Getting started with the mobile computer, Wireless firewall, Chapter 8 – Brocade Mobility Access Point System Reference Guide (Supporting software release 5.5.0.0 and later) User Manual
Page 541: Rmation, see, Wireless
![background image](/manuals/361710/541/background.png)
Brocade Mobility Access Point System Reference Guide
531
53-1003100-01
Chapter
8
Getting Started with the Mobile Computer
When taking precautions to secure wireless traffic from a client to an access point, the network
administrator should not lose sight of the security solution in it's entirety, since the network’s chain
is as weak as its weakest link. An access point managed wireless network provides seamless data
protection and user validation to protect and secure data at each vulnerable point in the network.
This security is offered at the most granular level, with role and location based secure access
available to users based on identity as well as the security posture of the client device.
There are multiple dimensions to consider when addressing the security of an access point
managed wireless network, including:
•
•
•
Configuring MAC Firewall Rules
•
•
•
•
Security Deployment Considerations
Wireless Firewall
Getting Started with the Mobile Computer
A firewall enforces access control, and is considered a first line of defense in protecting proprietary
information within the access point managed network. The means by which this is accomplished
varies, but in principle firewalls are mechanisms that block and permit data traffic within the
network. Firewalls implement uniquely defined access control policies, so if you do not have an
idea of what kind of access to allow or deny, a firewall is of little value, and in fact could provide a
false sense of security.
With Brocade’ access points, firewalls are configured to protect against unauthenticated logins
from outside the network. This helps prevent hackers from accessing wireless clients within the
network. Well designed firewalls block traffic from outside the network, but permit authorized users
to communicate freely outside the network.
Firewalls can be implemented in both hardware and software, or a combination of both. All traffic
entering or leaving the network passes through the firewall, which examines each message and
blocks those not meeting the defined security criteria (rules).
Firewall rules define traffic permitted or denied within the network. Rules are processed by a
firewall device from first to last. When a rule matches the network traffic processed by an access
point, the firewall uses that rule's action to determine whether traffic is allowed or denied.