User Guide

Page 24 SonicWALL Internet Security Appliance Administrator’s Guide
3 Configuring Wireless on the SOHO TZW
The SOHO TZW uses a wireless protocol called IEEE 802.11b, commonly known as Wi-Fi, and
sends data via radio transmissions. Wi-Fi transmission speed is usually faster than broadband
connection speed, but it is slower than Ethernet.
The SonicWALL SOHO TZW combines three networking components to offer a fully secure
wireless firewall: an 802.11b Access Point, a secure wireless gateway, and a stateful firewall
with flexible NAT and VPN termination and initiation capabilities. With this combination, the
SOHO TZW offers the flexibility of wireless without compromising network security.
Typically, the SOHO TZW is the access point for your wireless LAN and serves as the central
access point for computers on your LAN. In addition, it shares a single broadband connection
with the computers on your network. Since the SOHO TZW also provides firewall protection,
intruders from the Internet cannot access the computers or files on your network. This is
especially important for an “always-on” connection such as a cable modem or T1 line that is
shared by computers on a network.
However, wireless LANs are vulnerable to “eavesdropping” by other wireless networks which
means you should establish a wireless security policy for your wireless LAN. Wired Equivalent
Privacy, WEP, should not be used as your only security policy.
On the SOHO TZW, wireless clients connect to the Access Point layer of the firewall. Instead
of bridging the connection directly to the wired network, wireless traffic is first passed to the
Secure Wireless Gateway layer where the client is required to be authenticated via User Level
Authentication. Access to Wireless Guest Services (WGS) and Access Control Lists (ACL) are
managed by the SOHO TZW. It is also at this layer that the SOHO TZW has the capability of
enforcing WiFiSec, and IPSec-based VPN overlay for wireless networking. As wireless network
traffic sucessfully passes through these layers, it is then passed to the VPN-NAT-Stateful
firewall layer where WiFiSec termination, address translation, and access rules are applied. If
all of the security criteria is met, then wireless network traffic can then pass via one of the
following Distribution Systems (DS):
•LAN
•WAN
Wireless Client on the WLAN
VPN tunnel

Summary of content (18 pages)