ZyWALL 5/35/70 Series User’s Guide
9.11.2 Encryption .............................................................................................
183
9.12
WPA-PSK Application Example .....................................................................
184
9.13
Introduction to RADIUS ..................................................................................
185
9.14
WPA with RADIUS Application Example ........................................................
9.15
Wireless Client WPA Supplicants ...................................................................
186
9.16.1 Static WEP ............................................................................................
188
9.16.2 WPA-PSK .............................................................................................
189
9.16.3 WPA ......................................................................................................
191
9.16.4 IEEE 802.1x + Dynamic WEP ..............................................................
192
9.16.5 IEEE 802.1x + Static WEP ....................................................................
193
9.16.6 IEEE 802.1x + No WEP ........................................................................
194
9.16.7 No Access 802.1x + Static WEP ...........................................................
195
9.16.8 No Access 802.1x + No WEP ...............................................................
196
Chapter 10
Firewalls................................................................................................................
198
10.1
Firewall Overview ...........................................................................................
10.2
Types of Firewalls ..........................................................................................
10.2.1 Packet Filtering Firewalls ......................................................................
10.2.2 Application-level Firewalls ....................................................................
10.2.3 Stateful Inspection Firewalls .................................................................
199
10.3
Introduction to ZyXEL’s Firewall .....................................................................
10.4
Denial of Service ............................................................................................
200
10.4.1 Basics ...................................................................................................
10.4.2 Types of DoS Attacks ...........................................................................
201
10.4.2.1 ICMP Vulnerability ......................................................................
203
10.4.2.2 Illegal Commands (NetBIOS and SMTP) ....................................
10.4.2.3 Traceroute ...................................................................................
204
10.5
Stateful Inspection ..........................................................................................
10.5.1 Stateful Inspection Process ..................................................................
205
10.5.2 Stateful Inspection and the ZyWALL .....................................................
206
10.5.3 TCP Security .........................................................................................
10.5.4 UDP/ICMP Security ..............................................................................
207
10.5.5 Upper Layer Protocols ..........................................................................
10.6
Guidelines For Enhancing Security With Your Firewall ..................................
208
10.7
Packet Filtering Vs Firewall ............................................................................
10.7.1 Packet Filtering: ....................................................................................
10.7.1.1 When To Use Filtering .................................................................
10.7.2 Firewall .................................................................................................
209
10.7.2.1 When To Use The Firewall ..........................................................
13
Table of Contents