Wireless/Redundant Edge Services xl Module Management and Configuration Guide WS.02.xx and greater

Table Of Contents
7-16
Access Control Lists (ACLs)
Configuring ACLs
7. In the Source Wildcard/Mask field, use the drop-down menu to select one
of the following:
anyThe rule will apply to traffic from any IP address. (This allows
you to filter traffic based on fields other than the source IP address.)
host—The rule will apply specifically to a single source IP address.
Enter this address in the Source Address field.
numbers 1 through 31—The rule selects traffic from an entire subnet-
work with the specified prefix length. Enter the subnetwork’s net-
work address in the Source Address field.
For example, you select 24 in the Source Wildcard/Mask field and
192.168.8.0 in the Source Address field. The rule matches only the
first 24 bits (three octets) of source IP addresses against the specified
source address. Any packet from the 192.168.8.0/24 subnetwork is
selected.
8. If you plan to apply this rule to the downlink port, you can optionally
specify the WLAN. In the Wlan Index field, specify the index number
(from 1 through 32) of the WLAN from which traffic must arrive.
If you do not specify a WLAN index, the rule will apply to any traffic that
matches other filters.
Note The WLAN filter only takes effect if you apply this ACL to a physical interface.
However, you should never specify a WLAN index for an ACL that you apply
to the uplink port. Traffic from the uplink port is not marked for a WLAN, so
the rule will not select any traffic.
9. Click the OK button to apply the rule.
The rule is now listed in the Associated Rules section of the Security > ACLs >
Configuration screen (when the corresponding ACL is selected).
Remember to click the Save link to preserve the configuration.
Creating Rules for Extended IP ACLs
Configuring rules for an extended IP ACL is similar to configuring rules for
standard IP ACLs. However, these rules can also select traffic by protocol,
application, and destination IP address.
Refer to Table 7-4 to verify that a particular option is supported for the
interface to which you plan to apply the ACL. An X under the interface means
that the option is supported for that interface.