Configuring Firewalls And Access Control Lists - Brocade Communications Systems RFS6000 System Reference Manual

Provides centralized wireless lan (wlan) configuration and management
Hide thumbs Also See for RFS6000:
Table of Contents

Advertisement

6

Configuring firewalls and access control lists

3. Select a detected Client and click the Delete button to remove it from the list of Clients you are
4. Click on the Export button to export the contents of the table to a Comma Separated Values file
Configuring firewalls and access control lists
An Access Control List (ACL) is a a sequential collection of permit and deny conditions that apply to
controller packets. When a packet is received on an interface, the controller compares the fields in
the packet against any applied ACLs to verify the packet has the required permissions to be
forwarded, based on the criteria specified in the access lists.
NOTE
If a packet does not meet any of the criteria specified in the ACL, the packet is dropped.
348
Violation Type
Displays the reason the violation occurred for each detected Client. Use the
Violation Type to discern whether the detected Client is truly a threat on the
controller managed network (and must be removed) or can be interpreted as a non
threat. The following violation types are possible:
Excessive Probes
Excessive Association
Excessive Disassociation
Excessive Authentication failure
Excessive Crypto replays
Excessive 802.11 replays
Excessive Decryption failures
Excessive Unassociated Frames
Excessive EAP Start Frames
Null destination
Same source/destination MAC
Source multicast MAC
Weak WEP IV
TKIP Countermeasures
Invalid Frame Length
Excessive EAP-NAKS
Invalid 802.1x frames
Invalid Frame Type
Beacon with broadcast ESSID
Frames with known bad ESSIDs
Unencrypted traffic
Frames with non-changing WEP IV
Detect Adhoc Networks
De-auth from broadcast smac
Invalid Sequence Number
NOTE: The following violation types require the Access Point be in scan mode:
Beacon with broadcast ESSID
Frames with known bad ESSIDs
Time Remaining
Displays the time remaining before the next filter activity. Detected Clients are
removed from the filtered list when they no longer violate the thresholds defined
within the Configuration tab.
tracking as potential threats within the controller managed network.
(CSV).
Brocade Mobility RFS6000 and RFS7000 System Reference Guide
53-1001858-01

Advertisement

Table of Contents
loading

This manual is also suitable for:

Rfs7000

Table of Contents