Dell W-Series 207 Instant 6.4.3.1-4.2 User Guide - Page 190

In the Instant UI, Service, Category, Description

Page 190 highlights

l Configuring access rules based on application and application categories, see Configuring ACL Rules for Application and Application Categories on page 266. l Configuring access rules based on web categories and web reputation, see Configuring Web Policy Enforcement Service on page 269. In the Instant UI To configure ACL rules for a user role: 1. Navigate to Security > Roles. The Roles tab contents are displayed. You can also configure access rules for a wired or wireless client through the WLAN wizard (Network tab>WLAN SSID> Edit>Edit WLAN > Access ) or the Wired profile (More > Wired>Edit> Edit Wired Network> Access) window. 2. Select the role for which you want to configure access rules. 3. In Access rules section, click New to add a new rule. The New Rule window is displayed. 4. Ensure that the rule type is set to Access Control 5. To configure a rule to control access to network services, select Network under service category and specify the following parameters: Table 37: Access Rule Configuration Parameters Service Category Description Network Select a service from the list of available services. You can allow or deny access to any or all of the following services based on your requirement: l any-Access is allowed or denied to all services. l custom-Available options are TCP, UDP, and Other. If you select the TCP or UDP options, enter appropriate port numbers. If you select the Other option, enter the appropriate ID. NOTE: If TCP and UDP uses the same port, ensure that you configure separate access rules to permit or deny access. Action Select any of following actions: l Select Allow to allow access users based on the access rule. l Select Deny to deny access to users based on the access rule. l Select Destination-NAT to allow changes to destination IP address. l Select Source-NAT to allow changes to the source IP address. Destination Select a destination option for the access rules for network services, applications, and application categories. You can allow or deny access to any the following destinations based on your requirements. l to all destinations- Access is allowed or denied to all destinations. l to a particular server-Access is allowed or denied to a particular server. After selecting this option, specify the IP address of the destination server. l except to a particular server-Access is allowed or denied to servers other than the specified server. After selecting this option, specify the IP address of the destination server. l to a network-Access is allowed or denied to a network. After selecting this option, 190 | Roles and Policies Dell Networking W-Series Instant 6.4.3.1-4.2.0.0 | User Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403

190
| Roles and Policies
Dell Networking W-Series Instant 6.4.3.1-4.2.0.0 | User Guide
l
Configuring access rules based on application and application categories, see
Configuring ACL Rules for
Application and Application Categories on page 266
.
l
Configuring access rules based on web categories and web reputation, see
Configuring Web Policy
Enforcement Service on page 269
.
In the Instant UI
To configure ACL rules for a user role:
1. Navigate to
Security
>
Roles
. The
Roles
tab contents are displayed.
You can also configure access rules for a wired or wireless client through the WLAN wizard (
Network
tab>
WLAN SSID
>
Edit
>
Edit WLAN
>
Access
) or the Wired profile (
More
>
Wired
>
Edit
>
Edit Wired
Network
>
Access
) window.
2. Select the role for which you want to configure access rules.
3. In
Access rules
section, click
New
to add a new rule. The
New Rule
window is displayed.
4. Ensure that the rule type is set to
Access Control
5. To configure a rule to control access to network services, select
Network
under service category and specify
the following parameters:
Service
Category
Description
Network
Select a service from the list of available services. You can allow or deny access to any or
all of the following services based on your requirement:
l
any
—Access is allowed or denied to all services.
l
custom
—Available options are TCP, UDP, and Other. If you select the TCP or UDP
options, enter appropriate port numbers. If you select the Other option, enter the
appropriate ID.
NOTE:
If TCP and UDP uses the same port, ensure that you configure separate access
rules to permit or deny access.
Action
Select any of following actions:
l
Select
Allow
to allow access users based on the access rule.
l
Select
Deny
to deny access to users based on the access rule.
l
Select
Destination-NAT
to allow changes to destination IP address.
l
Select
Source-NAT
to allow changes to the source IP address.
Destination
Select a destination option for the access rules for network services, applications, and
application categories. You can allow or deny access to any the following destinations
based on your requirements.
l
to all destinations
— Access is allowed or denied to all destinations.
l
to a particular server
—Access is allowed or denied to a particular server. After
selecting this option, specify the IP address of the destination server.
l
except to a particular server
—Access is allowed or denied to servers other than the
specified server. After selecting this option, specify the IP address of the destination
server.
l
to a network
—Access is allowed or denied to a network. After selecting this option,
Table 37:
Access Rule Configuration Parameters