Installation guide
D-37
line vty 5 15
login
!
ntp clock-period 36028926
ntp server 192.168.0.5 prefer
end
D.3 MU to MU Disallow
The MU to MU disallow feature allows the RF Switch to block communications exchanged between clients
associated to a WLAN.
With the Motorola WLAN architecture, all MU traffic is forwarded to the RF Switch from adopted Access
Ports (APs). When MUs communicate with other MUs, traffic is forwarded from the source AP to the RF
Switch and then onto the AP when the destination MU resides.
The RF Switch can be configured to disallow traffic exchanged between the MUs on individual WLANs. Once
enabled on a WLAN, the RF Switch will block (at layer 2) any communication attempts made between all MU
MAC addresses associated to the WLAN. Unlike autonomous AP deployments, which can only block MU to
MU traffic within the AP, the RF Switch can block direct MU to MU communications system-wide regardless
of the AP and radio the MUs are currently associated to.
The primary application for disabling MU to MU communications is a hotspot, using guest user designations.
Since user devices within a hotspot are typically un-managed, disabling MU to MU communications protects
MUs from other MUs that could be infected with worms and viruses. Additionally, disabling MU to MU
communications also protects devices malicious attacks from other MUs and prevents undesired peer-to-
peer file sharing and on-line gaming from dominating bandwidth.
The MU to MU disallow feature will only block communications exchanged between MUs on the same
WLAN, and does not block MU to MU communications between MUs associated on different WLANs and
subnets. To block communications between MUs associated on different WLANs or subnets, the integrated
stateful firewall must be used.