3G Wireless Router User's Guide
Table of Contents
NBG410W3G Series User’s Guide
14
8.2 Wireless Security Overview ............................................................................................... 148
8.2.1 SSID ......................................................................................................................... 148
8.2.2 MAC Address Filter .................................................................................................. 148
8.2.3 User Authentication .................................................................................................. 149
8.2.4 Encryption ................................................................................................................ 149
8.2.5 Additional Installation Requirements for Using 802.1x ............................................. 151
8.3 Wireless Card ................................................................................................................... 151
8.3.1 SSID Profile ............................................................................................................. 153
8.4 Configuring Wireless Security ........................................................................................... 154
8.4.1 No Security ............................................................................................................... 156
8.4.2 Static WEP ...............................................................................................................156
8.4.3 IEEE 802.1x Only ..................................................................................................... 157
8.4.4 IEEE 802.1x + Static WEP ....................................................................................... 158
8.4.5 WPA, WPA2, WPA2-MIX .......................................................................................... 160
8.4.6 WPA-PSK, WPA2-PSK, WPA2-PSK-MIX ................................................................. 161
8.5 MAC Filter ......................................................................................................................... 162
Part IV: Security ................................................................................... 165
Chapter 9
Firewall................................................................................................................................... 167
9.1 Firewall Overview ............................................................................................................. 167
9.2 Packet Direction Matrix ...................................................................................................... 168
9.3 Packet Direction Examples ................................................................................................ 169
9.4 Security Considerations ..................................................................................................... 170
9.5 Firewall Rules Example .....................................................................................................171
9.6 Asymmetrical Routes ......................................................................................................... 173
9.6.1 Asymmetrical Routes and IP Alias ........................................................................... 173
9.7 Firewall Default Rule ......................................................................................................... 173
9.8 Firewall Rule Summary .................................................................................................... 175
9.8.1 Firewall Edit Rule ................................................................................................. 177
9.9 Anti-Probing .................................................................................................................... 180
9.10 Firewall Thresholds ...................................................................................................... 181
9.10.1 Threshold Values ................................................................................................... 182
9.11 Threshold Screen ............................................................................................................. 182
9.12 Service ............................................................................................................................ 184
9.12.1 Firewall Edit Custom Service ................................................................................ 185
9.13 My Service Firewall Rule Example .................................................................................. 186
Chapter 10
Authentication Server...........................................................................................................191