
Field Description
Rule type Select a rule type, for example Access control from the drop-down list.
Action Select any of following attributes:
l Select Allow to allow access users based on the access rule.
l Select Deny to deny access to users based on the access rule.
l Select Destination-NAT to allow changes to destination IP address.
l Select Source-NAT to allow changes to the source IP address.
Service
Select a service from the list of available services.
Destination
Specify the destination.
Log
Select this check box if you want a log entry to be created when this rule is triggered.
Instant firewall supports firewall based logging function. Firewall logs on the OAW-IAPs
are generated as syslog messages.
Blacklist
Select the Blacklist check box to blacklist the client when this rule is triggered. The
blacklisting lasts for the duration specified as Auth failure blacklist time on the
Blacklisting tab of the Security window. For more information, see Blacklisting Clients
on page 148.
Classify
media
Select the Classify media check box to prioritize video and voice traffic. When enabled,
a packet inspection is performed on all non-NAT traffic and the traffic is marked as
follows:
l Video: Priority 5 (Critical)
l Voice: Priority 6 (Internetwork Control)
Disable scan-
ning
Select Disable scanning check box to disable ARM scanning when this rule is
triggered.
The selection of the Disable scanning applies only if ARM scanning is enabled, For
more information, see Configuring Radio Settings for an OAW-IAP on page 197.
DSCP tag Select the DSCP tag check box to specify a DSCP value to prioritize traffic when this
rule is triggered. Specify a value within the range of 0 to 63. To assign a higher priority,
specify a higher value.
802.1p prior-
ity
Select the 802.1p priority check box to specify an 802.1p priority. Specify a value
between 0 and 7. To assign a higher priority, specify a higher value.
Table 27:
Access Rule Configuration Parameters
In the CLI
To configure access rules:
(Instant Access Point)(config)# wlan access-rule <access-rule-name>
(Instant Access Point)(Access Rule <Name>)# rule <dest> <mask> <match> <protocol> <start-port>
<end-port> {permit |deny | src-nat | dst-nat {<IP-address> <port> | <port>}}
[<option1....option9>]
(Instant Access Point)(Access Rule <Name>)# end
(Instant Access Point)# commit apply
Configuring Source NAT
The source NAT action in access rules allows the user to override the routing profile entries. For example, when a
routing profile is configured to use 0.0.0.0/0 , the client traffic on an SSID in L3 mode access to the corporate
network is sent to the tunnel. When an access rule is configured with Source NAT action, the users can specify the
service, protocol, or destination to which the source NAT is applied.
AOS-W Instant 6.2.1.0-3.3| User Guide Roles and Policies | 159
Komentarze do niniejszej Instrukcji