Configuring vpn tunnels – Brocade Mobility 7131 Access Point Product Reference Guide (Supporting software release 4.4.0.0 and later) User Manual
Page 228
216
Brocade Mobility 7131 Access Point Product Reference Guide
53-1002517-01
6
3. Configure the Firewall Rules field as required add, insert or delete firewall rules into the list of
advanced rules.
4. Click Apply to save any changes to the Advanced Subnet Access screen. Navigating away from
the screen without clicking Apply results in all changes to the screens being lost.
5. Click Undo Changes (if necessary) to undo any changes made. Undo Changes reverts the
settings displayed on the Advanced Subnet Access screen to the last saved configuration.
6. Click Logout to securely exit the Access Point applet. A prompt displays confirming the logout
before the applet is closed.
Configuring VPN Tunnels
Create a VPN tunnel to ensure data privacy between two end points, even while using an insecure
communication medium like the Internet. VPNs use a secure tunnel between two end points as if
they are directly connected over a secure connection.
Inbound or Outbound
Select
Inbound
or
Outbound
from the drop-down menu to specify if a firewall rule is
intended for inbound traffic to an interface or outbound traffic from that interface.
Add
Click the
Add
button to insert a new rule at the bottom of the table. Click on a row to display
a new window with configuration options for that field.
Insert
Click the
Insert
button to insert a new rule directly above a selected rule in the table.
Clicking on a field in the row displays a new window with configuration options.
Del (Delete)
Click
Del
to remove the selected rule from the table. The index numbers for all the rows
below the deleted row decrease by 1.
Move Up
Clicking the
Move Up
button moves the selected rule up by one row in the table. The index
numbers for the affected rows adjust to reflect the new order.
Move Down
Clicking the
Move Down
button moves the selected rule down by one row in the table. The
index numbers for the affected rows adjust to reflect the new order.
Index
The index number determines the order firewall rules are executed. Rules are executed
from the lowest number to the highest number.
Source IP
The
Source IP
range defines the origin address or address range for the firewall rule. To
configure the Source IP range, click on the field. A new window displays for entering the IP
address and range.
Destination IP
The
Destination IP
range determines the target address or address range for the firewall
rule. To configure the Destination IP range, click on the field. A new window displays for
entering the IP address and range.
Transport
Select a protocol from the drop-down list. For a detailed description of the protocols
available, see Available Protocols on page 6-214.
Src. Ports (Source
Ports)
The source port range determines which ports the firewall rule applies to on the source IP
address. Click on the field to configure the source port range. A new window displays to
enter the starting and ending port ranges. For rules where only a single port is necessary,
enter the same port in the start and end port fields.
Dst. Ports (Destination
Ports
The destination port range determines which ports the firewall rule applies to on the
destination IP address. Click on the field to configure the destination port range. A new
window displays to enter the starting and ending ports in the range. For rules where only a
single port is necessary, enter the same port in the start and end port fields.