Security Configuration 8 - 13
8.2 Configuring IP Firewall Rules
Security Configuration
Access points use IP based firewalls like
Access Control Lists
(ACLs) to filter/mark packets based on the IP address from which
they arrive, as opposed to filtering packets on Layer 2 ports.
IP based firewall rules are specific to source and destination IP addresses and the unique rules and precedence orders
assigned. Both IP and non-IP traffic on the same Layer 2 interface can be filtered by applying an IP ACL. Firewall rules are
processed by a firewall supported device from first to last. When a rule matches the network traffic an access point is
processing, the firewall uses that rule's action to determine whether traffic is allowed or denied.
To add or edit an IP based Firewall Rule policy:
1. Select
Configuration
tab from the Web user interface.
2. Select
Security.
3. Select
IP Firewall
to display existing IP firewall policies.
Figure 8-4
IP Firewall Policy screen
4. Select
Add
to create a new IP Firewall Rule. Select an existing policy and select
Edit
to modify the attributes of the rule’s
configuration.
5. Select the added row to expand it into configurable parameters for defining a new rule.
NOTE:
Once defined, a set of IP firewall rules must be applied to an interface to be a
functional filtering tool.
Summary of Contents for AP-7131 Series
Page 1: ...Motorola Solutions WiNG 5 5 ACCESS POINT SYSTEM REFERENCE GUIDE ...
Page 2: ......
Page 14: ...x WiNG 5 5 Access Point System Reference Guide ...
Page 22: ...8 WiNG 5 5 Access Point System Reference Guide ...
Page 26: ...1 4 WiNG 5 5 Access Point System Reference Guide ...
Page 74: ...3 36 WiNG 5 5 Access Point System Reference Guide ...
Page 428: ...6 2 WiNG 5 5 Access Point System Reference Guide Figure 6 1 Configuration Wireless menu ...
Page 528: ...6 102 WiNG 5 5 Access Point System Reference Guide ...
Page 610: ...8 40 WiNG 5 5 Access Point System Reference Guide ...
Page 615: ...Services Configuration 9 5 Figure 9 2 Captive Portal Policy screen Basic Configuration tab ...
Page 656: ...9 46 WiNG 5 5 Access Point System Reference Guide ...
Page 670: ...10 14 WiNG 5 5 Access Point System Reference Guide ...
Page 682: ...11 12 WiNG 5 5 Access Point System Reference Guide ...
Page 721: ...Operations 12 39 Figure 12 40 Certificate Management Import New Trustpoint screen ...
Page 738: ...12 56 WiNG 5 5 Access Point System Reference Guide ...
Page 890: ...A 2 WiNG 5 5 Access Point System Reference Guide ...
Page 952: ...B 62 WiNG 5 5 Access Point System Reference Guide ...
Page 953: ......