1 Select the L2 drop-down and select
New
or select the rule to edit and existing rule.
2 Configure the following parameters:
Name
Name the rule.
Action
Determines access control action for the rule. Valid values are:
•
None - No role defined
•
Allow - Packets contained to role's default action's VLAN/topology
•
Deny - Any packet not matching a rule in the policy is dropped.
•
Containment VLAN - A topology to use when a network is created using a role that does
not specify a topology. (Not applicable for L7 Application Rules.)
COS
Determines the importance of a frame while it is forwarded through the network relative to
other packets. The CoS defines actions to be taken when rate limits are exceeded.
MAC Address
Type
Indicates if the MAC Address is user defined or any MAC Address.
User Defined
enables the
MAC Address field for user input.
MAC Address Media access control address. Sometimes known as the hardware address, is the unique
physical address of each network interface card on each device. Specify the MAC address of the
wireless client.
3 Select
Save
.
All rule types are applied to the policy in top to bottom order. The policy is installed on the enforced
APs.
Related Links
on page 130
Configuring L3, L4 Rules
Configure policy rules that are associated with a role from the Role Configuration page. To configure an
OSI Layer 3 and 4 rule, which filters on IP Address and Port number:
1 Select the L3, L4 drop-down and select
New
or select the rule to edit and existing rule.
2 Configure the following parameters:
Name
Name the rule.
Action
Determines access control action for the rule. Valid values are:
•
None - No role defined
•
Allow - Packets contained to role's default action's VLAN/topology
•
Deny - Any packet not matching a rule in the policy is dropped.
•
Containment VLAN - A topology to use when a network is created using a role that does not
specify a topology. (Not applicable for L7 Application Rules.)
COS
Determines the importance of a frame while it is forwarded through the network relative to other
packets. The CoS defines actions to be taken when rate limits are exceeded.
Protocol The user defined protocol or protocol type associated with the defined rule. Traffic from this
protocol is subject to the defined rule. Valid values are:
•
User Defined, then specify a protocol that is not already in the list. Use this option to explicitly
specify a protocol that is not listed.
•
A specific protocol from the list.
Configure
ExtremeCloud Appliance User Guide for version 4.36.03
131