
Filtering rules for a WM-AD
Summit WM-Series WLAN Switch and Altitude Access Point Software Version 1.0 User Guide
87
For an AAA WM-AD, since users have already been authenticated, there is no need for a Non-
Authenticated filter. When authentication is returned, then the Filter ID group filters are applied. For
AAA, a WM-AD can have a su/jointfilesconvert/418240/bgoup with Login-LAT-group ID that has its own filtering rules. If no
Filter ID matches are found, then the Default filter is applied.
Filtering rules for an exception filter
The exception filter on an WM-AD applies only to the destination portion of the packet. The screen is
set to allow or deny (allow left unchecked) traffic to the specified IP address and IP port.
Adding the exception filtering rules allows the network administration to either tighten or relax the
built-in filtering that automatically drops packets not specifically allowed by filtering rule definitions.
The exception filtering rules could deny access in the event of DoS attack, or on the other hand, could
allow certain types of management traffic that would otherwise be denied.
Define the filtering rules for an exception filter
1 In the WM Access Domain Configuration - Filtering screen, using the Filter ID drop-down list, select
Exception.
2 Follow the steps described below for the non-authenticated filter.
The non-authenticated filter for Captive Portal
The non-authenticated filter should allow access to the Captive Portal page IP address, as well as to any
URLs for the header and footer of the Captive Portal page. The filter should also allow network access
to the IP address of the DNS server and to the Network Address, the Gateway, of the WM-AD (the
WM-AD Gateway is used as the IP for the Captive Portal page).
You can also set up filtering rules to allow access, before authentication, to explicitly defined areas of
the network. Then you must deny all other access.
Comentarios a estos manuales