Specifications
Configuring Access Point Security
Altitude 3500 Series Access Point Product Reference Guide
194
4 Click Apply to save any changes to the Advanced Subnet Access screen. Navigating away from the
screen without clicking Apply results in all changes to the screens being lost.
5 Click Undo Changes (if necessary) to undo any changes made. Undo Changes reverts the settings
displayed on the Advanced Subnet Access screen to the last saved configuration.
6 Click Logout to securely exit the Access Point applet. A prompt displays confirming the logout before
the applet is closed.
Configuring VPN Tunnels
The Altitude 35xx allows up to 25 VPN tunnels to either a VPN endpoint or to another Altitude 35xx.
VPN tunnels allow all traffic on a local subnet to route securely through a IPSEC tunnel to a private
network. A VPN port is a virtual port which handles tunneled traffic.
Insert Click the Insert button to insert a new rule directly above a
selected rule in the table. Clicking on a field in the row
displays a new window with configuration options.
Del (Delete) Click Del to remove the selected rule from the table. The
index numbers for all the rows below the deleted row
decrease by 1.
Move Up Clicking the Move Up button moves the selected rule up
by one row in the table. The index numbers for the
affected rows adjust to reflect the new order.
Move Down Clicking the Move Down button moves the selected rule
down by one row in the table. The index numbers for the
affected rows adjust to reflect the new order.
Index The index number determines the order firewall rules are
executed. Rules are executed from the lowest number to
the highest number.
Source IP The Source IP range defines the origin address or address
range for the firewall rule. To configure the Source IP
range, click on the field. A new window displays for
entering the IP address and range.
Destination IP The Destination IP range determines the target address or
address range for the firewall rule. To configure the
Destination IP range, click on the field. A new window
displays for entering the IP address and range.
Transport Select a protocol from the drop-down list. For a detailed
description of the protocols available, see “Available
Protocols” on page 192.
Src. Ports (Source
Ports)
The source port range determines which ports the firewall
rule applies to on the source IP address. Click on the field
to configure the source port range. A new window displays
to enter the starting and ending port ranges. For rules
where only a single port is necessary, enter the same port
in the start and end port fields.
Dst. Ports
(Destination Ports)
The destination port range determines which ports the
firewall rule applies to on the destination IP address. Click
on the field to configure the destination port range. A new
window displays to enter the starting and ending ports in
the range. For rules where only a single port is necessary,
enter the same port in the start and end port fields.