ZyWALL 5/35/70 Series User’s Guide

9.11.2 Encryption .............................................................................................

183

9.12

WPA-PSK Application Example .....................................................................

184

9.13

Introduction to RADIUS ..................................................................................

185

9.14

WPA with RADIUS Application Example ........................................................

185

9.15

Wireless Client WPA Supplicants ...................................................................

186

9.16.1 Static WEP ............................................................................................

188

9.16.2 WPA-PSK .............................................................................................

189

9.16.3 WPA ......................................................................................................

191

9.16.4 IEEE 802.1x + Dynamic WEP ..............................................................

192

9.16.5 IEEE 802.1x + Static WEP ....................................................................

193

9.16.6 IEEE 802.1x + No WEP ........................................................................

194

9.16.7 No Access 802.1x + Static WEP ...........................................................

195

9.16.8 No Access 802.1x + No WEP ...............................................................

196

Chapter 10

 

 

Firewalls................................................................................................................

198

10.1

Firewall Overview ...........................................................................................

198

10.2

Types of Firewalls ..........................................................................................

198

10.2.1 Packet Filtering Firewalls ......................................................................

198

10.2.2 Application-level Firewalls ....................................................................

198

10.2.3 Stateful Inspection Firewalls .................................................................

199

10.3

Introduction to ZyXEL’s Firewall .....................................................................

199

10.4

Denial of Service ............................................................................................

200

10.4.1 Basics ...................................................................................................

200

10.4.2 Types of DoS Attacks ...........................................................................

201

 

10.4.2.1 ICMP Vulnerability ......................................................................

203

 

10.4.2.2 Illegal Commands (NetBIOS and SMTP) ....................................

203

 

10.4.2.3 Traceroute ...................................................................................

204

10.5

Stateful Inspection ..........................................................................................

204

10.5.1 Stateful Inspection Process ..................................................................

205

10.5.2 Stateful Inspection and the ZyWALL .....................................................

206

10.5.3 TCP Security .........................................................................................

206

10.5.4 UDP/ICMP Security ..............................................................................

207

10.5.5 Upper Layer Protocols ..........................................................................

207

10.6

Guidelines For Enhancing Security With Your Firewall ..................................

208

10.7

Packet Filtering Vs Firewall ............................................................................

208

10.7.1 Packet Filtering: ....................................................................................

208

 

10.7.1.1 When To Use Filtering .................................................................

208

10.7.2 Firewall .................................................................................................

209

 

10.7.2.1 When To Use The Firewall ..........................................................

209

13

Table of Contents