Table of Contents
8.2.1 SSID ......................................................................................................................... 148
8.2.2 MAC Address Filter .................................................................................................. 148
8.2.3 User Authentication .................................................................................................. 149
8.2.4 Encryption ................................................................................................................ 149
8.3 Wireless Card ................................................................................................................... 151
8.3.1 SSID Profile ............................................................................................................. 153
8.4.1 No Security ............................................................................................................... 156
8.4.2 Static WEP ............................................................................................................... 156
8.4.3 IEEE 802.1x Only ..................................................................................................... 157
8.5 MAC Filter ......................................................................................................................... 162
Part IV: Security ................................................................................... 165
Chapter 9
Firewall................................................................................................................................... 167
9.1 Firewall Overview ............................................................................................................. 167
9.5 Firewall Rules Example ..................................................................................................... 171
9.6 Asymmetrical Routes ......................................................................................................... 173
9.7 Firewall Default Rule ......................................................................................................... 173
9.8 Firewall Rule Summary .................................................................................................... 175
9.10.1 Threshold Values ................................................................................................... 182
9.11 Threshold Screen ............................................................................................................. 182
9.12 Service ............................................................................................................................ 184
Chapter 10
Authentication Server........................................................................................................... 191
14
................................................................................................. 177
.................................................................................................................... 180
...................................................................................................... 181
NBG410W3G Series User's Guide