Concept Guide

Service
Category
Description
Network
Select a service from the list of available services. You can allow or deny access to any or
all of the services based on your requirement:
l any—Access is allowed or denied to all services.
l custom—Available options are TCP, UDP, and Other. If you select the TCP or UDP
options, enter appropriate port numbers. If you select the Other option, enter the
appropriate ID.
NOTE: If Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) use the
same port, ensure that you configure separate access rules to permit or deny access.
Action
Select any of following actions:
l Select Allow to allow access to users based on the access rule.
l Select Deny to deny access to users based on the access rule.
l Select Destination-NAT to allow making changes to the destination IP address.
l Select Source-NAT to allow making changes to the source IP address.
Default: All client traffic is directed to the default VLAN.
Tunnel: The traffic from the Network Assigned clients is directed to the VPNtunnel.
VLAN: Specify the non-default VLANIDto which the guest traffic needs to be redirected to.
Destination
Select a destination option for the access rules for network services, applications, and
application categories. You can allow or deny access to any the following destinations
based on your requirements.
l to all destinations Access is allowed or denied to all destinations.
l to a particular server—Access is allowed or denied to a particular server. After
selecting this option, specify the IP address of the destination server.
l except to a particular server—Access is allowed or denied to servers other than the
specified server. After selecting this option, specify the IP address of the destination
server.
l to a network—Access is allowed or denied to a network. After selecting this option,
specify the IP address and netmask for the destination network.
l except to a network—Access is allowed or denied to networks other than the
specified network. After selecting this option, specify the IP address and netmask of the
destination network.
l to domain name—Access is allowed or denied to the specified domains. After
selecting this option, specify the domain name in the Domain Name text box.
Log
Select the Log check box if you want a log entry to be created when this rule is triggered.
Instant supports firewall-based logging. Firewall logs on the W-IAPs are generated as
security logs.
Table 39: Access Rule Configuration Parameters
Dell Networking W-Series Instant 6.5.1.0-4.3.1.0 | User Guide Roles and Policies | 180