Profile Overrides - Security Configuration (AP Only)

To define new security settings or apply overrides to existing settings on a VLAN interface:

  1. Select the Security tab.

    The VLAN interface security screen displays.

    Click to expand in new window
    Profile Overrides - Interface - VLAN Interface - Security Screen
    GUID-4C71FA57-A483-48F6-8547-56D29ECD9797-low.png
  2. Review the exisiting firewalls applied on the selected VLAN interface. If needed add new firewalls or modfiy existing security settings.
  3. Use the IPv4 Inbound Firewall Rules drop-down menu to select the IPv4 specific inbound firewall rules to apply to this profile‘s virtual interface configuration.

    Click the Create icon to define a new IPv4 firewall rule configuration, or click the Edit icon to modify an existing configuration.

    IPv4 is a connectionless protocol for packet switched networking. IPv4 operates as a best effort delivery method, since it does not guarantee delivery, and does not ensure proper sequencing or duplicate delivery (unlike (TCP). For more information on creating IPv4 firewall rules, see Setting an IPv4 or IPv6 Firewall Policy.

    IPv4 and IPv6 are different enough to warrant separate protocols. IPv6 devices can alternatively use stateless address autoconfiguration. IPv4 hosts can use link local addressing to provide local connectivity.

  4. Use the IPv6 Inbound Firewall Rules drop-down menu to select the IPv6 specific inbound firewall rules to apply to this profile‘s virtual interface configuration.

    Click the Create icon to define a new IPv6 firewall rule configuration, or click the Edit icon to modify an existing configuration.

    IPv6 is the latest revision of the Internet Protocol (IP) replacing IPv4. IPV6 provides enhanced identification and location information for systems routing traffic across the Internet. IPv6 addresses are composed of eight groups of four hexadecimal digits separated by colons. For more information on creating IPv6 firewall rules, see Setting an IPv4 or IPv6 Firewall Policy.

  5. Use the VPN Crypto Map drop-down menu to select or override the Crypto Map configuration applied to this virtual interface.

    The VPN Crypto Map entry defines the type of VPN connection and its parameters. For more information see Defining Profile VPN Settings.

  6. Use the URL Filter drop-down menu to select or override the URL Filter configuration applied to this virtual interface.

    URL filtering is used to restrict access to undesirable resources on the internet.

  7. Click OK to save the VLAN interface security configuration changes.

    Click Reset to revert to the last saved configuration, or click Exit to close the screen without saving any updates.