EasyManua.ls Logo

Motorola WiNG 5.5 - Configuring IP Firewall Rules

Motorola WiNG 5.5
954 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Security Configuration 8 - 13
8.2 Configuring IP Firewall Rules
Security Configuration
Access points use IP based firewalls like Access Control Lists (ACLs) to filter/mark packets based on the IP address from which
they arrive, as opposed to filtering packets on Layer 2 ports.
IP based firewall rules are specific to source and destination IP addresses and the unique rules and precedence orders
assigned. Both IP and non-IP traffic on the same Layer 2 interface can be filtered by applying an IP ACL. Firewall rules are
processed by a firewall supported device from first to last. When a rule matches the network traffic an access point is
processing, the firewall uses that rule's action to determine whether traffic is allowed or denied.
To add or edit an IP based Firewall Rule policy:
1. Select Configuration tab from the Web user interface.
2. Select Security.
3. Select IP Firewall to display existing IP firewall policies.
Figure 8-4 IP Firewall Policy screen
4. Select Add to create a new IP Firewall Rule. Select an existing policy and select Edit to modify the attributes of the rule’s
configuration.
5. Select the added row to expand it into configurable parameters for defining a new rule.
NOTE: Once defined, a set of IP firewall rules must be applied to an interface to be a
functional filtering tool.

Table of Contents

Related product manuals