Configuring WLAN Firewall Settings

A firewall is a mechanism enforcing access control, and is considered a first line of defense in protecting proprietary information within the network. The means by which this is accomplished varies, but in principle, a Firewall can be thought of as mechanisms allowing and denying data traffic in respect to administrator defined rules. For an overview of Firewalls, see Wireless Firewall.

WLANs use Firewalls like Access Control Lists (ACLs) to filter/mark packets based on the WLAN from which they arrive, as opposed to filtering packets on Layer 2 ports. An ACL contains an ordered list of Access Control Entries (ACEs). Each ACE specifies an action and a set of conditions (rules) a packet must satisfy to match the ACE. The order of conditions in the list is critical since filtering is stopped after the first match.

IP based Firewall rules are specific to source and destination IP addresses and the unique rules and precedence orders assigned. Both IP and non-IP traffic on the same Layer 2 interface can be filtered by applying both an IP ACL and a MAC.

Additionally, administrators can filter Layer 2 traffic on a physical Layer 2 interface using MAC addresses. A MAC Firewall rule uses source and destination MAC addresses for matching operations, where the result is a typical allow, deny or mark designation to WLAN packet traffic.

A MAC Firewall rule uses source and destination MAC addresses for matching operations, where the result is a typical allow, deny or mark designation to WLAN packet traffic.

Keep in mind that IP and non-IP traffic on the same Layer 2 interface can be filtered by applying both an IP ACL and a MAC ACL to the interface.

To review existing Firewall configurations, create a new Firewall configuration or edit the properties of a WLAN‘s existing Firewall:

  1. Select Configuration → Wireless → Wireless LANs to display available WLANs.
  2. Click Add to create an additional WLAN, or select an existing WLAN and click Edit to modify the properties of an existing WLAN.
  3. Select Firewall from the Wireless LAN Policy options.
    Click to expand in new window
    WLAN Security - WLAN Firewall Screen
  4. Select one of the following, using the drop-down menu:
    • Inbound IP Firewall Rule
    • Outbound IP Firewall Rule
    • Inbound IPv6 Firewall Rules
    • Outbound IPv6 Firewall Rule

    If no rules exist, select the Create icon to create a new firewall rule configuration. Select the Edit icon to modify the configuration of a selected Firewall policy configuration.

    If you are creating a new rule, provide a name up to 32 characters.

  5. Click Add.
    Click to expand in new window
    WLAN Security - IP Firewall Rules Screen
  6. IP firewall rule configurations can either be modified as a collective group of variables or selected and updated individually as their filtering attributes require a more refined update.
    1. Select the Edit Rule icon to the left of a particular IP firewall rule configuration to update its parameters collectively.
      Click to expand in new window
      WLAN Security - IP Firewall Rules - Edit Rule Screen
    2. Click the icon in the Description column (top right-hand side of the screen) and select IP filter values as needed to add criteria into the configuration of the IP ACL.
      Click to expand in new window
      WLAN Security - IP Firewall Rules - IP Firewall Rules Add Criteria
      Note

      Note

      Only those selected IP ACL filter attributes display. Each value can have its current setting adjusted by selecting that IP ACL‘s column to display a pop-up to adjust that one value.
  7. Define the following parameters for either inbound or outbound IP firewall rules:
    Precedence Specify or modify a precedence for this IP policy between 1 and 5000. Rules with lower precedence are always applied to packets first. If you modify a precedence to apply a higher integer, it will move down the table to reflect its lower priority.
    Action Every IP Firewall rule is made up of matching criteria rules. The action defines what to do with the packet if it matches the specified criteria. The following actions are supported:
    Deny
    Instructs the Firewall to prohibit a packet from proceeding to its destination
    Allow
    Instructs the Firewall to allow a packet to proceed to its destination
    DNS Name Specify the DNS Name which may be a full domain name, a portion of a domain name or a suffix. This name is used for the DNS Match Type criteria.
    DNS Match Type Specify the DNS matching criteria that the DNS Name can be matched against. This can be configured as an exact match for a DNS domain name, a suffix for the DNS name or a domain that contains a portion of the DNS name. If traffic matches the configured criteria in the DNS Match Type, that rule will be applied to the ACL.
    Source Select the source IP address or network group configuration used as basic matching criteria for this IP ACL rule. Source options include:
    • Any – Indicates any host device in any network.
    • Network – Indicates all hosts in a particular network. Subnet mask information must be provided for filtering based on network.
    • Host – Indicates a single host with a specific IP address.
    • Alias – Indicates a collection of IP addresses or hostnames or IP address ranges which are configured as a single unit. This is for ease of configuration of ACLs. When selected, all IP addresses or hostnames or IP address ranges are used in this ACL.
    Destination Select the destination IP address or network group configuration used as a basis matching criteria for this IP ACL rule. Destination options include:
    • Any – Indicates any host device in any network.
    • Network – Indicates all hosts in a particular network. Subnet mask information must be provided for filtering based on network.
    • Host – Indicates a single host with a specific IP address.
    • Alias – Indicates a collection of IP addresses or hostnames or IP address ranges which are configured as a single unit. This is for ease of ACL configuration. When selected, all IP addresses or hostnames or IP address ranges are used in this ACL.
    Protocol Select the protocol to filter for this ACL. Use the drop down to select from a list of predefined protocol or use the spinner control to set a particular protocol number.
    Network Service Alias The service alias is a set of configurations consisting of protocol and port mappings. Both source and destination ports are configurable. Set an alphanumeric service alias (beginning with a $) and include the protocol as relevant. Selecting either tcp or udp displays an additional set of specific TCP/UDP source and destination port options.
    Source Port If you are using either tcp or udp as the protocol, define whether the source port for incoming IP ACL rule application is any, equals, or an administrator defined range. If you are not using tcp or udp, this setting displays as N/A. This is the data local origination port designated by the administrator. Selecting equals invokes a spinner control for setting a single numeric port.

    Selecting equals invokes a spinner control for setting a single numeric port. Selecting range displays spinner controls for low and high numeric range settings. A source port cannot be a destination port.

    Destination Port If you are using either tcp or udp as the protocol, define whether the destination port for outgoing IP ACL rule application is any, equals, or an administrator defined range. If you are not using tcp or udp, this setting displays as N/A. This is the data destination virtual port designated by the administrator.

    Selecting equals invokes a spinner control for setting a single numeric port. Selecting range displays spinner controls for low and high numeric range settings. A source port cannot be a destination port.

    ICMP Type Selecting ICMP as the protocol for the IP rule displays an additional set of ICMP specific options for ICMP type and code. The ICMP (Internet Control Message Protocol) uses messages identified by numeric type. ICMP messages are used for packet flow control or generated in IP error responses. ICMP errors are directed to the source IP address of the originating packet. Assign an ICMP type from 1-10.
    ICMP Code Selecting ICMP as the protocol for the IP rule displays an additional set of ICMP specific options for ICMP type and code. Many ICMP types have a corresponding code, helpful for troubleshooting network issues, for example 0 - Net Unreachable, 1 - Host Unreachable, and 2 - Protocol Unreachable.
    Start VLAN Select a Start VLAN icon within a table row to set (apply) a start VLAN range for this IP ACL filter. The Start VLAN represents the virtual LAN beginning numeric identifier arriving packets must adhere to in order to have the IP ACL rules apply.
    End VLAN Select an End VLAN icon within a table row to set (apply) an end VLAN range for this IP ACL filter. The End VLAN represents the virtual LAN end numeric identifier arriving packets must adhere to in order to have the IP ACL rules apply.
    Mark Select this option to mark certain fields inside a packet before allowing them. Mark applies only for Allow rules. Mark sets the rule‘s 802.1p or dscp level (from 0 - 7)
    Log Select this option to create a log entry that a firewall rule has allowed a packet to be either denied or allowed.
    Enabled Select this option to enable or disable this particular IP Firewall rule in this rule set.
    Description Lists the administrator assigned description applied to the IP ACL rule. Select a description within the table to modify its character string as filtering changes warrant. Select the icon within the Description table header to launch a Select Columns screen used to add or remove IP ACL criteria from the table.
  8. The Precedence column sets the priority of a IP Firewall rule within its rule set.
    Click on this column and drag the rule to its appropriate place in the ruleset to set its precedence.
  9. Select an existing Inbound IPv6 Firewall Rule or Outbound IPv6 Firewall Rule using the drop-down menu.
    If no rules exist, select the Create icon to create a new firewall rule configuration. Select the Edit icon to modify the configuration of a selected firewall.

    If creating a new rule, provide a name up to 32 characters.

  10. Click Add.
    Click to expand in new window
    WLAN Security - IPv6 Firewall Rules screen

    IPv6 Firewall rule configurations can either be modified as a collective group of variables or selected and updated individually as their filtering attributes require a more refined update.

  11. Select the Edit Rule icon to the left of a particular IPv6 Firewall rule configuration to update its parameters collectively.
    Click to expand in new window
    WLAN Security - IPv6 Firewall Rules - Edit Rule Screen
  12. Click the icon in the Description column (top right-hand side of the screen) and select IPv6 filter values as needed to add criteria into the configuration of the IPv6 ACL.
    Click to expand in new window
    WLAN Security - IPv6 Firewall Rules - IPv6 Firewall Rules Add Criteria Screen
  13. Define the following parameters for either inbound or outbound IPv6 firewall rules:
    Precedence Specify or modify a precedence for this IPv6 policy between 1-1500. Rules with lower precedence are always applied to packets first. If modifying a precedence to apply a higher integer, it will move down the table to reflect its lower priority.

    The Precedence column sets the priority of a IPv6 Firewall rule within its rule set.

    Action Every IPv6 Firewall rule is made up of matching criteria rules. The action defines what to do with the packet if it matches the specified criteria. The following actions are supported:
    Deny
    Instructs the Firewall to prohibit a packet from proceeding to its destination
    Allow
    Instructs the Firewall to allow a packet to proceed to its destination
    Source Select the source IPv6 address or network group configuration used as a basis matching criteria for this IPv6 ACL rule. Source options include:
    • Any – Indicates any host device in any network.
    • Network – Indicates all hosts in a particular IPv6 network. Subnet mask information must be provided for filtering based on network.
    • Host – Indicates a single host with a specific IPv6 address.
    Destination Select the destination IPv6 address or network group configuration used as a basis matching criteria for this IPv6 ACL rule. Destination options include:
    • Any – Indicates any host device in any network.
    • Network – Indicates all hosts in a particular IPv6 network. Subnet mask information must be provided for filtering based on network.
    • Host – Indicates a single host with a specific IPv6 address.
    Protocol Select the protocol to filter for this IPv6 ACL. Use the drop down to select from a list of predefined protocol or use the spinner control to set a particular protocol number.
    Source Port If you are using either tcp or udp as the protocol, define whether the source port for incoming IPv6 ACL rule application is any, equals, or an administrator defined range. If you are not using tcp or udp, this setting displays as N/A. This is the data local origination port designated by the administrator. Selecting equals invokes a spinner control for setting a single numeric port.

    Selecting equals invokes a spinner control for setting a single numeric port. Selecting range displays spinner controls for low and high numeric range settings. A source port cannot be a destination port.

    Destination Port If you are using either tcp or udp as the protocol, define whether the destination port for outgoing IPv6 ACL rule application is any, equals, or an administrator defined range. If you are not using tcp or udp, this setting displays as N/A. This is the data destination virtual port designated by the administrator.

    Selecting equals invokes a spinner control for setting a single numeric port. Selecting range displays spinner controls for low and high numeric range settings. A source port cannot be a destination port.

    ICMP Type Selecting ICMP as the protocol for the IPv6 rule displays an additional set of ICMP specific options for ICMP type and code. The Internet Control Message Protocol (ICMP) uses messages identified by numeric type. ICMP messages are used for packet flow control or generated in IP error responses. ICMP errors are directed to the source IP address of the originating packet. Assign an ICMP type from 1-10.
    ICMP Code Selecting ICMP as the protocol for the IPv6 rule displays an additional set of ICMP specific options for ICMP type and code. Many ICMP types have a corresponding code, helpful for troubleshooting network issues, for example 0 - Net Unreachable, 1 - Host Unreachable, and 2 - Protocol Unreachable.
    Mark Select this option to mark certain fields inside a packet before allowing them. Mark applies only for Allow rules. Mark sets the rule‘s 802.1p or dscp level (from 0 - 7)
    Log Select this option to create a log entry that a firewall rule has allowed a packet to be either denied or allowed.
    Description Lists the administrator assigned description applied to the IPv6 ACL rule. Select a description within the table to modify its character string as filtering changes warrant. Select the icon within the Description table header to launch a Select Columns screen used to add or remove IPv6 ACL criteria from the table.
  14. Click OK to save all changes to the IPv6 Firewall Rules dialog.
    Click Exit to close the dialog and return to the previous screen.
  15. Select existing inbound or outbound MAC Firewall Rules using the drop-down menu.
    If no rules exist, select Create to display a screen where Firewall rules can be created.
  16. Select the + Add Row button.
  17. Select the added row to expand it into configurable parameters.
    Click to expand in new window
    WLAN Security - MAC Firewall Rules Screen
  18. Define the following parameters for either the inbound or outbound MAC Firewall Rules:
    Allow Every IP Firewall rule is made up of matching criteria rules. The action defines what to do with the packet if it matches the specified criteria. The following actions are supported:
    Deny
    Instructs the Firewall to prohibit a packet from proceeding to its destination
    Permit
    Instructs the Firewall to allow a packet to proceed to its destination
    Source and Destination MAC Enter both Source and Destination MAC addresses. The access point uses the source IP address, destination MAC address as basic matching criteria. Provide a subnet mask if using a mask.
    Actions The following actions are supported:
    Log
    Creates a log entry that a Firewall rule has allowed a packet to either be denied or permitted.
    Mark
    Modifies certain fields inside the packet and then permits them. Therefore, mark is an action with an implicit permit.
    Mark, Log
    Conducts both mark and log functions.
    Traffic Class Sets an ACL traffic classification value for the packets identified by this inbound MAC filter. Traffic classifications are used for QoS purposes. Use the spinner to define a traffic class from 1- 10.
    Precedence Use the spinner control to specify a precedence for this MAC Firewall rule between 1-1500. Access policies with lower precedence are always applied first to packets.
    VLAN ID Enter a VLAN ID representative of the shared SSID each user employs to interoperate within the network (once authenticated by the access point‘s local RADIUS server). Set the VLAN form 1 - 4094.
    Match 802.1P Configures IP DSCP to 802.1p priority mapping for untagged frames. Use the spinner control to define a setting from 0 - 7.
    Ethertype Use the drop-down menu to specify an Ethertype of either ipv6, arp, wisp or monitor 8021q. An EtherType is a two-octet field within an Ethernet frame. It is used to indicate which protocol is encapsulated in the payload of an Ethernet frame. When other is selected, the ethertype value can be configured manually.
    Description Provide an ACL setting description (up to 64 characters) for the rule to help differentiate it from others with similar configurations.
  19. Save the changes to the new MAC rule, or reset to the last saved configuration as needed.
  20. Select the + Add Row button.
  21. Define the following parameters for Association ACL.
    An Association ACL defines the rules used to allow/deny association to devices for this wireless LAN. If no Association ACL exists, select the Create button to display a new window where new ACL can be created.
    Precedence Enter a numerical value indicating the precedence of rule execution.
    Starting MAC Address Enter a MAC address to define the start of range. This field is mandatory.
    Ending MAC Address Enter a MAC address to define the end of range.
    Allow/Deny Every Association ACL rule consists of matching criteria rules. The action defines what to do with the device if it matches the specified criteria. The following actions are supported:
    Deny
    Instructs the Firewall to prevent the device from associating with this WLAN
    Permit
    Instructs the Firewall to allow the device to associate with this WLAN
  22. Assign an Application Policy to the firewall and set the following metadata extraction rules:
    Application Policy Use the drop-down menu to assign an application policy to the WLAN‘s firewall configuration. When an application is recognized and classified by the WiNG application recognition engine, administrator defined actions can be applied to that application. An application policy defines the rules or actions executed on recognized HTTP, SSL and .voice/video applications. For more information, refer to Application.
    Note: Application policy is not supported on the WiNG 7.1.X, AP5XX model access points.
    Voice/Video Metadata Select this option to enable the extraction of voice and video metadata flows. When enabled, administrators can track voice and video calls by extracting parameters (packets transferred and lost, jitter, audio codec and application name). Most Enterprise VoIP applications like Facetime, Skype for Business, and VoIP terminals can be monitored for call quality and visualized on the Extreme NSight UI in manner similar to HTTP and SSL. Call quality and metrics can be determined only from calls that are established as unencrypted. This setting is disabled by default.
    Note:

    Starting with WiNG 5.9.3, NSight is a separate target. For information on Extreme NSight™, refer to the Extreme NSight User Guide available at https://extremenetworks.com/documentation.

    HTTP Metadata Select this option to enable the extraction of HTTP flows. When enabled, administrators can track HTTP Websites accessed by both internal and guest clients and visualize HTTP data usage, hits, active time and total clients on the Extreme NSight UI. This setting is disabled by default.
    Note:

    Starting with WiNG 5.9.3, NSight is a separate target. For information on Extreme NSight™, refer to the Extreme NSight User Guide available at https://extremenetworks.com/documentation.

    SSL Metadata Select this option to enable the extraction of SSL flows. When enabled, administrators can track SSL Websites accessed by both internal and guest clients and visualize SSL data usage, hits, active time and total clients on the Extreme NSight UI. This setting is disabled by default.
    Note:

    Starting with WiNG 5.9.3, NSight is a separate target. For information on Extreme NSight™, refer to the Extreme NSight User Guide available at https://extremenetworks.com/documentation.

  23. Set the following Trust Parameters:
    ARP Trust Select this option to enable ARP trust on this WLAN. ARP packets received on this WLAN are considered trusted and information from these packets is used to identify rogue devices within the network. This setting is disabled by default.
    Validate ARP Header Mismatch Select this option to check for a source MAC mismatch in the ARP header and Ethernet header. This setting is enabled by default.
    DHCP Trust Select this option to enable DHCP trust on this WLAN. This setting is disabled by default.
  24. Set the following IPv6 Settings:
    ND Trust Select this option to enable the trust of neighbor discovery requests on an IPv6 supported firewall on this WLAN. This setting is disabled by default.
    Validate ND Header Mismatch Select this option to enable a mismatch check for the source MAC within the ND header and Link Layer Option. This setting is enabled by default.
    DHCPv6 Trust Select this option to enable the trust all DHCPv6 responses on this WLAN‘s firewall. DHCPv6 is a networking protocol for configuring IPv6 hosts with IP addresses, IP prefixes or other configuration attributes required on an IPv6 network. This setting is disabled by default
    RA Guard Select this option to enable router advertisements or ICMPv6 redirects on this WLAN‘s firewall. This setting is disabled by default.
  25. Set the following Wireless Client Deny configuration:
    Wireless Client Denied Traffic Threshold When this option is enabled, any associated client, exceeding the thresholds configured for storm traffic, is either deauthenticated or blacklisted depending on the selected action. The threshold range is from 1- 1000000 packets per second. This feature is disabled by default.
    Action If you are enabling a wireless client threshold, use the drop-down menu to determine whether clients are deauthenticated when the threshold is exceeded, or blacklisted from connectivity for a user-defined interval. Selecting None applies no consequence to an exceeded threshold.
    Blacklist Duration Select this option and define a setting from 0 - 86,400 seconds. Offending clients can reauthenticate, once this blacklist duration has been exceeded.
  26. Set a Firewall Session Hold Time in either Seconds (1 - 300) or Minutes (1 - 5).
    This is the hold time for caching user credentials and Firewall state information when a client roams. The default setting is 30 seconds.
  27. Click OK when completed to update this WLAN‘s Firewall settings.
    Click Reset to revert the screen to its last saved configuration.
Before defining an access control configuration on a WLAN, refer to the following deployment guidelines to ensure the configuration is optimally effective:
  • IP and non-IP traffic on the same Layer 2 interface can be filtered by applying both an IP ACL and a MAC ACL to the interface.