Dell PowerConnect W-IAP3WN Dell Instant 6.1.3.1-3.0.0.0 User Guide - Page 129

Instant Firewall

Page 129 highlights

Chapter 12 Instant Firewall A firewall is a system designed to prevent unauthorized Internet users from accessing the private network connected to the Internet. It defines access rules and monitors all data entering or leaving the network and blocks the data that does not satisfy the specified security policies. Dell Instant implements the Instant Firewall feature that uses a simplified firewall policy language. An administrator can define the firewall policies on an SSID or wireless network such as the Guest network or an Employee network. At the end of authentication, these policies are uniformly applied to users connected to that network. The Instant Firewall gives the flexibility to limit packets or bandwidth available to particular class of users. Instant Firewall treats packets based on the first rule matched. 1. In the Networks tab, click the New link. The New Network window appears. 2. Navigate to Access tab to specify the access rules for the network. 3. Slide to Network-based using the scroll bar and click New to add a new rule. The New Rule window consists of the following options:  Rule type- Select the rule type (Access control, VLAN assignment) from the drop-down list.  Action- Select Allow or Deny from the drop-down list to allow or deny traffic with the specified service type and destination.  Log- Select this checkbox if you want a log entry to be created when this rule is triggered. Instant firewall supports firewall based logging function. Firewall logs on IAP are generated as syslog messages.  Blacklist- Select this checkbox if you want the client to be blacklisted when this rule is triggered. The blacklisting will last for the duration specified as Auth failure blacklist time on the Blacklisting tab of the PEF window. See "Client Blacklisting" on page 193 for more information. Figure 104 Access Tab - Instant Firewall Settings Dell PowerConnect W-Series Instant Access Point 6.1.3.1-3.0.0.0 | User Guide Instant Firewall | 129

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214

Dell PowerConnect W-Series Instant Access Point 6.1.3.1-3.0.0.0
|
User Guide
Instant Firewall
|
129
Chapter 12
Instant Firewall
A firewall is a system designed to prevent unauthorized Internet users from accessing the private network
connected to the Internet. It defines access rules and monitors all data entering or leaving the network and blocks
the data that does not satisfy the specified security policies.
Dell Instant implements the Instant Firewall feature that uses a simplified firewall policy language. An
administrator can define the firewall policies on an SSID or wireless network such as the Guest network or an
Employee network. At the end of authentication, these policies are uniformly applied to users connected to that
network. The Instant Firewall gives the flexibility to limit packets or bandwidth available to particular class of
users. Instant Firewall treats packets based on the first rule matched.
1.
In the
Networks
tab, click the
New
link. The
New Network
window appears.
2.
Navigate to
Access
tab to specify the access rules for the network.
3.
Slide to
Network-based
using the scroll bar and click New to add a new rule.
The New Rule window consists of the following options:
Rule type—
Select the rule type (Access control, VLAN assignment) from the drop-down list.
Action—
Select
Allow
or
Deny
from the drop-down list to allow or deny traffic with the specified service type
and destination.
Log—
Select this checkbox if you want a log entry to be created when this rule is triggered. Instant firewall
supports firewall based logging function. Firewall logs on IAP are generated as syslog messages.
Blacklist—
Select this checkbox if you want the client to be blacklisted when this rule is triggered. The
blacklisting will last for the duration specified as
Auth failure blacklist
time on the Blacklisting tab of the
PEF
window. See
“Client Blacklisting” on page
193
for more information.
Figure 104
Access Tab - Instant Firewall Settings