 Introduction to ZyXEL’s Firewall .....................................................................199
10.4 Denial of Service ............................................................................................200
10.4.1 Basics ...................................................................................................200
10.4.2 Types of DoS Attacks ...........................................................................201
10.4.2.1 ICMP Vulnerability ......................................................................203
10.4.2.2 Illegal Commands (NetBIOS and SMTP) ....................................203
10.4.2.3 Traceroute ...................................................................................204
10.5.1 Stateful Inspection Process ..................................................................205
10.5.2 Stateful Inspection and the ZyWALL .....................................................206
10.5.3 TCP Security .........................................................................................206
10.5.4 UDP/ICMP Security ..............................................................................207
10.5.5 Upper Layer Protocols ..........................................................................207
10.7.1.1 When To Use Filtering .................................................................208
10.7.2.1 When To Use The Firewall ..........................................................209