beautypg.com

Configuring mac firewall rules – Brocade Mobility Access Point System Reference Guide (Supporting software release 5.5.0.0 and later) User Manual

Page 563

background image

Brocade Mobility Access Point System Reference Guide

553

53-1003100-01

8

FIGURE 14

Security - Device Fingerprinting - Client Identity Group - New Client Identity Group

From the drop-down, select the Client Identity Policy to include in this group. Use the buttons next to
the drop-down to manage and create new Client Identity policies.

Use the Precedence control to set the precedence for the Client Identity. This index sets the
sequence the client identity in this Client Identity Group is checked or matched.

Click Ok to save changes. Click Reset to revert all changes made to this screen.

Click Exit to close the Client Identity Group screen.

Configuring MAC Firewall Rules

Getting Started with the Mobile Computer

Access points can use MAC based firewalls like Access Control Lists (ACLs) to filter/mark packets
based on the IP from which they arrive, as opposed to filtering packets on Layer 2 ports.

Optionally filter Layer 2 traffic on a physical Layer 2 interface using MAC addresses. A MAC firewall
rule uses source and destination MAC addresses for matching operations, where the result is a
typical allow, deny or mark designation to packet traffic.