Table of Contents
10.1 Wireless LAN Introduction ................................................................................................
211
10.2 Configuring WLAN .........................................................................................................
212
10.3 WLAN Static DHCP .......................................................................................................
215
10.4 WLAN IP Alias ...............................................................................................................
216
10.5 WLAN Port Roles ...........................................................................................................
218
10.6 Wireless Security Overview .............................................................................................
220
10.6.1 SSID .......................................................................................................................
221
10.6.2 MAC Address Filter ................................................................................................
10.6.3 User Authentication ................................................................................................
10.6.4 Encryption ..............................................................................................................
222
10.6.5 Additional Installation Requirements for Using 802.1x ...........................................
223
10.7 Wireless Card ................................................................................................................
10.7.1 SSID Profile ...........................................................................................................
226
10.8 Configuring Wireless Security .........................................................................................
227
10.8.1 No Security .............................................................................................................
228
10.8.2 Static WEP .............................................................................................................
229
10.8.3 IEEE 802.1x Only ...................................................................................................
230
10.8.4 IEEE 802.1x + Static WEP .....................................................................................
231
10.8.5 WPA, WPA2, WPA2-MIX ........................................................................................
232
10.8.6 WPA-PSK,WPA2-PSK,WPA2-PSK-MIX ...............................................................
233
10.9 MAC Filter .......................................................................................................................
235
Part III: Security....................................................................................
237
Chapter 11
Firewall...................................................................................................................................
239
11.1
Firewall Overview ............................................................................................................
11.2
Packet Direction Matrix ....................................................................................................
240
11.3
Packet Direction Examples ..............................................................................................
242
11.3.1 To VPN Packet Direction ........................................................................................
243
11.3.2 From VPN Packet Direction ...................................................................................
244
11.3.3 From VPN To VPN Packet Direction ......................................................................
246
11.4
Security Considerations ...................................................................................................
248
11.5
Firewall Rules Example ...................................................................................................
11.6
Asymmetrical Routes .......................................................................................................
250
11.6.1 Asymmetrical Routes and IP Alias .........................................................................
11.7
Firewall Default Rule (Router Mode) ................................................................................
251
11.8
Firewall Default Rule (Bridge Mode) ..............................................................................
253
11.9
Firewall Rule Summary ...................................................................................................
255
11.9.1 Firewall Edit Rule ...............................................................................................
257
11.10 Anti-Probing ...............................................................................................................
260
15
ZyWALL 2WG User’s Guide