Configuring The Role Based Firewall - Motorola RFS Series System Reference Manual

Wireless lan switches wing system
Hide thumbs Also See for RFS Series:
Table of Contents

Advertisement

6-22 Motorola RF Switch System Reference Guide
4. Click the
Add
5. Use the
Interface
include – ge 1-8, up 1, VLAN 1 (plus those VLANs created thus far) and Tunnel n (where n equals the
name(s) of those tunnels created thus far).
6. Use the
IP ACL
interface.
7. Use the
MAC ACL
8. Refer to the
messages if something goes wrong in the transaction between the applet and the switch.
9. Click
OK
to use the changes to the running configuration and close the dialog.
10.Click
Cancel

6.4.4 Configuring the Role Based Firewall

Use the
Attach Role
To attach a role:
1. Select
Security
2. Click the
Security Policy
button.
drop-down menu to select the interface to configure on the switch. Available options
drop-down menu to select an IP ACL used as the inbound IP for the layer 2 or layer 3
drop-down menu to select an MAC ACL used as the MAC IP for the layer 2 interface.
Status
field for the state of the requests made from applet. This field displays error
to close the dialog without committing updates to the running configuration.
screen to view and assign an ACL to a role.
>
Wireless Firewall
tab.
from the main menu tree.

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Rfs4000 4.3Rfs6000 4.3Rfs7000 4.3

Table of Contents