Setting the authentication configuration – Brocade Mobility Access Point System Reference Guide (Supporting software release 5.5.0.0 and later) User Manual
Page 631
Brocade Mobility Access Point System Reference Guide
621
53-1003100-01
10
9. Set the following Access Restrictions:
10.Select
OK
to save the Access Control configuration. Select
Reset
to revert to the
last saved configuration.
Setting the Authentication Configuration
Getting Started with the Mobile Computer
As part of the access point’s Management Policy, define how client authentication requests are
validated using either an external or internal authentication resource:
To configure an authentication resource:
1. Select Configuration.
2. Select
Management
.
3. Select Authentication from the list of Management Policy options in the upper, left-hand, side
of the UI.
Filter Type
Select a filter type for access restriction. Options include IP Access List, Source
Address or None. To restrict management access to specific hosts, select Source
Address as the filter type and provide the allowed addresses within the Source Hosts
field.
IP Access List
If the selected filter type is IP Access List, select an access list from the drop-down
menu or select the Create button to define a new one. IP based firewalls function like
Access Control Lists (ACLs) to filter/mark packets based on the IP from which they
arrive, as opposed to filtering packets on layer 2 ports. IP firewalls implement
uniquely defined access control policies, so if you do not have an idea of what kind of
access to allow or deny, a firewall is of little value, and could provide a false sense of
network security.
Source Hosts
If the selected filter type is Source Address, enter an IP Address or IP Addresses for
the source hosts. To restrict management access to specific hosts, select Source
Address as the filter type and provide the allowed addresses within the Source Hosts
field.
Source Subnets
If the selected filter type is Source Address, enter a source subnet or subnets for the
source hosts. To restrict management access to specific subnets, select Source
Address as the filter type and provide the allowed addresses within the Source
Subnets field.
Logging Policy
If the selected filter is Source Address, enter a logging policy for administrative
access. Options includes None, Denied Requests or All.