Motorola Solutions AP-6511 Access Point System Reference Guide
8-2
8.1 Wireless Firewall
A Firewall is a mechanism enforcing access control, and is considered a first line of defense in protecting
proprietary information within the Motorola wireless network. The means by which this is accomplished
varies, but in principle, a Firewall can be thought of as mechanisms both blocking and permitting data traffic
within the wireless network. Firewalls implement uniquely defined access control policies, so if you don't
have an idea of what kind of access to allow or deny, a Firewall is of little value, and in fact could provide a
false sense of network security.
With Motorola RFS series wireless controllers, Firewalls are configured to protect against unauthenticated
logins from outside the wireless network. This helps prevent hackers from accessing wireless clients within
the wireless network. Well designed Firewalls block traffic from outside the wireless controller managed
network, but permit authorized users to communicate freely with outside the wireless network.
Firewalls can be implemented in both hardware and software, or a combination of both. All messages
entering or leaving the wireless network pass through the Firewall, which examines each message and
blocks those not meeting the security criteria (rules) defined by the configuration.
Firewall rules define the traffic permitted or denied within the wireless network. Rules are processed by a
Firewall device from first to last. When a rule matches the network traffic a wireless controller is processing,
the Firewall uses that rule's action to determine whether traffic is allowed or denied.
Rules comprise conditions and actions. A condition describes a traffic stream of packets. Define constraints
on the source and destination device, the service (for example, protocols and ports), and the incoming
interface. An action describes what should occur to packets matching the conditions set. For example, if the
packet stream meets all conditions, traffic is permitted, authenticated and sent to the destination device.
Additionally, IP and MAC rule based Firewall filtering can be deployed to apply Firewall policies to traffic
being bridged by radios. IP and MAC filtering can be employed to permit or restrict traffic exchanged
between hosts, hosts residing on separate WLANs or hosts forwarding traffic to wired devices.
For more information, refer to the following:
•
Configuring a Firewall Policy
•
Configuring IP Firewall Rules
•
Configuring MAC Firewall Rules
•
Firewall Deployment Considerations
8.1.1 Configuring a Firewall Policy
Wireless Firewall
To configure a Firewall:
1. Select
Configuration
>
Security
>
Wireless Firewall
to display existing Firewall policies.
The
Wireless Firewall
screen lists those Firewall policies created thus far. Any of these policies can
be selected and applied. The user has the option of displaying the configurations of each Wireless
Firewall Policy defined thus far, or referring to the
Wireless Firewall Browser
and either selecting
individual polices.
Содержание AP-6511
Страница 1: ...Motorola Solutions AP 6511 Access Point System Reference Guide ...
Страница 2: ...Motorola Solutions AP 6511 Access Point System Reference Guide 1 2 ...
Страница 24: ...Motorola Solutions AP 6511 Access Point System Reference Guide 2 12 ...
Страница 136: ...Motorola Solutions AP 6511 Access Point System Reference Guide 6 2 Figure 6 1 Configuration Wireless field ...
Страница 318: ...Motorola Solutions AP 6511 Access Point System Reference Guide 10 16 ...
Страница 409: ...Statistics 13 49 Figure 13 31 Access Point Firewall Packet Flow screen ...
Страница 433: ......