Appendix E Wireless LANs
ZyWALL USG 300 User’s Guide
1061
use Advanced Encryption Standard (AES) in the Counter mode with Cipher block
chaining Message authentication code Protocol (CCMP) to offer stronger
encryption than TKIP.
TKIP uses 128-bit keys that are dynamically generated and distributed by the
authentication server. AES (Advanced Encryption Standard) is a block cipher that
uses a 256-bit mathematical algorithm called Rijndael. They both include a per-
packet key mixing function, a Message Integrity Check (MIC) named Michael, an
extended initialization vector (IV) with sequencing rules, and a re-keying
mechanism.
WPA and WPA2 regularly change and rotate the encryption keys so that the same
encryption key is never used twice.
The RADIUS server distributes a Pairwise Master Key (PMK) key to the AP that
then sets up a key hierarchy and management system, using the PMK to
dynamically generate unique data encryption keys to encrypt every data packet
that is wirelessly communicated between the AP and the wireless clients. This all
happens in the background automatically.
The Message Integrity Check (MIC) is designed to prevent an attacker from
capturing data packets, altering them and resending them. The MIC provides a
strong mathematical function in which the receiver and the transmitter each
compute and then compare the MIC. If they do not match, it is assumed that the
data has been tampered with and the packet is dropped.
By generating unique data encryption keys for every data packet and by creating
an integrity checking mechanism (MIC), with TKIP and AES it is more difficult to
decrypt data on a Wi-Fi network than WEP and difficult for an intruder to break
into the network.
The encryption mechanisms used for WPA(2) and WPA(2)-PSK are the same. The
only difference between the two is that WPA(2)-PSK uses a simple common
password, instead of user-specific credentials. The common-password approach
makes WPA(2)-PSK susceptible to brute-force password-guessing attacks but it’s
still an improvement over WEP as it employs a consistent, single, alphanumeric
password to derive a PMK which is used to generate unique temporal encryption
keys. This prevent all wireless devices sharing the same encryption keys. (a
weakness of WEP)
User Authentication
WPA and WPA2 apply IEEE 802.1x and Extensible Authentication Protocol (EAP) to
authenticate wireless clients using an external RADIUS database. WPA2 reduces
the number of key exchange messages from six to four (CCMP 4-way handshake)
and shortens the time required to connect to a network. Other WPA2
authentication features that are different from WPA include key caching and pre-
Содержание Unified Security Gateway ZyWALL 300
Страница 2: ......
Страница 30: ...Table of Contents ZyWALL USG 300 User s Guide 30 ...
Страница 31: ...31 PART I User s Guide ...
Страница 32: ...32 ...
Страница 38: ...Chapter 1 Introducing the ZyWALL ZyWALL USG 300 User s Guide 38 ...
Страница 46: ...Chapter 2 Features and Applications ZyWALL USG 300 User s Guide 46 ...
Страница 64: ...Chapter 3 Web Configurator ZyWALL USG 300 User s Guide 64 ...
Страница 74: ...Chapter 4 Installation Setup Wizard ZyWALL USG 300 User s Guide 74 ...
Страница 116: ...Chapter 6 Configuration Basics ZyWALL USG 300 User s Guide 116 ...
Страница 128: ...Chapter 7 Tutorials ZyWALL USG 300 User s Guide 128 Figure 73 Configuration Network Interface WLAN Add ...
Страница 184: ...Chapter 7 Tutorials ZyWALL USG 300 User s Guide 184 ...
Страница 221: ...221 PART II Technical Reference ...
Страница 222: ...222 ...
Страница 288: ...Chapter 11 Registration ZyWALL USG 300 User s Guide 288 ...
Страница 303: ...Chapter 13 Interfaces ZyWALL USG 300 User s Guide 303 Figure 269 Configuration Network Interface Ethernet Edit ...
Страница 320: ...Chapter 13 Interfaces ZyWALL USG 300 User s Guide 320 Figure 275 Configuration Network Interface Cellular Add ...
Страница 330: ...Chapter 13 Interfaces ZyWALL USG 300 User s Guide 330 Figure 278 Configuration Network Interface WLAN Add No Security ...
Страница 345: ...Chapter 13 Interfaces ZyWALL USG 300 User s Guide 345 Figure 286 Configuration Network Interface VLAN Edit ...
Страница 355: ...Chapter 13 Interfaces ZyWALL USG 300 User s Guide 355 Figure 288 Configuration Network Interface Bridge Add ...
Страница 378: ...Chapter 14 Trunks ZyWALL USG 300 User s Guide 378 ...
Страница 394: ...Chapter 15 Policy and Static Routes ZyWALL USG 300 User s Guide 394 ...
Страница 408: ...Chapter 16 Routing Protocols ZyWALL USG 300 User s Guide 408 ...
Страница 428: ...Chapter 19 NAT ZyWALL USG 300 User s Guide 428 ...
Страница 454: ...Chapter 23 Authentication Policy ZyWALL USG 300 User s Guide 454 ...
Страница 472: ...Chapter 24 Firewall ZyWALL USG 300 User s Guide 472 ...
Страница 479: ...Chapter 25 IPSec VPN ZyWALL USG 300 User s Guide 479 Figure 355 Configuration VPN IPSec VPN VPN Connection Edit IKE ...
Страница 490: ...Chapter 25 IPSec VPN ZyWALL USG 300 User s Guide 490 Figure 358 Configuration VPN IPSec VPN VPN Gateway Edit ...
Страница 534: ...Chapter 27 SSL User Screens ZyWALL USG 300 User s Guide 534 ...
Страница 536: ...Chapter 28 SSL User Application Screens ZyWALL USG 300 User s Guide 536 ...
Страница 544: ...Chapter 29 SSL User File Sharing ZyWALL USG 300 User s Guide 544 ...
Страница 638: ...Chapter 35 ADP ZyWALL USG 300 User s Guide 638 Figure 448 Profiles Protocol Anomaly ...
Страница 682: ...Chapter 37 Content Filter Reports ZyWALL USG 300 User s Guide 682 ...
Страница 700: ...Chapter 38 Anti Spam ZyWALL USG 300 User s Guide 700 ...
Страница 722: ...Chapter 39 Device HA ZyWALL USG 300 User s Guide 722 ...
Страница 738: ...Chapter 40 User Group ZyWALL USG 300 User s Guide 738 ...
Страница 744: ...Chapter 41 Addresses ZyWALL USG 300 User s Guide 744 ...
Страница 756: ...Chapter 43 Schedules ZyWALL USG 300 User s Guide 756 ...
Страница 772: ...Chapter 45 Authentication Method ZyWALL USG 300 User s Guide 772 ...
Страница 794: ...Chapter 46 Certificates ZyWALL USG 300 User s Guide 794 ...
Страница 806: ...Chapter 48 SSL Application ZyWALL USG 300 User s Guide 806 ...
Страница 811: ...Chapter 49 Endpoint Security ZyWALL USG 300 User s Guide 811 ...
Страница 866: ...Chapter 50 System ZyWALL USG 300 User s Guide 866 ...
Страница 873: ...Chapter 51 Log and Report ZyWALL USG 300 User s Guide 873 ...
Страница 886: ...Chapter 51 Log and Report ZyWALL USG 300 User s Guide 886 ...
Страница 916: ...Chapter 54 Packet Flow Explore ZyWALL USG 300 User s Guide 916 ...
Страница 918: ...Chapter 55 Reboot ZyWALL USG 300 User s Guide 918 ...
Страница 920: ...Chapter 56 Shutdown ZyWALL USG 300 User s Guide 920 ...
Страница 948: ...Chapter 58 Product Specifications ZyWALL USG 300 User s Guide 948 ...
Страница 1014: ...Appendix A Log Descriptions ZyWALL USG 300 User s Guide 1014 ...
Страница 1124: ...Appendix F Open Software Announcements ZyWALL USG 300 User s Guide 1124 ...
Страница 1156: ...Index ZyWALL USG 300 User s Guide 1156 ...