H3C Technologies H3C WX6000 Series Access Controllers User Manual
Page 17

xi
Configuring Rogue Device Detection....................................................................................................42-5
Configuring AP Operating Mode ...................................................................................................42-5
Configuring Detection Rules..........................................................................................................42-7
Configuring Detection Rule Lists ...................................................................................................42-9
Enabling Countermeasures and Configuring Aging Time for Detected Rogue Devices.............42-10
Displaying Monitor Record ..........................................................................................................42-10
Displaying History Record ...........................................................................................................42-11
Configuring WIDS ...............................................................................................................................42-11
Configuring WIDS........................................................................................................................42-11
Displaying History Record ...........................................................................................................42-12
Displaying Statistics Information .................................................................................................42-12
Configuring Frame Filtering ................................................................................................................42-13
Configuring Dynamic Blacklist.....................................................................................................42-13
Configuring Static Blacklist ..........................................................................................................42-14
Configuring White List .................................................................................................................42-14
WLAN Security Configuration Example ..............................................................................................42-15
43 Authorized IP..........................................................................................................................................43-1
Overview ...............................................................................................................................................43-1
Configuring Authorized IP .....................................................................................................................43-1
44 User Isolation .........................................................................................................................................44-1
User Isolation Overview ........................................................................................................................44-1
Before User Isolation Is Enabled...................................................................................................44-1
After User Isolation Is Enabled......................................................................................................44-2
Configuring User Isolation.....................................................................................................................44-2
Configuration Procedure................................................................................................................44-2
Displaying User Isolation Information............................................................................................44-3
User Isolation Configuration Example...................................................................................................44-4
45 ACL Configuration.................................................................................................................................45-1
ACL Overview .......................................................................................................................................45-1
Introduction to IPv4 ACL................................................................................................................45-1
Introduction to IPv6 ACL................................................................................................................45-3
Effective Period of an ACL ............................................................................................................45-4
ACL Step .......................................................................................................................................45-4
Configuring an ACL...............................................................................................................................45-5
Configuration Task List..................................................................................................................45-5
Configuring a Time Range ............................................................................................................45-5
Creating an IPv4 ACL....................................................................................................................45-7
Creating an IPv6 ACL..................................................................................................................45-13
Configuration Guidelines.....................................................................................................................45-17