User's Guide

Table Of Contents
hwc_vnsintro.fm
Virtual Network Services concepts
Filtering
9034530-02,
March 2010
HiPath Wireless Controller, Access Points and Convergence Software V7.11, User Guide 237
Exception filter – Protect access to a system's own interfaces. VNS
exception filters are applied to the traffic intended for the HiPath Wireless
Controller's own interface point of presence in the network. These filters are
applied after the policy-based assigned filters are evaluated.
Multicast filtering – These filters define a list of multicast groups whose
traffic is allowed to be forwarded to and from the VNS. They are configured
as part of the Topology assigned to the VNS.
Within each type of filter, define a sequence of filtering rules. The filtering rule
sequence must be arranged in the order that you want them to take effect. Each
rule is defined to allow or deny traffic in either direction:
•In – From the network into a wireless device
•Out – From a wireless device out to the network
5.6.1 Final filter rule
The final rule in any filter should act as a catch-all for any traffic that did not match
a filter entry. This final rule should either allow all or deny all traffic, depending on
the requirements for network access. For example, the final rule in a non-
authenticated filter for Captive Portal is typically deny all. A final allow all rule in a
default filter will ensure that a packet is not dropped entirely if no other match can
be found.
A default rule of deny all is automatically created by the system for initial filter
definitions. The administrator can change the action to allow all. However, a
default filter rule cannot be removed. Since a default filter rule provides a catch-
all default behavior for packet handling, all applicable user defined filter rules
must be defined prior to this rule.
Each rule can be based on any one of the following:
Destination IP address or any IP address within a specified range that is on
the network subnet (as a wildcard)
Destination ports, by number and range
Protocols (UDP, TCP, etc.)
5.6.2 Filtering sequence
The policy based filtering sequence depends on the type of authentication used:
No authentication
Only the non-Authenticated filter will apply. Specific network access can be
defined.