Wireless/Redundant Edge Services xl Module Management and Configuration Guide WS.02.xx and greater

Table Of Contents
7-22
Access Control Lists (ACLs)
Configuring ACLs
Click the OK button to return to the Add Rule screen and finish
configuring other filters.
9. In the Source Wildcard/Mask field, use the drop-down menu to select one
of the following:
anyThe rule will apply to traffic from any IP address. (This allows
you to filter traffic based on fields other than the source IP address.)
host—The rule will apply specifically to a single source IP address.
Enter this address in the Source Address field.
numbers 1 through 31—The rule selects traffic from an entire subnet-
work with the specified prefix length. Enter the subnetwork’s net-
work address in the Source Address field.
For example, you select 24 in the Source Wildcard/Mask field and
192.168.8.0 in the Source Address field. The rule matches only the
first 24 bits (three octets) of source IP addresses against the specified
source address. Any packet from the 192.168.8.0/24 subnetwork is
selected.
10. In the Destination Wildcard/Mask and Destination Address fields, specify the
destination address for selected traffic in the same way that you specified
the source address.
11. If you plan to apply this rule to the downlink port, you can optionally
specify the WLAN. In the Wlan Index field, specify the index number
(from 1 through 32) of the WLAN from which traffic must arrive.
If you do not specify a WLAN index, the rule will apply to any traffic that
matches other filters.
Note The WLAN filter only takes effect if you apply this ACL to a physical interface.
You should never specify a WLAN index for an ACL that you apply to the uplink
port. Traffic from the uplink port is not marked for a WLAN, so the rule will
not select any traffic.
12. Click the OK button to apply the rule.
The rule is now listed in the Associated Rules section of the Security > ACLs >
Configuration screen (when the corresponding ACL is selected).
Remember to click the Save link to preserve the configuration.