viii WiNG 4.4 Switch System Reference Guide
5.5 Layer 3 Mobility ..........................................................................................................................................................................................5-48
5.5.1 Configuring Layer 3 Mobility ...........................................................................................................................................................5-49
5.5.2 Defining the Layer 3 Peer List .........................................................................................................................................................5-51
5.5.3 Reviewing Layer 3 Peer List Statistics ............................................................................................................................................5-52
5.5.4 Reviewing Layer 3 MU Status .........................................................................................................................................................5-53
5.6 Configuring Self Healing ............................................................................................................................................................................5-54
5.6.1 Configuring Self Healing Neighbor Details .....................................................................................................................................5-55
5.7 Configuring Switch Discovery ....................................................................................................................................................................5-58
5.7.1 Configuring Discovery Profiles ........................................................................................................................................................5-58
5.7.2 Viewing Discovered Switches .........................................................................................................................................................5-60
5.8.1 RTLS Overview .................................................................................................................................................................................5-63
5.8.2 SOLE - Smart Opportunistic Location Engine ..................................................................................................................................5-64
5.8.3 Defining Site Parameters ................................................................................................................................................................5-64
5.8.4 Configuring SOLE Parameters .........................................................................................................................................................5-66
5.8.5 Configuring Aeroscout Parameters .................................................................................................................................................5-68
5.8.6 Configuring Ekahau Parameters ......................................................................................................................................................5-70
Chapter 6, Switch Security
6.1 Displaying the Main Security Interface ........................................................................................................................................................6-2
6.2 Access Point Detection .................................................................................................................................................................................6-4
6.2.1 Enabling and Configuring AP Detection ............................................................................................................................................6-4
6.2.2 Authorized / Ignored APs ...................................................................................................................................................................6-7
6.2.3 Unauthorized APs (AP Reported) ......................................................................................................................................................6-7
6.2.4 Unauthorized APs (MU Reported) ......................................................................................................................................................6-9
6.2.5 AP Containment .................................................................................................................................................................................6-9
6.3 Wireless Intrusion Detection / Protection ..................................................................................................................................................6-11
6.3.1 Configuring Wireless Intrusion Detection / Protection ...................................................................................................................6-11
6.3.2 Viewing Filtered MUs ......................................................................................................................................................................6-13
6.4 Configuring Firewalls and Access Control Lists .........................................................................................................................................6-15
6.4.1 ACL Overview ..................................................................................................................................................................................6-15
6.4.2 Attaching an ACL on a WLAN Interface/Port ..................................................................................................................................6-18
6.4.3 Attaching an ACL Layer 2/Layer 3 Configuration ............................................................................................................................6-20
6.4.4 Configuring the Role Based Firewall ...............................................................................................................................................6-22
6.4.5 Attaching Adaptive AP WLANs .......................................................................................................................................................6-24
6.4.6 Attaching Adaptive AP LANs ...........................................................................................................................................................6-27
6.4.7 Configuring Wireless Filters ............................................................................................................................................................6-28
6.4.8 Editing an Existing Wireless Filter ..................................................................................................................................................6-30
6.4.9 Adding a new Wireless Filter ..........................................................................................................................................................6-31
6.4.10 Associating an ACL with WLAN ....................................................................................................................................................6-32
6.4.11 Configuring the Firewall ................................................................................................................................................................6-33
6.4.12 Configuring Layer 2 Firewall ..........................................................................................................................................................6-37
6.4.13 Configuring WLAN Firewall rules ..................................................................................................................................................6-39
6.4.14 Configuring Denial of Service (DoS) Attack Firewall Rules ..........................................................................................................6-42
6.4.15 Configuring the Role ......................................................................................................................................................................6-44
6.4.16 Configuring Firewall Logging Options ...........................................................................................................................................6-48
6.4.17 Reviewing Firewall and ACL Statistics .........................................................................................................................................6-50
6.5 Configuring NAT Information .....................................................................................................................................................................6-56
6.5.1 Defining Dynamic NAT Translations ...............................................................................................................................................6-56
6.5.2 Defining Static NAT Translations ....................................................................................................................................................6-59
6.5.3 Configuring NAT Interfaces .............................................................................................................................................................6-62
6.5.4 Viewing NAT Status ........................................................................................................................................................................6-63
6.6 Configuring IKE Settings .............................................................................................................................................................................6-64
6.6.1 Defining the IKE Configuration ........................................................................................................................................................6-64
6.6.2 Setting IKE Policies ..........................................................................................................................................................................6-66