Brocade Communications Systems Mobility 7131 Series Service Manual Page 228

  • Download
  • Add to my manuals
  • Print
  • Page
    / 520
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 227
216 Brocade Mobility 7131 Access Point Product Reference Guide
53-1002517-01
6
3. Configure the Firewall Rules field as required add, insert or delete firewall rules into the list of
advanced rules.
4. Click Apply to save any changes to the Advanced Subnet Access screen. Navigating away from
the screen without clicking Apply results in all changes to the screens being lost.
5. Click Undo Changes (if necessary) to undo any changes made. Undo Changes reverts the
settings displayed on the Advanced Subnet Access screen to the last saved configuration.
6. Click Logout to securely exit the Access Point applet. A prompt displays confirming the logout
before the applet is closed.
Configuring VPN Tunnels
Create a VPN tunnel to ensure data privacy between two end points, even while using an insecure
communication medium like the Internet. VPNs use a secure tunnel between two end points as if
they are directly connected over a secure connection.
Inbound or Outbound Select Inbound or Outbound from the drop-down menu to specify if a firewall rule is
intended for inbound traffic to an interface or outbound traffic from that interface.
Add Click the
Add button to insert a new rule at the bottom of the table. Click on a row to display
a new window with configuration options for that field.
Insert Click the
Insert button to insert a new rule directly above a selected rule in the table.
Clicking on a field in the row displays a new window with configuration options.
Del (Delete) Click
Del to remove the selected rule from the table. The index numbers for all the rows
below the deleted row decrease by 1.
Move Up Clicking the
Move Up button moves the selected rule up by one row in the table. The index
numbers for the affected rows adjust to reflect the new order.
Move Down Clicking the
Move Down button moves the selected rule down by one row in the table. The
index numbers for the affected rows adjust to reflect the new order.
Index The index number determines the order firewall rules are executed. Rules are executed
from the lowest number to the highest number.
Source IP The
Source IP range defines the origin address or address range for the firewall rule. To
configure the Source IP range, click on the field. A new window displays for entering the IP
address and range.
Destination IP The
Destination IP range determines the target address or address range for the firewall
rule. To configure the Destination IP range, click on the field. A new window displays for
entering the IP address and range.
Transport Select a protocol from the drop-down list. For a detailed description of the protocols
available, see Available Protocols on page 6-214.
Src. Ports (Source
Ports)
The source port range determines which ports the firewall rule applies to on the source IP
address. Click on the field to configure the source port range. A new window displays to
enter the starting and ending port ranges. For rules where only a single port is necessary,
enter the same port in the start and end port fields.
Dst. Ports (Destination
Ports
The destination port range determines which ports the firewall rule applies to on the
destination IP address. Click on the field to configure the destination port range. A new
window displays to enter the starting and ending ports in the range. For rules where only a
single port is necessary, enter the same port in the start and end port fields.
Page view 227
1 2 ... 223 224 225 226 227 228 229 230 231 232 233 ... 519 520

Comments to this Manuals

No comments