Users Guide

Table Of Contents
Dell PowerConnect ArubaOS 5.0 | User Guide Roles and Policies | 281
The following example creates a policy ‘web-only’ that allows web (HTTP and HTTPS) access.
Service (required) Type of traffic, which can be one of the following:
z any: This option specifies that this rule applies to any type of traffic.
z tcp: Using this option, you configure a range of TCP port(s) to match for the rule to be applied.
z udp: Using this option, you configure a range of UDP port(s) to match for the rule to be applied.
z service: Using this option, you use one of the pre-defined services (common protocols such as
HTTPS, HTTP, and others) as the protocol to match for the rule to be applied. You can also specify a
network service that you configure by navigating to the Configuration > Advanced Services >
Stateful Firewall > Network Services page.
z protocol: Using this option, you specify a different layer 4 protocol (other than TCP/UDP) by
configuring the IP protocol value.
Action (required) The action that you want the controller to perform on a packet that matches the specified criteria. This
can be one of the following:
z permit: Permits traffic matching this rule.
z drop: Drops packets matching this rule without any notification.
z reject: Drops the packet and sends an ICMP notification to the traffic source.
z src-nat: Performs network address translation (NAT) on packets matching the rule. When this
option is selected, you need to select a NAT pool. (If this pool is not configured, you configure a
NAT pool by navigating to the Configuration > Advanced > Security > Advanced > NAT Pools.)
z dst-nat: This option redirects traffic to the configured IP address and destination port. An example
of this option is to redirect all HTTP packets to the captive portal port on the Dell controller as used
in the pre-defined policy called “captiveportal”.
z dual-nat: This option performs both source and destination NAT on packets matching the rule.
z redirect to tunnel: This option redirects traffic into a GRE tunnel. This option is used primarily to
redirect all guest traffic into a GRE tunnel to a DMZ router/switch.
z redirect to ESI group: This option redirects traffic to the specified ESI server group. You also
specify the direction of traffic to be redirected: forward, reverse, or both directions.
Log (optional) Logs a match to this rule. This is recommended when a rule indicates a security breach, such as a data
packet on a policy that is meant only to be used for voice calls.
Mirror (optional) Mirrors session packets to datapath or remote destination.
Queue (optional) The queue in which a packet matching this rule should be placed.
Select High for higher priority data, such as voice, and Low for lower priority traffic.
Time Range
(optional)
Time range for which this rule is applicable.
Configure time ranges on the Configuration > Security > Access Control > Time Ranges page.
Pause ARM
Scanning
(optional)
Pause ARM scanning while traffic is present. Note that you must enable “Voice Aware Scanning” in
the ARM profile for this feature to work.
Black List
(optional)
Automatically blacklists a client that is the source or destination of traffic matching this rule. This
option is recommended for rules that indicate a security breach where the blacklisting option can be
used to prevent access to clients that are attempting to breach the security.
White List
(optional)
A rule must explicitly permit a traffic session before it is forwarded to the controller. The last rule in the
white list denies everything else.
Configure white list ACLs on the Configuration > Advanced Services> Stateful Firewall> White List
(ACL) page.
TOS (optional) Value of type of service (TOS) bits to be marked in the IP header of a packet matching this rule when it
leaves the controller.
802.1p Priority
(optional)
Value of 802.1p priority bits to be marked in the frame of a packet matching this rule when it leaves the
controller.
Table 55 Firewall Policy Rule Parameters (Continued)
Field Description