Installation Guide

Table Of Contents
Task 5: Configuring security
Isolating SMs
In an AP, you can prevent SMs in the sector from directly communicating with each
other. In CMMmicro Release 2.2 or later and the CMM4, you can prevent connected
APs from directly communicating with each other, which prevents SMs that are in
different sectors of a cluster from communicating with each other.
In the AP, the SM Isolation parameter is available in the General tab of the
Configuration web page. In the drop-down menu for that parameter, you can
configure the SM Isolation feature by any of the following selections:
Disable SM Isolation (the default selection). This allows full communication
between SMs.
Block SM Packets from being forwarded. This prevents both multicast/broadcast
and unicast SM-to-SM communication.
Block and Forward SM Packets to Backbone. This not only prevents
multicast/broadcast and unicast SM-to-SM communication but also sends the
packets, which otherwise are handled SM to SM, through the Ethernet port of the
AP.
In the CMMmicro and the CMM4, SM isolation treatment is the result of how you
choose to manage the port-based VLAN feature of the embedded switch, where you
can switch all traffic from any AP to an uplink port that you specify. However, this is
not packet level switching. It is not based on VLAN IDs. See the VLAN Port
Configuration parameter in the dedicated user guide that supports the CMM
product that you are deploying.
Filtering management through Ethernet
You can configure the SM to disallow any device that is connected to its Ethernet
port from accessing the IP address of the SM. If you set the Ethernet Access
Control parameter to Enabled, then
no attempt to access the SM management interface (by HTTP, SNMP, FTP, or
TFTP) through Ethernet can succeed.
any attempt to access the SM management interface over the air (by IP address,
presuming that LAN1 Network Interface Configuration, Network Accessibility
is set to Public, or by link from the Session Status or Remote Subscribers tab in the
AP) is unaffected.
Allowing management only from specified IP addresses
The Security tab of the Configuration web page in the AP and SM includes the IP
Access Control parameter. You can specify one, two, or three IP addresses that
must be allowed to access the management interface (by HTTP, SNMP, FTP, or
TFTP).
If you select
88
pmp-0957 (April 2015)