Extreme Networks Summit WM User Manual page 185

Table of Contents

Advertisement

4 From the Filter ID drop-down list, click Non-Authenticated.
The Filtering tab automatically provides a Deny All rule already in place. Use this rule as the final
rule in the non-authenticated filter for Captive Portal.
5 For each filtering rule you are defining, do the following:
In the IP/subnet:port box, type the destination IP address. You can also specify an IP range, a
port designation, or a port range on that IP address.
In the Protocol drop-down list, click the applicable protocol. The default is N/A.
6 For Captive Portal assignment, define a rule to allow access to the default gateway for this WM-AD:
Select IP/Port.
Type the default gateway IP address that you defined in the Topology tab for this WM-AD.
7 Click Add. The information is displayed in the Filter Rules section of the tab.
8 Click the new filter, then do the following:
If applicable, select In to refer to traffic from the wireless device that is trying to get on the
network.
If applicable, select Out to refer to traffic from the network host that is trying to get to a wireless
device.
Select the Allow checkbox applicable to the rule you defined.
9 To edit the order of filters, click the filter, and then click the Up and Down buttons. The filtering
rules are executed in the order you define here.
10 To save your changes, click Save.
Summit WM User Guide, Software Version 5.3
185

Advertisement

Table of Contents
loading

Table of Contents