
ZyWALL 5/35/70 Series User’s Guide
Table of Contents 15
10.9.1 Introduction to RADIUS ........................................................................200
10.9.1.1 Types of RADIUS Messages .......................................................200
10.9.2 EAP Authentication Overview ...............................................................201
10.10 Dynamic WEP Key Exchange ......................................................................202
10.11 Introduction to WPA ......................................................................................202
10.11.1 User Authentication .............................................................................202
10.11.2 Encryption ...........................................................................................202
10.12 WPA-PSK Application Example ...................................................................203
10.13 Introduction to RADIUS ................................................................................204
10.14 WPA with RADIUS Application Example ......................................................204
10.15 Wireless Client WPA Supplicants .................................................................205
10.16 Wireless Card .............................................................................................205
10.16.1 Static WEP ..........................................................................................207
10.16.2 WPA-PSK ...........................................................................................208
10.16.3 WPA ....................................................................................................210
10.16.4 IEEE 802.1x + Dynamic WEP ............................................................211
10.16.5 IEEE 802.1x + Static WEP ..................................................................212
10.16.6 IEEE 802.1x + No WEP ......................................................................214
10.16.7 No Access 802.1x + Static WEP .........................................................215
10.16.8 No Access 802.1x + No WEP .............................................................216
10.17 MAC Filter ...................................................................................................217
Chapter 11
Firewall..................................................................................................................219
11.1 Firewall Overview ..........................................................................................219
11.2 Packet Direction Matrix ..................................................................................220
11.3 Packet Direction Examples ............................................................................221
11.3.1 To VPN Packet Direction .......................................................................222
11.3.2 From VPN Packet Direction ..................................................................224
11.3.3 From VPN To VPN Packet Direction .....................................................225
11.4 Security Considerations .................................................................................226
11.5 Firewall Rules Example ..................................................................................227
11.6 Asymmetrical Routes .....................................................................................229
11.6.1 Asymmetrical Routes and IP Alias ........................................................229
11.7 Firewall Default Rule (Router Mode) ..............................................................230
11.8 Firewall Default Rule (Bridge Mode) ............................................................232
11.9 Firewall Rule Summary .................................................................................234
11.9.1 Firewall Edit Rule ..............................................................................236
11.10 Anti-Probing ..............................................................................................239
11.11 Firewall Thresholds ....................................................................................240
11.11.1 Threshold Values .................................................................................241
11.12 Threshold Screen .........................................................................................241
11.13 Service ........................................................................................................243