User Guide

Table Of Contents
Bridge GUI Guide: Security Configuration
129
How traffic defined by an SPD entry will be handled is
determined by the
Action specified in the entry, as shown in
Table 4.2.
Traffic on an interface that has no matching SPD definition will
be handled according to whether any SPD entry has been
configured for that interface:
NOTE: Devices
that implement
the IPsec model are
sometimes referred to as
red/black boxes.
An interface with no SPD entry configured for it permits
packets to pass unprotected by IPsec. Such an interface is
a red interface, in IPsec terms, indicating the unprotected
status of traffic on that interface.
An interface with at least one SPD entry configured for it
drops any packet that does not match (one of) the traffic
selector(s) defined by the SPD entry(-ies) configured for
that interface. In IPsec terms, such an interface is
functioning as a black interface, indicating the secure
status of any traffic passing on it.
SPD entry settings include:
Policy Name - identifies the SPD entry in the Bridge
configuration.
NOTE: A BSS must
be already be pres-
ent on a Bridge radio be-
fore it can be associated
with an SPD entry.
Interface Name and BSS Name - associates the SPD entry
with a particular interface on the Bridge.
The
Interface Name dropdown provides a list of the Bridge’s
Ethernet interfaces. The
BSS Name dropdown provides a
list of BSSs currently configured on (one of) the Bridge’s
internal radio(s). Use only one of these dropdown lists to
specify only a single Ethernet or wireless interface.
Local Address and Local Mask - defines the traffic to which
the SPD entry will apply by the local subnet of IP addresses
that will comprise the outbound source/inbound destination
of that traffic.
Remote Address and Remote Mask - defines the traffic to
which the SPD entry will apply by the remote subnet of IP
addresses that will comprise the inbound source/outbound
destination of that traffic
Priority - establishes the order in which the policy defined by
the entry will be applied, from
1 to 100, relative to other
configured policies.
Priority values must be unique. Policies
with lower
Priority numbers take precedence over those
with higher
Priority numbers.
Table 4.2. Configurable SPD Entry Actions
action inbound packets outbound packets
Apply
must be IPsec-protected IPsec-encrypt and send as ESP
Bypass
must not be IPsec-protected send unprotected by IPsec
Drop
drop without further processing