Configuring Vpn Tunnels - Extreme Networks Altitude 4700 Series Product Reference Manual

Software version 4.1
Hide thumbs Also See for Altitude 4700 Series:
Table of Contents

Advertisement

Insert
Del (Delete)
Move Up
Move Down
Index
Source IP
Destination IP
Transport
Src. Ports (Source
Ports)
Dst. Ports
(Destination Ports
4 Click Apply to save any changes to the Advanced Subnet Access screen. Navigating away from the
screen without clicking Apply results in all changes to the screens being lost.
5 Click Undo Changes (if necessary) to undo any changes made. Undo Changes reverts the settings
displayed on the Advanced Subnet Access screen to the last saved configuration.
6 Click Logout to securely exit the Access Point applet. A prompt displays confirming the logout before
the applet is closed.

Configuring VPN Tunnels

Create a VPN tunnel to ensure data privacy between two end points, even while using an insecure
communication medium like the Internet. VPNs use a secure tunnel between two end points as if they
are directly connected over a secure connection.
Altitude 4700 Series Access Point Product Reference Guide
Click the Insert button to insert a new rule directly above a
selected rule in the table. Clicking on a field in the row
displays a new window with configuration options.
Click Del to remove the selected rule from the table. The
index numbers for all the rows below the deleted row
decrease by 1.
Clicking the Move Up button moves the selected rule up
by one row in the table. The index numbers for the
affected rows adjust to reflect the new order.
Clicking the Move Down button moves the selected rule
down by one row in the table. The index numbers for the
affected rows adjust to reflect the new order.
The index number determines the order firewall rules are
executed. Rules are executed from the lowest number to
the highest number.
The Source IP range defines the origin address or address
range for the firewall rule. To configure the Source IP
range, click on the field. A new window displays for
entering the IP address and range.
The Destination IP range determines the target address or
address range for the firewall rule. To configure the
Destination IP range, click on the field. A new window
displays for entering the IP address and range.
Select a protocol from the drop-down list. For a detailed
description of the protocols available, see
Protocols" on page
223.
The source port range determines which ports the firewall
rule applies to on the source IP address. Click on the field
to configure the source port range. A new window displays
to enter the starting and ending port ranges. For rules
where only a single port is necessary, enter the same port
in the start and end port fields.
The destination port range determines which ports the
firewall rule applies to on the destination IP address. Click
on the field to configure the destination port range. A new
window displays to enter the starting and ending ports in
the range. For rules where only a single port is necessary,
enter the same port in the start and end port fields.
"Available
225

Advertisement

Table of Contents
loading

Table of Contents