Configuring Firewall Parameters for Inbound Traffic
Instant APs support an enhanced inbound firewallFirewall is a network security system used for preventing unauthorized access to or from a private network. for the traffic that flows into the network through the uplink ports of an Instant AP.
To configure the firewall rules, complete the following steps:
1. In the app, set the filter to a group that contains at least one AP.
The dashboard context for the group is displayed.
2. Under , click > .
A list of access points is displayed in the
view.3. Click the icon.
The tabs to configure the access points are displayed.
4. Click , and click the tab.
The Security details page is displayed.
5. Click the Wireless IDS/IPS accordion.
6. Click Firewall Settings.
7. In the Access Rule section, click the icon.
The
page is displayed.8. In the page, enter the following information:
Parameter |
Description |
---|---|
|
Select a service from the list of available services. You can allow or deny access to any or all of the services based on your requirement: —Access is allowed or denied to all services. TCPTransmission Control Protocol. TCP is a communication protocol that defines the standards for establishing and maintaining network connection for applications to exchange data. , UDPUser Datagram Protocol. UDP is a part of the TCP/IP family of protocols used for data transfer. UDP is typically used for streaming media. UDP is a stateless protocol, which means it does not acknowledge that the packets being sent have been received., and other options. If you select the TCP or UDP options, enter appropriate port numbers. If the option is selected, ensure that an appropriate ID is entered. —Customize the access based on available options such as |
|
Select any of following actions: Select to allow user access based on the access rule.Select to deny user access based on the access rule.Select to allow making changes to the destination IP address and the port.Select NATNetwork Address Translation. NAT is a method of remapping one IP address space into another by modifying network address information in Internet Protocol (IP) datagram packet headers while they are in transit across a traffic routing device. and source NATSource NAT changes the source address of the packets passing through the router. Source NAT is typically used when an internal (private) host initiates a session to an external (public) host. actions apply only to the network services rules. to allow making changes to the source IP address. The destination |
|
Select any of the following options: —Traffic from all sources is either allowed, denied, or the IP address is translated at the source or the destination as defined in the rule. —Traffic from a particular host is either allowed, denied, or the IP address is translated at the source or the destination as defined in the rule. After selecting this option, specify the IP address of the host. —Traffic from a particular network is either allowed, denied, or the IP address is translated at the source or the destination as defined in the rule. After selecting this option, specify the IP address and netmask of the source network. |
|
Select a destination option for the access rules for network services, applications, and application categories. You can allow or deny access to any the following destinations based on your requirements. —Traffic for all destinations is allowed, denied, or the IP address is translated at the source or the destination as defined in the rule. —Traffic to a specific server is allowed, denied, or the IP address is translated at the source or the destination as defined in the rule. After selecting this option, specify the IP address of the destination server. —Access is allowed or denied to servers other than the specified server. After selecting this option, specify the IP address of the destination server. —Traffic to the specified network is allowed, denied, or the IP address is translated at the source or the destination as defined in the rule. After selecting this option, specify the IP address and netmask for the destination network. —Access is allowed or denied to networks other than the specified network. After selecting this option, specify the IP address and netmask of the destination network. —Traffic to the specified domain is allowed, denied, or the IP address is translated at the source or the destination as defined in the rule. After selecting this option, specify the domain name in the text box. Instant AP is allowed. After selecting this option, specify the domain name in the text box. —Traffic to the specifiedInstant AP network is allowed. After selecting this option, specify the domain name in the text box. —Traffic to the specifiedInstant AP or virtual controller is allowed. After selecting this option, specify the domain name in the text box. —Traffic to the specified master |
|
Select the check box if you want a log entry to be created when this rule is triggered. Instant supports firewall-based logging function. Firewall logs on the Instant APs are generated as security logs. |
|
Select the check box to blacklist the client when this rule is triggered. The blacklisting lasts for the duration specified in the on the tab of the window. |
|
Select the HTTPSHypertext Transfer Protocol Secure. HTTPS is a variant of the HTTP that adds a layer of security on the data in transit through a secure socket layer or transport layer security protocol connection. traffic as voice and video packets. check box to classify and tag media on |
|
Select ARMAdaptive Radio Management. ARM dynamically monitors and adjusts the network to ensure that all users are allowed ready access. It enables full utilization of the available spectrum to support maximum number of users by intelligently choosing the best RF channel and transmit power for APs in their current RF environment. scanning when this rule is triggered. The selection of applies only if ARM scanning is enabled. check box to disable |
|
Select the DSCPDifferentiated Services Code Point. DSCP is a 6-bit packet header value used for traffic classification and priority assignment. value to prioritize traffic when this rule is triggered. Specify a value within the range of 0–63. To assign a higher priority, specify a higher value. check box to specify a |
|
Select the check box to specify an 802.1p priority. Specify a value between 0 and 7. To assign a higher priority, specify a higher value. |
9. Click .
10. Click .
For all subnetsSubnet is the logical division of an IP network., a deny rule is created by default as the last rule. If at least one rule is configured, the deny all rule is applied to the upstream traffic by default. The inbound firewall is not applied to traffic coming through the GREGeneric Routing Encapsulation. GRE is an IP encapsulation protocol that is used to transport packets over a network. tunnel.
Configuring Restricted Access to Corporate Network
You can configure restricted corporate access to block unauthorized users from accessing the corporate network. When restricted corporate access is enabled, corporate access is blocked from the uplink port of master Instant AP, including clients connected to a slave Instant AP.
To configure restricted corporate access, complete the following steps:
1. In the app, set the filter to a group that contains at least one AP.
The dashboard context for the group is displayed.
2. Under , click > .
A list of access points is displayed in the
view.3. Click the icon.
The tabs to configure the access points are displayed.
4. Click , and click the tab.
The Security details page is displayed.
5. Click the Wireless IDS/IPS accordion.
6. Click Firewall Settings.
7. To restrict corporate access, turn on the toggle switch.
8. Click Save Settings.