User's Guide
Table Of Contents
- About This Guide
- Introduction
- AirTight Management Console Configuration
- Configure Language Setting
- Configure Time Zone and Tag for Location
- User Management
- User Authentication
- Wireless Intrusion Prevention System
- Manage WiFi Access
- Configure Device - Server Communication Settings
- Manage Policy Templates
- Manage Authorized WLAN Policy
- View High Availability Status for Server
- View/Upgrade License Details
- Manage Look and Feel of Reports
- Configure NTP
- Configure RF Propagation Settings
- Configure Live RF View Setting
- Configure Location Tracking
- Manage Auto Location Tagging
- Set up and Manage Server Cluster
- Manage Vendor OUIs
- Manage Device Template
- Configure SMTP Settings
- View System Status
- Upgrade Server
- Configure Auto Deletion Settings
- Manage Audit Log Settings
- Configure Integration with Enterprise Security Management Servers
- Manage WLAN Integration
- Manage AirTight Mobile Clients
- AirTight Mobile Settings
- Manage AirTight Mobile Clients
- Add AirTight Mobile Group Manually
- Edit AirTight Mobile Group
- Attach Policy to AirTight Mobile Group
- Overwrite Existing Policy for AirTight Mobile Group
- Detach Policy from AirTight Mobile Group
- View AirTight Mobile Group Policy in HTML Format
- View AirTight Mobile Group Policy in XML Format
- Activate Automatic Client Grouping
- Apply Default Policy to New Groups
- Print List of AirTight Mobile Groups for Location
- Delete AirTight Mobile Group
- Dashboard
- Devices
- AirTight Devices
- Device Properties
- View Visible LANs
- View Visible APs
- View Visible Clients
- View Active APs
- View Active Clients
- View AirTight Device Events
- View Channel Occupancy
- View Interference
- View Mesh Network Links
- Search AirTight Devices
- Sort AirTight Devices
- Change Location
- Print AirTight Device Information for Location
- Reboot Device
- Troubleshoot Device
- Upgrade or Repair Device
- Enable Pagination for AirTight Device Listing and Set Page Size
- Disable Pagination for AirTight Device Listing
- Add Custom Filter
- Edit Custom Filter
- Delete Custom Filter
- Delete Device
- Monitor Clients
- View Client Properties
- View Recently Associated APs/Ad hoc networks
- View Events related to Client
- View Client Retransmission Rate Trend
- View Devices Seeing Client
- View Client Average Data Rate
- View Client Traffic
- Change Client Location
- Quarantine Client
- Disable Auto Quarantine/Exclude Device from Intrusion Prevention Policy
- Add to banned list
- Classify / Declassify as Smart Device
- Change Client Category
- Reset Data Transmitted by Client
- Locate Client
- View Recently Probed SSIDs
- Troubleshoot Client
- Debug Client Connection Problems
- Download Connection Log
- Delete Connection Log History
- Enable Pagination for Client Listing and Set Page Size
- Disable Pagination for Client Listing
- Add Custom Filter
- Edit Custom Filter
- Delete Custom Filter
- Print Client List for Location
- Delete Client
- Spectrogram
- Monitor Access Points (APs)
- View AP Properties
- View Recently Associated Clients
- View AP Utilization
- View AP Associated Clients
- View AP Traffic
- View AP Average Data Rate
- View Devices Seeing AP
- View AP Events
- Change AP Location
- Locate AP
- Quarantine an AP
- Change AP Category
- Disable Auto Quarantine
- Add to banned list
- Sort APs
- Filter AP Details
- Search APs
- Enable Pagination for AP Listing and Set Page Size
- Disable Pagination for AP Listing
- Add Custom Filter
- Edit Custom Filter
- Delete Custom Filter
- Print AP List for Location
- Merge APs
- Split AP
- Troubleshoot AP
- Delete AP
- Monitor Networks
- AirTight Devices
- Manage Locations and Location Layout
- Define Location Tree
- Add Location
- Edit Location
- Move Location
- Delete Location
- Search Locations
- Add Layout
- Edit Layout
- Delete Layout
- Show / Hide Location List
- Show/Hide Devices on Location Layout
- Place Devices/Locations on Location Layout
- Remove Devices/Locations from Location Layout
- View RF Coverage / Heat Maps
- Calibrate RF Views
- Zoom in / Zoom out Layout
- Adjust the Layout Opacity
- Add Note
- Edit Note
- Move Note
- Hide Notes
- Show Notes
- View Mesh Topology
- Hide Mesh Topology
- View and Manage Events
- View Events for Location
- View Deleted Events for Location
- Change Event Location
- Acknowledge Event
- Turn on Vulnerability Status for Event
- Turn off Vulnerability Status for Event
- Mark Event as Read
- Mark Event for Deletion
- Enable Pagination for Event Listing and Set Page Size
- Disable Pagination for Event Listing
- Add Custom Filter
- Edit Custom Filter
- Delete Custom Filter
- Print Event List for Location
- Forensics
- Reports
- Glossary of Icons
AirTight Management Console Configuration
67
1.
Click the rule to move.
2.
Hold the mouse down and drag the rule to the desired position, for instance between 2 other rules.
3.
Release the mouse. The rule is placed at the new position.
4.
Click Save to save the rule reordering.
Edit Firewall Rule
Do the following to add a firewall rule.
1.
Click the radio button for the rule to edit.
2.
Edit the rule details as specified in the following table.
Field
Description
Rule
Name
name of the rule
Host
domain name, sub domain name, hostname or IP address to which the rule
applies.
You can provide a comma-separated list of more than one host names
here. For example, 192.168.8.173, www.facebook.com, 192.168.121.0/24.
Port
port number.
You can provide a comma-separated list of port numbers or port ranges
here. For example, 20-22, 80, 443.
Action
if you want to block the traffic to or from the host option, select block. if you
want to allow traffic to or from the host, select the allow option.
Protocol
network protocol. The following options are available.
TCP: If the rule is for TCP-based communication, select the TCP option.
UDP: If the rule is for UDP-based communication, select the UDP option.
Other: If the rule is for a communication based on a protocol other than
TCP and UDP, select Other. You must specify the protocol number in this
case.
Any: If the rule is for communication that is not protocol specific, select the
Any option.
Protocol
No.
protocol number. This field appears only when the selected protocol is
'other'
Direction
direction of network traffic. The following options are available.
Outgoing: If the rule is to be applied to data going out of your network, that
is, from wireless to wired, then select the Outgoing option.
Incoming: If the rule is to be applied to data coming into your network, that
is, from wired to wireless, select the Incoming option.
Any: If the rule is to be applied to both outgoing and incoming traffic, select
the Any option.
For instance, if you want to allow or prevent users of your wireless network
from accessing certain websites or domains, you can define the respective
rule with direction as Outgoing. Similarly, if you want prevent certain hosts
from accessing your wireless network, you can define the rule specific to
this host name or domain name with direction as Incoming.
Delete Firewall Rule
Do the following to delete a rule.
1.
Click the Delete hyperlink for a rule to delete the rule.
2.
Click Yes on the message that appears, to confirm the delete operation. To cancel the delete
operation click No.