
CLI Commands
4.9 I
SCALANCE W1750D CLI
Function Manual, 03/2019, C79000-G8976-C452-04
171
Parameter
Description
Range
Default
src-nat
Allows the AP to perform source NAT on packets.
When configured, the source IP changes to the
outgoing interface IP address (implied NAT pool)
or from the pool configured (manual NAT pool).
—
—
ip <IP-addr>
Specifies the destination NAT IP address for the
specified packets when dst-nat action is config-
ured.
—
—
<port>
Specifies the destination NAT port for the
specified packets when dst-nat action is config-
ured.
—
—
deny
Creates a rule to reject the specified packets
—
—
<option1…option9>
Allows you to specify any of the following options:
•
Log—Creates a log entry when this rule is
triggered.
•
Blacklist—Blacklists the client when this rule
is triggered.
•
Classify-media—Performs a packet inspection
on all non-NAT traffic and marks the critical
traffic.
•
Disable-scanning—Disables ARM scanning
when this rule is triggered.
•
DSCP tag—Specifies a DSCP value to priori-
tize traffic when this rule is triggered.
•
802.1p priority—Sets an 802.1p priority.
—
—
no…
Removes the configuration
—
—
Usage Guidelines
Use this command to configure inbound firewall rules for the inbound traffic coming through
the uplink ports of an AP. The rules defined for the inbound traffic are applied if the
destination is not a user connected to the AP. If the destination already has a user role
assigned, the user role overrides the actions or options specified in inbound firewall
configuration. However, if a deny rule is defined for the inbound traffic, it is applied
irrespective of the destination and user role. Unlike the ACL rules in a WLAN SSID or wired
profile, the inbound firewall rules can be configured based on the source subnet.
Note
For all subnets, a deny rule is created by default as the last rule. If at least one rule is
configured, the deny all rule is applied to the upstream traffic by default.
Note
Management access to the AP is allowed irrespective of the inbound firewall rule. For more
information on configuring restricted management access, see restricted-mgmt-access.