beautypg.com

Brocade Mobility Access Point System Reference Guide (Supporting software release 5.5.0.0 and later) User Manual

Page 266

background image

256

Brocade Mobility Access Point System Reference Guide

53-1003100-01

5

FIGURE 129

Ethernet Ports - Security screen

Refer to the Access Control field. As part of the port’s security configuration, Inbound IP and MAC
address firewall rules are required. The configuration can be optionally overridden if needed.

Use the IP Inbound Firewall Rules and MAC Inbound Firewall Rules drop-down menus to select the
firewall rules to apply to this profile’s Ethernet port configuration.

The firewall inspects IP and MAC traffic flows and detects attacks typically not visible to traditional
wired firewall appliances.

If a firewall rule does not exist suiting the data protection needs of the target port configuration,
select the Create icon to define a new rule configuration. For more information, see Wireless
Firewall on page 8-531
.

Refer to the Trust field to define the following:

Trust ARP Responses

Select this option to enable ARP trust on this port. ARP packets received on this port are
considered trusted and information from these packets is used to identify rogue devices within
the network. The default value is disabled.