beautypg.com

H3C Technologies H3C WX6000 Series Access Controllers User Manual

Page 17

background image

xi

Configuring Rogue Device Detection....................................................................................................42-5

Configuring AP Operating Mode ...................................................................................................42-5

Configuring Detection Rules..........................................................................................................42-7

Configuring Detection Rule Lists ...................................................................................................42-9

Enabling Countermeasures and Configuring Aging Time for Detected Rogue Devices.............42-10

Displaying Monitor Record ..........................................................................................................42-10

Displaying History Record ...........................................................................................................42-11

Configuring WIDS ...............................................................................................................................42-11

Configuring WIDS........................................................................................................................42-11

Displaying History Record ...........................................................................................................42-12

Displaying Statistics Information .................................................................................................42-12

Configuring Frame Filtering ................................................................................................................42-13

Configuring Dynamic Blacklist.....................................................................................................42-13

Configuring Static Blacklist ..........................................................................................................42-14

Configuring White List .................................................................................................................42-14

WLAN Security Configuration Example ..............................................................................................42-15

Rogue Detection Configuration Example ....................................................................................42-15

43 Authorized IP..........................................................................................................................................43-1

Overview ...............................................................................................................................................43-1

Configuring Authorized IP .....................................................................................................................43-1

44 User Isolation .........................................................................................................................................44-1

User Isolation Overview ........................................................................................................................44-1

Before User Isolation Is Enabled...................................................................................................44-1

After User Isolation Is Enabled......................................................................................................44-2

Configuring User Isolation.....................................................................................................................44-2

Configuration Procedure................................................................................................................44-2

Displaying User Isolation Information............................................................................................44-3

User Isolation Configuration Example...................................................................................................44-4

45 ACL Configuration.................................................................................................................................45-1

ACL Overview .......................................................................................................................................45-1

Introduction to IPv4 ACL................................................................................................................45-1

Introduction to IPv6 ACL................................................................................................................45-3

Effective Period of an ACL ............................................................................................................45-4

ACL Step .......................................................................................................................................45-4

Configuring an ACL...............................................................................................................................45-5

Configuration Task List..................................................................................................................45-5

Configuring a Time Range ............................................................................................................45-5

Creating an IPv4 ACL....................................................................................................................45-7

Configuring a Rule for a Basic IPv4 ACL ......................................................................................45-7

Configuring a Rule for an Advanced IPv4 ACL .............................................................................45-9

Configuring a Rule for an Ethernet Frame Header ACL .............................................................45-11

Creating an IPv6 ACL..................................................................................................................45-13

Configuring a Rule for a Basic IPv6 ACL ....................................................................................45-14

Configuring a Rule for an Advanced IPv6 ACL ...........................................................................45-15

Configuration Guidelines.....................................................................................................................45-17