Forwarding database – Brocade Mobility Access Point System Reference Guide (Supporting software release 5.5.0.0 and later) User Manual

Page 147

Advertising
background image

Brocade Mobility Access Point System Reference Guide

137

53-1003100-01

5

24. Select OK to save the changes to the basic configuration. Select Reset to revert to the last

saved configuration.

25. Select the Security tab.

FIGURE 47

Network - OSPF Virtual Interface - Security tab

26. Use the Inbound IP Firewall Rules drop-down menu to select the IP access and deny rules to

apply to the OSPF dynamic route.

Either select an existing IP firewall policy or use the default set of IP firewall rules. The firewall
inspects OSPF route traffic flows and detects potential attacks on the dynamic route not visible to
traditional wired firewall appliances. Select the Create icon to define a new set of IP firewall rules
that can be applied to the OSPF route configuration. Selecting Edit allows for the modification of an
existing IP firewall rules configuration. For more information, see Wireless Firewall on page 8-531.

Use the VPN Crypto Map drop-down menu to select and apply a VPN crypto map entry to apply to
the OSPF dynamic route.

Crypto Map entries are sets of configuration parameters for encrypting packets passing through
the VPN Tunnel. If a Crypto Map configuration does not exist suiting the needs of this virtual
interface, select the Create icon to define a new Crypto Map configuration or the Edit icon to modify
an existing configuration.

27. Select OK to save the changes to the OSPF route security configuration. Select Reset to revert

to the last saved configuration.

Forwarding Database

Profile Network Configuration

A Forwarding Database is used by a bridge to forward or filter packets. The bridge reads the
packet’s destination MAC address and decides to either forward the packet or drop (filter) it. If it is
determined the destination MAC is on a different network segment, it forwards the packet to the
segment. If the destination MAC is on the same network segment, the packet is dropped (filtered).
As nodes transmit packets through the bridge, the bridge updates its forwarding database with
known MAC addresses and their locations on the network. This information is then used to decide
to filter or forward the packet.

Advertising