Built-In Port-Based Exception Filters - Extreme Networks Summit WM User Manual

Table of Contents

Advertisement

Configuring the Summit WM Controller
the administrator can define specific exception filters at the interface-level to customize network access.
These filters do not depend on a WM-AD definition.

Built-in port-based exception filters

On the Summit WM Controller, various port-based exception filters are built in and invoked
automatically. These filters protect the Summit WM Controller from unauthorized access to system
management functions and services via the ports. Access to system management functions is granted if
the administrator selects the allow management option.
Allow management traffic is now specific to the interface being allowed. For example, if allow
management is allowed on a physical port (esa0), only users connected through ESA0 will be able to get
access to the system. Users connecting on any other interface such as a WM-AD (esa6) will no longer be
able to target ESA0 to gain management access to the system. In order to allow access for users
connected on a WM-AD, the WM-AD configuration itself must have allow management enabled and
users will only be able to target the WM-AD interface specifically.
NOTE
You can also enable management traffic in the WM-AD definition.
For example, on the Summit WM Controller's data interfaces (both physical interfaces and WM-AD
virtual interfaces), the built-in exception filter prohibits invoking SSH, HTTPS, or SNMP. However, such
traffic is allowed, by default, on the management port.
If management traffic is explicitly enabled for any interface (physical port or WM-AD), access is
implicitly extended to that interface through any of the other interfaces (WM-AD). Only traffic
specifically allowed by the interface's exception filter is allowed to reach the Summit WM Controller
itself. All other traffic is dropped. Exception filters are dynamically configured and regenerated
whenever the system's interface topology changes (for example, a change of IP address for any
interface).
Enabling management traffic on an interface adds additional rules to the exception filter, which opens
up the well-known IP(TCP/UDP) ports, corresponding to the HTTPS, SSH, and SNMP applications.
The port-based built-in exception filtering rules, in the case of traffic from WM-AD users, are applicable
to traffic targeted directly for the WM-ADs interface. For example, a WM-AD filter may be generic
enough to allow traffic access to the Summit WM Controller's management (for example, Allow All
[*.*.*.*]). Exception filter rules are evaluated after the user's WM-AD assigned filter policy, as such, it is
possible that the WM-AD policy allow the access to management functions that the exception filter
denies. These packets are dropped.
To enable SSH, HTTPS, or SNMP access through a data interface:
1 From the main menu, click Summit Controller Configuration. The Summit Controller
Configuration page is displayed.
2 In the left pane, click IP Addresses. The Interfaces page is displayed.
48
Summit WM User Guide, Software Version 5.3

Advertisement

Table of Contents
loading

Table of Contents