ZyXEL Communications ZyWALL5UTM 4.0 Network Router User Manual


 
ZyWALL 5/35/70 Series User’s Guide
13 Table of Contents
9.11.2 Encryption .............................................................................................183
9.12 WPA-PSK Application Example .....................................................................184
9.13 Introduction to RADIUS ..................................................................................185
9.14 WPA with RADIUS Application Example ........................................................185
9.15 Wireless Client WPA Supplicants ...................................................................186
9.16.1 Static WEP ............................................................................................188
9.16.2 WPA-PSK .............................................................................................189
9.16.3 WPA ......................................................................................................191
9.16.4 IEEE 802.1x + Dynamic WEP ..............................................................192
9.16.5 IEEE 802.1x + Static WEP ....................................................................193
9.16.6 IEEE 802.1x + No WEP ........................................................................194
9.16.7 No Access 802.1x + Static WEP ...........................................................195
9.16.8 No Access 802.1x + No WEP ...............................................................196
Chapter 10
Firewalls................................................................................................................198
10.1 Firewall Overview ...........................................................................................198
10.2 Types of Firewalls ..........................................................................................198
10.2.1 Packet Filtering Firewalls ......................................................................198
10.2.2 Application-level Firewalls ....................................................................198
10.2.3 Stateful Inspection Firewalls .................................................................199
10.3 Introduction to ZyXEL’s Firewall .....................................................................199
10.4 Denial of Service ............................................................................................200
10.4.1 Basics ...................................................................................................200
10.4.2 Types of DoS Attacks ...........................................................................201
10.4.2.1 ICMP Vulnerability ......................................................................203
10.4.2.2 Illegal Commands (NetBIOS and SMTP) ....................................203
10.4.2.3 Traceroute ...................................................................................204
10.5 Stateful Inspection ..........................................................................................204
10.5.1 Stateful Inspection Process ..................................................................205
10.5.2 Stateful Inspection and the ZyWALL .....................................................206
10.5.3 TCP Security .........................................................................................206
10.5.4 UDP/ICMP Security ..............................................................................207
10.5.5 Upper Layer Protocols ..........................................................................207
10.6 Guidelines For Enhancing Security With Your Firewall ..................................208
10.7 Packet Filtering Vs Firewall ............................................................................208
10.7.1 Packet Filtering: ....................................................................................208
10.7.1.1 When To Use Filtering .................................................................208
10.7.2 Firewall .................................................................................................209
10.7.2.1 When To Use The Firewall ..........................................................209