Cisco WAP200 Administration Guide - Page 32

Wireless, security filters - default ip address

Page 32 highlights

Chapter 2 How it works Chapter 2 Wireless security filters The WAP-200 features an intelligent bridge which can apply security filters to safeguard the flow of wireless traffic. The filters limit both incoming and outgoing traffic as defined below, and force the WAP-200 to exchange traffic with a specific upstream device. • If Use Colubris access controller is enabled in the General box, then the default security filters (defined below) are enabled and all traffic is sent to the access controller defined on the Security > Access controller page. Note: If you are using multiple VLANs, each with a different gateway use the MAC address option on the Security > Access controller page. • If Use Colubris access controller is disabled in the General box, the security filters are controlled by the settings in this box. Restrict wireless traffic to This setting defines the upstream device that the WAP-200 will forward wireless traffic to. • WAP-200's default gateway: This sends traffic to the default gateway assigned to the WAP-200 on the Network > Ports page (via DHCP, PPPoE, or static). Wireless security filters use the default definitions. • MAC address: Specify the MAC address of the upstream device to forward all traffic to. Wireless security filters use the default definitions. • Custom: Lets you define custom security filters and address for the upstream device. Refer to the section that follows for details. Note: If you are using multiple VLANs, each with a different gateway use the MAC address option. Default filter definitions The following filter definitions are defined by default. Incoming wireless traffic filters Applies to traffic sent from wireless client stations to the WAP-200. Accepted • Any IP traffic addressed to the access controller. • PPPoE traffic (The PPPoe server must be the upstream device.) • IP broadcast packets, except NetBIOS • Certain address management protocols (ARP, DHCP) regardless of their source address. • Any traffic addressed to the WAP-200, including 802.1x. Blocked • All other traffic is blocked. This includes NetBIOS traffic regardless of its source/ destination address. HTTPS traffic not addressed to the WAP-200 (or upstream device) is also blocked, which means wireless client stations cannot access the Management Tool on other Colubris Networks products. 32

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82

Chapter 2
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - How it works - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Chapter 2
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 32 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Wireless
security filters
The WAP-200 features an intelligent bridge which can apply security filters to safeguard
the flow of wireless traffic.
The filters limit both incoming and outgoing traffic as defined below, and force the
WAP-200 to exchange traffic with a specific upstream device.
• If
Use Colubris access controller
is enabled in the
General
box, then the default
security filters (defined below) are enabled and all traffic is sent to the access
controller defined on the
Security > Access
controller
page.
Note:
If you are using multiple VLANs, each with a different gateway use the
MAC
address
option on the
Security > Access controller
page.
• If
Use Colubris access controller
is disabled in the
General
box, the security filters
are controlled by the settings in this box.
Restrict wireless traffic to
This setting defines the upstream device that the WAP-200 will forward wireless traffic
to.
WAP-200’s default gateway: This sends traffic to the default gateway assigned to the
WAP-200 on the
Network > Ports
page (via DHCP, PPPoE, or static). Wireless
security filters use the default definitions.
MAC address: Specify the MAC address of the upstream device to forward all traffic
to. Wireless security filters use the default definitions.
Custom: Lets you define custom security filters and address for the upstream device.
Refer to the section that follows for details.
Note:
If you are using multiple VLANs, each with a different gateway use the
MAC
address
option.
Default filter definitions
The following filter definitions are defined by default.
Incoming wireless traffic filters
Applies to traffic sent from wireless client stations to the WAP-200.
Accepted
Any IP traffic addressed to the access controller.
PPPoE traffic (The PPPoe server must be the upstream device.)
IP broadcast packets, except NetBIOS
Certain address management protocols (ARP, DHCP) regardless of their source
address.
Any traffic addressed to the WAP-200, including 802.1x.
Blocked
All other traffic is blocked. This includes NetBIOS traffic regardless of its source/
destination address. HTTPS traffic not addressed to the WAP-200 (or upstream
device) is also blocked, which means wireless client stations cannot access the
Management Tool
on other Colubris Networks products.