ZyXEL Communications 2WG Network Card User Manual


 
Table of Contents
ZyWALL 2WG User’s Guide
15
10.1 Wireless LAN Introduction ................................................................................................211
10.2 Configuring WLAN ......................................................................................................... 212
10.3 WLAN Static DHCP ....................................................................................................... 215
10.4 WLAN IP Alias ............................................................................................................... 216
10.5 WLAN Port Roles ........................................................................................................... 218
10.6 Wireless Security Overview ............................................................................................. 220
10.6.1 SSID ....................................................................................................................... 221
10.6.2 MAC Address Filter ................................................................................................ 221
10.6.3 User Authentication ................................................................................................ 221
10.6.4 Encryption ..............................................................................................................222
10.6.5 Additional Installation Requirements for Using 802.1x ........................................... 223
10.7 Wireless Card ................................................................................................................ 223
10.7.1 SSID Profile ...........................................................................................................226
10.8 Configuring Wireless Security ......................................................................................... 227
10.8.1 No Security .............................................................................................................228
10.8.2 Static WEP ............................................................................................................. 229
10.8.3 IEEE 802.1x Only ................................................................................................... 230
10.8.4 IEEE 802.1x + Static WEP ..................................................................................... 231
10.8.5 WPA, WPA2, WPA2-MIX ........................................................................................ 232
10.8.6 WPA-PSK, WPA2-PSK, WPA2-PSK-MIX ............................................................... 233
10.9 MAC Filter ....................................................................................................................... 235
Part III: Security.................................................................................... 237
Chapter 11
Firewall...................................................................................................................................239
11.1 Firewall Overview ............................................................................................................ 239
11.2 Packet Direction Matrix .................................................................................................... 240
11.3 Packet Direction Examples .............................................................................................. 242
11.3.1 To VPN Packet Direction ........................................................................................ 243
11.3.2 From VPN Packet Direction ................................................................................... 244
11.3.3 From VPN To VPN Packet Direction ...................................................................... 246
11.4 Security Considerations ...................................................................................................248
11.5 Firewall Rules Example ................................................................................................... 248
11.6 Asymmetrical Routes .......................................................................................................250
11.6.1 Asymmetrical Routes and IP Alias ......................................................................... 250
11.7 Firewall Default Rule (Router Mode) ................................................................................ 251
11.8 Firewall Default Rule (Bridge Mode) .............................................................................. 253
11.9 Firewall Rule Summary ................................................................................................... 255
11.9.1 Firewall Edit Rule ............................................................................................... 257
11.10 Anti-Probing ............................................................................................................... 260