Cisco WAP200 Administration Guide - Page 32
Wireless, security filters - default ip address
![]() |
UPC - 745883574452
View all Cisco WAP200 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 32 highlights
Chapter 2 How it works Chapter 2 Wireless security filters The WAP-200 features an intelligent bridge which can apply security filters to safeguard the flow of wireless traffic. The filters limit both incoming and outgoing traffic as defined below, and force the WAP-200 to exchange traffic with a specific upstream device. • If Use Colubris access controller is enabled in the General box, then the default security filters (defined below) are enabled and all traffic is sent to the access controller defined on the Security > Access controller page. Note: If you are using multiple VLANs, each with a different gateway use the MAC address option on the Security > Access controller page. • If Use Colubris access controller is disabled in the General box, the security filters are controlled by the settings in this box. Restrict wireless traffic to This setting defines the upstream device that the WAP-200 will forward wireless traffic to. • WAP-200's default gateway: This sends traffic to the default gateway assigned to the WAP-200 on the Network > Ports page (via DHCP, PPPoE, or static). Wireless security filters use the default definitions. • MAC address: Specify the MAC address of the upstream device to forward all traffic to. Wireless security filters use the default definitions. • Custom: Lets you define custom security filters and address for the upstream device. Refer to the section that follows for details. Note: If you are using multiple VLANs, each with a different gateway use the MAC address option. Default filter definitions The following filter definitions are defined by default. Incoming wireless traffic filters Applies to traffic sent from wireless client stations to the WAP-200. Accepted • Any IP traffic addressed to the access controller. • PPPoE traffic (The PPPoe server must be the upstream device.) • IP broadcast packets, except NetBIOS • Certain address management protocols (ARP, DHCP) regardless of their source address. • Any traffic addressed to the WAP-200, including 802.1x. Blocked • All other traffic is blocked. This includes NetBIOS traffic regardless of its source/ destination address. HTTPS traffic not addressed to the WAP-200 (or upstream device) is also blocked, which means wireless client stations cannot access the Management Tool on other Colubris Networks products. 32
![](/manual_guide/products/cisco-wap200-administration-guide-8a5914f/32.png)