Configuring vpn tunnels – Brocade Mobility 7131 Access Point Product Reference Guide (Supporting software release 4.4.0.0 and later) User Manual

Page 228

Advertising
background image

216

Brocade Mobility 7131 Access Point Product Reference Guide

53-1002517-01

6

3. Configure the Firewall Rules field as required add, insert or delete firewall rules into the list of

advanced rules.

4. Click Apply to save any changes to the Advanced Subnet Access screen. Navigating away from

the screen without clicking Apply results in all changes to the screens being lost.

5. Click Undo Changes (if necessary) to undo any changes made. Undo Changes reverts the

settings displayed on the Advanced Subnet Access screen to the last saved configuration.

6. Click Logout to securely exit the Access Point applet. A prompt displays confirming the logout

before the applet is closed.

Configuring VPN Tunnels

Create a VPN tunnel to ensure data privacy between two end points, even while using an insecure
communication medium like the Internet. VPNs use a secure tunnel between two end points as if
they are directly connected over a secure connection.

Inbound or Outbound

Select

Inbound

or

Outbound

from the drop-down menu to specify if a firewall rule is

intended for inbound traffic to an interface or outbound traffic from that interface.

Add

Click the

Add

button to insert a new rule at the bottom of the table. Click on a row to display

a new window with configuration options for that field.

Insert

Click the

Insert

button to insert a new rule directly above a selected rule in the table.

Clicking on a field in the row displays a new window with configuration options.

Del (Delete)

Click

Del

to remove the selected rule from the table. The index numbers for all the rows

below the deleted row decrease by 1.

Move Up

Clicking the

Move Up

button moves the selected rule up by one row in the table. The index

numbers for the affected rows adjust to reflect the new order.

Move Down

Clicking the

Move Down

button moves the selected rule down by one row in the table. The

index numbers for the affected rows adjust to reflect the new order.

Index

The index number determines the order firewall rules are executed. Rules are executed
from the lowest number to the highest number.

Source IP

The

Source IP

range defines the origin address or address range for the firewall rule. To

configure the Source IP range, click on the field. A new window displays for entering the IP
address and range.

Destination IP

The

Destination IP

range determines the target address or address range for the firewall

rule. To configure the Destination IP range, click on the field. A new window displays for
entering the IP address and range.

Transport

Select a protocol from the drop-down list. For a detailed description of the protocols
available, see Available Protocols on page 6-214.

Src. Ports (Source
Ports)

The source port range determines which ports the firewall rule applies to on the source IP
address. Click on the field to configure the source port range. A new window displays to
enter the starting and ending port ranges. For rules where only a single port is necessary,
enter the same port in the start and end port fields.

Dst. Ports (Destination
Ports

The destination port range determines which ports the firewall rule applies to on the
destination IP address. Click on the field to configure the destination port range. A new
window displays to enter the starting and ending ports in the range. For rules where only a
single port is necessary, enter the same port in the start and end port fields.

Advertising