Table of Contents

10.1 Wireless LAN Introduction ................................................................................................

211

10.2 Configuring WLAN .........................................................................................................

212

10.3 WLAN Static DHCP .......................................................................................................

215

10.4 WLAN IP Alias ...............................................................................................................

216

10.5 WLAN Port Roles ...........................................................................................................

218

10.6 Wireless Security Overview .............................................................................................

220

10.6.1 SSID .......................................................................................................................

221

10.6.2 MAC Address Filter ................................................................................................

221

10.6.3 User Authentication ................................................................................................

221

10.6.4 Encryption ..............................................................................................................

222

10.6.5 Additional Installation Requirements for Using 802.1x ...........................................

223

10.7 Wireless Card ................................................................................................................

223

10.7.1 SSID Profile ...........................................................................................................

226

10.8 Configuring Wireless Security .........................................................................................

227

10.8.1 No Security .............................................................................................................

228

10.8.2 Static WEP .............................................................................................................

229

10.8.3 IEEE 802.1x Only ...................................................................................................

230

10.8.4 IEEE 802.1x + Static WEP .....................................................................................

231

10.8.5 WPA, WPA2, WPA2-MIX ........................................................................................

232

10.8.6 WPA-PSK,WPA2-PSK,WPA2-PSK-MIX ...............................................................

233

10.9 MAC Filter .......................................................................................................................

235

Part III: Security....................................................................................

237

Chapter 11

 

Firewall...................................................................................................................................

239

11.1

Firewall Overview ............................................................................................................

239

11.2

Packet Direction Matrix ....................................................................................................

240

11.3

Packet Direction Examples ..............................................................................................

242

11.3.1 To VPN Packet Direction ........................................................................................

243

11.3.2 From VPN Packet Direction ...................................................................................

244

11.3.3 From VPN To VPN Packet Direction ......................................................................

246

11.4

Security Considerations ...................................................................................................

248

11.5

Firewall Rules Example ...................................................................................................

248

11.6

Asymmetrical Routes .......................................................................................................

250

11.6.1 Asymmetrical Routes and IP Alias .........................................................................

250

11.7

Firewall Default Rule (Router Mode) ................................................................................

251

11.8

Firewall Default Rule (Bridge Mode) ..............................................................................

253

11.9

Firewall Rule Summary ...................................................................................................

255

11.9.1 Firewall Edit Rule ...............................................................................................

257

11.10 Anti-Probing ...............................................................................................................

260

 

15

ZyWALL 2WG User’s Guide