Motorola WiNG 5.5 Reference Manual page 585

Table of Contents

Advertisement

Figure 8-7 WLAN Security - IP Firewall Rules - IP Firewall Rules Add Criteria screen
NOTE: Only those selected IP ACL filter attributes display. Each value can have its
current settings adjusted by selecting that IP ACL's column to display a pop-up to adjust
that one value.
9. Define the following parameters for the IP Firewall Rule:
Precedence
Action
Source
Destination
Specify or modify a precedence for this IP policy between 1-1500. Rules with lower
precedence are always applied to packets first. If modifying a precedence to apply a
higher integer, it will move down the table to reflect its lower priority.
Every IP firewall rule is made up of matching criteria rules. The action defines what to do
with the packet if it matches the specified criteria. The following actions are supported:
• Deny - Instructs the firewall to prohibit a packet from proceeding to its destination.
• Allow - Instructs the firewall to allow a packet to proceed to its destination.
Select the source for creating the ACL. Source options include:
• Any – Indicates any host device in any network.
• Network – Indicates all hosts in a particular network. Subnet mask information has to
be provided for filtering based on network.
• Host – Indicates a single host with a specific IP address.
• Alias – Indicates a collection of IP addresses or hostnames or IP address ranges which
are configured as a single unit. This is for ease of configuration of ACLs. When
selected, all IP addresses or hostnames or IP address ranges are used in this ACL.
Select the destination for creating the ACL. Destination options include:
• Any – Indicates any host device in any network.
• Network – Indicates all hosts in a particular network. Subnet mask information has to
be provided for filtering based on network.
• Host – Indicates a single host with a specific IP address.
• Alias – Indicates a collection of IP addresses or hostnames or IP address ranges which
are configured as a single unit. This is for ease of configuration of ACLs. When
selected, all IP addresses or hostnames or IP address ranges are used in this ACL.
Security Configuration 8 - 15

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents