Users Guide

Table Of Contents
In the WebUI
1. Navigate to Configuration > Advanced Services > Stateful Firewall > Global Settings.
2. Check the Enable Deep Packet Inspection option. To disable DPI, uncheck the checkbox.
3. Click Apply.
4. Reload the controller.
In the CLI
To enable global DPI:
(host)(config) #firewall dpi
(host) #reload
To display the application ID, application name, and the ACL/ACE index information for a given session:
(host)(config) #how datapath session dpi
Configuring Policies for AppRF 2.0
Access control lists now contain new application and application category options that let you permit or deny
an application or application category on a given role. See the Dashboard Monitoring
AppRF topic for details
about configuring policies from the Dashboard.
How ACL Works with AppRF
A session entry proceeds through two phases: the application detection phase (phase 1) and the post-
application detection phase (phase 2). A session ACL is applied in phase1 and in phase 2.
In phase1, if the session ACL lookup results in an L3/L4 ACE entry request, the traffic pertaining to the session
is guided by this L3/L4 ACE entry. However, if the session ACL lookup results in an application/application
category specific ACE entry, the enforcement is postponed until phase 2. Once the application is determined,
the session ACL is re-applied with "application/application category" information to determine the final action
on the traffic.
Global Session ACL
The Global Session ACL is used to configure ACL rules that span across or are common to all roles. They are
applied to all roles. The "global-sacl" rules take precedence over any other ACLs that may be in the user role.
A new session ACL has been added named "global-sacl." This session, by default, is in position one for every
user role configured on the controller. The global-sacl session ACL has the following properties:
l It cannot be deleted.
l It always remains at position one in every role and its position cannot be modified.
l It contains only application rules.
l It can be modified in the WebUI, CLI, and dashboard on a master controller.
l Any modifications to it results in the regeneration of ACE’s of all roles.
Role Default Session ACL
You can configure role-specific application configuration using the WebUI and dashboard. For example, you
can deny the facebook application on the guest role using the CLI or dashboard without having to change the
firewall configuration. This per-user role configuration from WebUI or Dashboard is placed in the Role Default
Session ACL.
A new role session ACL named apprf-“role-name-sacl has been added. This session, by default, is in position
two for every user role configured on the controller.
Dell Networking W-Series ArubaOS 6.5.x | User Guide Roles and Policies |
394