ExtremeWireless WiNG™ Controllers Getting Started Guide — NOVA UI Version 7.9.5.0
>
Profiles
>
Manage Profile Interface Configuration
>
Manage Virtual LAN Configuration
> VLAN Security Configuration
Published August 01, 2024
Search this document
Print this page
Email this page
View PDF
Previous
Next
Preface
Text Conventions
Documentation and Training
Help and Support
Send Feedback
About this Guide
New in this Guide
Release 7.9.5.0
New Features
Updates
Release 7.9.4.0
New Features
Updates
Release 7.9.3.0
Release 7.9.2.0
Release 7.9.1.0
New Features
Updates
Release 7.9.0.0
WiNG 7 Operating System Overview
Web UI and Initial Setup
Navigate the User Interface
User Roles and Preferences Settings
Web User GUI Access
Print Preview Settings
Guest User Configuration
System Dashboard
Add a Custom Dashboard
Edit or Delete a Selected Dashboard
Slide-in Device Info
Cluster
Site
Manage Sites
Add a Site
Edit Site Basic Configuration
Edit Site Policies Configuration
Delete a Site
Configure RF Domain Overrides
Client/Sensor Configuration
Configure RF Domain Client Names and Sensors
Devices
Device Management and Configuration
Device Summary and Basic Information
Access Remote CLI
Add a Device
Basic Device Configuration
General Configuration
Adoption Configuration
Interface Configuration
Interface Virtual Tab
Interface Ethernet Tab
Interface Radio Tab
Interface Bluetooth Tab
Interface PPPoE Tab
Interface Port Channels Tab
Power Configuration (Access Points Only)
Network Configuration
Policies Configuration
Advanced Configuration
Mesh Point Configuration (Access Points Only)
Mesh Point Auto Channel Selection (Access Points Only)
Cluster Configuration (Controllers Only)
Message Logging Configuration for Devices
Back Up and Restore Access Point Configuration
Certificates Configuration
Configure Device Trustpoints
Manage Certificates and RSA Keys
Import Certificates and Trustpoints
Export Trustpoints
Generate an RSA Key
Import an RSA Key
Export an RSA Key
Create and Generate a Self-Signed Certificate
Create and Generate a Certificate Signing Request
Wireless Configuration
Manage Wireless LANs
Add Wireless LAN
Configure Wireless LAN Basic Settings
Configure Wireless LAN Security Settings
Configure Wireless LAN Client Load Balancing
Profiles
Manage Profiles
Add a Profile
Configure General Profile Settings
Manage Profile Adoption Configuration
Manage Profile Interface Configuration
Manage Virtual LAN Configuration
VLAN Basic Configuration
VLAN IPv4 Configuration
VLAN Security Configuration
VLAN Routing Configuration
Manage Ethernet Port Configuration
Ethernet Port Basic Configuration
Ethernet Port Switching Configuration
Ethernet Port Aggregation Configuration
Ethernet Port Discovery Configuration
Ethernet Port Fabric Attach Configuration
Ethernet Port Security Configuration
Ethernet Port Spanning Tree Configuration
Manage Profile Radios
Manage Radio Settings
Manage Advanced Radio Settings
Manage Bluetooth Configuration
Manage PPPoE Configuration
Manage Port Channels Configuration
Port Channels Basic Configuration
Port Channels Switching Configuration
Port Channels Security Configuration
Port Channels Spanning Tree Configuration
Set Controller Power Configuration
Profile Network Configuration
DNS Configuration
ARP Configuration
L2TP V3 Configuration
GRE Tunnel Configuration
GRE Concentrator Configuration
Configure a GRE Concentrator Profile for a ExtremeWireless WiNG Controller
IGMP and MLD Snooping Configuration
Spanning Tree Configuration
Configure a Spanning Tree Profile
CDP/LLDP Configuration
Configure a CDP/LLDP Profile
Routing Configuration
Forwarding Database Configuration
Configure a Forwarding Database
Bridge VLAN Configuration
Manage Bridge VLANs
Configure a Bridge VLAN
Configure Bridge VLAN General Settings
Bridge VLAN IGMP Snooping
Configure Bridge VLAN MLD Snooping
Alias Configuration
Configure a Network Basic Alias Profile
Configure a Network Group Alias Profile
Configure a Network Service Alias Profile
Device Profile - Policies Configuration
Advanced Configuration
Mesh Point Configuration
Configure Mesh Point Device Basic Settings
Configure Mesh Point Auto Channel Selection
Cluster Configuration (Controllers Only)
Controller Cluster Profile Configuration and Deployment Considerations
Message Logging Configuration for Profiles
Critical Resource Configuration
Configure Critical Resources
Clients
Diagnostics
System Info
Tech Support
Logs
Ping
Traceroute
Packet Capture
Packet Capture Parameters
Debug Wireless Clients
Event History
Remote CLI
Remote CLI Operations
Policies
Authentication, Authorization, and Accounting (AAA) Policy
AAA Policy Configuration
Configure an AAA Policy Server
Configure AAA Policy Server RADIUS Settings
AAA TACACS Policy
Manage AAA TACACS Policies
Configure an AAA TACACS Policy
Configure AAA TACACS Server Information
Configure AAA TACACS Settings
Auto-Provisioning Policy
Configure Auto-Provisioning Policy Rules
Configure Auto-Provisioning Policy Adoption Criteria
URL Filtering Policy Configuration
Manage URL Filtering Policies
Configure a URL Filter Policy
Configure Web Filter Rules
Configure a URL Error Page
Configure a Device Categorization Policy
DHCPv4 Policy
Add or Edit a DHCPv4 Policy
Configure DHCPv4 Class Policy
Configure DHCPv4 Address Pools
Configure an Event System Policy
Wireless Firewall
Firewall Policies
Manage Firewall Policies
Configure a Firewall Policy
Configure a Basic Firewall Policy
Configure Firewall Denial of Service (DoS) Policy
Firewall DoS Event Descriptions
Configure Firewall Storm Control Policy
Configure Firewall IPv6 Policy
MAC ACL Firewall Policy
Manage MAC ACL Policies and Rules
Configure a MAC ACL Policy
Configure MAC ACL Policy Rules
Configure EX3500 MAC ACL Policy Rules
IPv4 ACL Policy
Manage IPv4 ACL Policies
Configure an IPv4 Policy
Configure IPv4 ACL Policy Rules
L2TPv3 Policy
L2TPv3 Configuration
Management Policy
View Management Dashboard
Add a New Management Policy
Configure Management User Account
Set Location Configuration
Set Access Control Configuration
Configure User Authentication Settings
Set SNMP Configuration
Set SNMP Traps Configuration
Edit or Delete a Management Policy
Mesh Policy
Configure a Mesh QoS Policy
Configure a Mesh Point Policy
Bonjour Gateway Policy
Manage Bonjour Gateway Policies
Configure a Bonjour Discovery Policy
Configure a Bonjour Forwarding Policy
Captive Portals Policy
Configuring a Captive Portal Policy
Configuring DNS Whitelist Policies
Captive Portal Deployment Considerations
WLAN QoS Policies
Configuring a WLAN QoS Policy
Configure a WLAN and Wireless Client QoS Rate Limit
Configure Multimedia Optimizations
Configure a WLAN QoS WMM Policy
WLAN QoS Deployment Considerations
Radio QoS Policies
Radio QoS Configuration and Deployment Considerations
Manage Radio QoS Policies
Configure a Radio QoS Policy
Configure Radio QoS Wireless Multimedia Policy
Configure Radio QoS Admission Control Policy
Configure Radio QoS Multimedia Optimizations Policy
Association ACL Policy
Manage Association ACL Policies and Rules
Configure an Association ACL Policy
Configure Association ACL Policy Rules
Guest Management Policy
Guest Management Policy Configuration
Email
SMS
SMS SMTP
DB Export
NSight Policy
Add NSight Policy
Edit NSight Policy
Delete NSight Policy
Passpoint Policy
Configure a Passpoint Policy
Configure Passpoint Policy NAI Realm
Configure Passpoint Policy OSU Provider
RADIUS Policy
Create RADIUS Group
RADIUS User Pool
RADIUS Server Policy
Configure RADIUS Server Policy
Configure RADIUS Clients
Configure RADIUS Proxy
Configure an LDAP Server
Smart RF Policy
Configure Smart RF Basic Settings
Configure Smart RF Channel and Power Settings
Configure Smart RF Scanning Configuration
Configure Smart RF Recovery Settings
Configure Smart RF Select Shutdown Settings
Sensor Policy
Configure a Sensor Policy
Configure a URL List Policy
WIPS Policy
Configure a WIPS Policy
Configure WIPS Events
Configure WIPS Signatures
Firmware Update and Images
Firmware Update Status
Statistics
View and Manage Statistics
Smart RF
Basic
Activity
Neighbors
Interference
Channel Distribution
Energy
History
Select Shutdown
Sensor
Wireless
Basic
Devices
Basic
Access Point Statistics
Controller Statistics
Clients
Basic
Client Connectivity
Client Performance Statistics
Sites
Mesh Point
Details
Statistics
Config
Logical View
Geographical View
Licenses
Generate Activation License Key
Apply the License to the Controller
License Types
Cluster License Details
Bulk Migrate APs to ExtremeCloud IQ
VLAN Security Configuration
Configure virtual interface security configuration.
Select
Profiles
>
Profile Name
>
Interface
>
Virtual
>
Security
.
For information on security firewall rules, refer to
Ethernet Port Security Configuration
.
Select
Save
to update virtual interface security settings.