beautypg.com

ZyXEL Communications Internet Security Appliance ZyWALL5UTM 4.0 User Manual

Page 13

background image

ZyWALL 5/35/70 Series User’s Guide

13

Table of Contents

9.11.2 Encryption .............................................................................................183

9.12 WPA-PSK Application Example .....................................................................184
9.13 Introduction to RADIUS ..................................................................................185
9.14 WPA with RADIUS Application Example ........................................................185
9.15 Wireless Client WPA Supplicants ...................................................................186

9.16.1 Static WEP ............................................................................................188
9.16.2 WPA-PSK .............................................................................................189
9.16.3 WPA ......................................................................................................191
9.16.4 IEEE 802.1x + Dynamic WEP ..............................................................192
9.16.5 IEEE 802.1x + Static WEP ....................................................................193
9.16.6 IEEE 802.1x + No WEP ........................................................................194
9.16.7 No Access 802.1x + Static WEP ...........................................................195
9.16.8 No Access 802.1x + No WEP ...............................................................196

Chapter 10
Firewalls................................................................................................................
198

10.1 Firewall Overview ...........................................................................................198
10.2 Types of Firewalls ..........................................................................................198

10.2.1 Packet Filtering Firewalls ......................................................................198
10.2.2 Application-level Firewalls ....................................................................198
10.2.3 Stateful Inspection Firewalls .................................................................199

10.3 Introduction to ZyXEL’s Firewall .....................................................................199
10.4 Denial of Service ............................................................................................200

10.4.1 Basics ...................................................................................................200
10.4.2 Types of DoS Attacks ...........................................................................201

10.4.2.1 ICMP Vulnerability ......................................................................203
10.4.2.2 Illegal Commands (NetBIOS and SMTP) ....................................203
10.4.2.3 Traceroute ...................................................................................204

10.5 Stateful Inspection ..........................................................................................204

10.5.1 Stateful Inspection Process ..................................................................205
10.5.2 Stateful Inspection and the ZyWALL .....................................................206
10.5.3 TCP Security .........................................................................................206
10.5.4 UDP/ICMP Security ..............................................................................207
10.5.5 Upper Layer Protocols ..........................................................................207

10.6 Guidelines For Enhancing Security With Your Firewall ..................................208
10.7 Packet Filtering Vs Firewall ............................................................................208

10.7.1 Packet Filtering: ....................................................................................208

10.7.1.1 When To Use Filtering .................................................................208

10.7.2 Firewall .................................................................................................209

10.7.2.1 When To Use The Firewall ..........................................................209