Adding Access Control Profiles

Follow these steps to add an access control profile.
  1. From the navigation pane, click Services.
    The Services page appears.
  2. Select the Access Control sub-tab.
    The Access Control page appears.
    Access Policies
  3. Click Add Profile to add an access control profile.
    The Access Control Profile dialog box appears.
    Create Access Control Profile
  4. Complete the following:
    • Profile Name: Enter the name of the access control profile.
    • Description: Enter a short description for the access control profile.
    Under the Select Access control profile, configure the following:
    Note: By default, the following profile are set to OFF.
    • Layer 2: Toggle the switch to ON and click add to add a Layer 2 profile.
    • Layer 3: Toggle the switch to ON and click add to add a Layer 3 profile.
    • Device & OS: Toggle the switch to ON and click add to add a Device and OS profile.
    • Applications: Toggle the switch to ON and click add to add an application profile.
    • Client Rate Limit: Togge the switch to ON and click to configure maximum upload rate and maximum download rate.
  5. Select the Layer 2 sub-tab to add a Layer 2 profile.
    1. Click Add Profile.
      The Layer 2 Profile dialog box appears.
    2. Enter a name in the Profile Name field.
    3. Add a brief description in the Description field.
    4. Select either Allow Connection or Block Connections
      By default, the Allow Connections option (green) is enabled. You can choose to change this to Block Connections by clicking the option (red) provided.
    5. Click Add to add MAC addresses.
    6. Enter the MAC addresses in Add MAC Address dialog box and click Add.
      You can add upto 128 MAC addresses.
    7. Click Clear list to clear the MAC address list.
    8. Click Save.
  6. Select the Layer 3 sub-tab to add a Layer 3 profile.
    1. Click Add Profile. The Layer 3 Profile dialog box is displayed.
    2. Enter a name in the Profile Name field.
    3. Add a brief description in the Description field.
      By default, the Allow Traffic option (green) is enabled. You can choose to change this to Block Traffic by clicking the option (red) provided.
    4. To create a new traffic access rule, click Add Rule. The Add Traffic Access Rule dialog box appears. You can create rules only for up-stream traffic.
      Complete the following steps.
      • Description: Enter a description for the rule.
      • You can create a rule to allow or block up-stream traffic by clicking and selecting the Allow Traffic or Block Traffic option, respectively.
      • Select the protocol which you wish to use for the new traffic rule, from the Protocol drop down list. Following are the list of protocols available for use.
        • TCP: Transmission Control Protocol
        • UDP: User Datagram Protocol
        • UDPLITE: Lightweight User Datagram Protocol, which is a connectionless protocol that allows even a damaged data payload to be delivered rather than being discarded.
        • ICMP (ICMPV4): Internet Control Message Protocol, which is an error-reporting protocol used by network devices to generate error messages to the source IP address, when issues in the network prevent delivery of IP packets.
        • IGMP: Internet Group Management Protocol, which is a communications protocol used by hosts on IPv4 networks to establish multicast group memberships.
        • ESP: Encapsulating Security Payload is a protocol which provides the authentication, integrity, and confidentially of network packets in IPv4 and IPv6 networks.
        • AH: Authentication Header protocol, which is used to authenticate SNMP.
        • SCTP: Stream Control Transmission Protocol is a communications protocol which operates at the transport layer.
      • Specify the destination address in the Destination field. You can either specify a range (a network address and a Subnet Mask, in the field provided) or you an specify a source IP address in the field provided. Also, specify a port number or a range of ports (e.g: 22-34) for the destination, in the field provided.
        Note: If you choose the ICMP protocol in the previous step, you do not need to specify ports for the source and the destination. Hence, the option to select ports will not be presented to you.
    5. In the Source area, complete the following.
      • IP Address: Enter the IP address of the source.
      • Subnet Network Address: Enter the subnet network address.
      • Specific IP Address: Enter the specific IP address.
      • Port: Enter a port number or a range of ports (for example, 22-34).
    6. In the Destination area, complete the following.
      • IP Address: Enter the IP address of the source.
      • Subnet Network Address: Enter the subnet network address.
      • Specific IP Address: Enter the specific IP address.
      • Port: Enter a port number or a range of ports (for example, 22-34).
    7. Click Add.
  7. Select the Device & OS sub-tab to add a device and OS profile.
    The Device & OS page appears.
    Device & OS Profile
    1. To add a device and OS profile, click Add Profile.
      Add Device & OS Profile dialog box appears. Complete the following:
      • Policy Name: Enter the name of the policy.
      • Description: Enter description for the policy.
      • Default Access: Select either Allow or Block.
      Adding Device & OS Profile
    2. To add a Device & OS profile rule, click Add Policy.
    3. Click Add Rule.
      The Add Rule dialog box appears. Complete the following:
      • Rule Name: Enter the name of the rule.
      • Action: Select either Allow Devices or Block Devices.
      • Device Type: Select a device type from the list of devices.
      • OS Vendor: Select the OS vendor for the devices.
      • Rate Limit: Configure the late limit using the sliders: From client and To client.
      • VLAN: Enter the VLAN ID.
      Adding Rule for Device and OS access Policies
    4. Click ADD.
      Returns to Add Device & OS Profile dialog box.
    5. Click OK to add the rule to return to the Device & OS page.
  8. Select the Application sub-tab to add an aplication profile.
    The Application policies page appears.
    Applicatinon Access
    1. Click Add Policy to add an application access policy.
    2. Enter a name in the Policy Name field.
    3. Add a brief description in the Description field.
    4. Click Add Rule and configure the following in the Add Application Rule dialog box.
      • Rule Name: Enter the name of the rule.
      • Rule Type: Select System Defined or User Defined.
      • Application Category: Select the category of application from the drop-down.
      • Application Name: Specify the name of the application.
      • Access Control: Configure the method as Block Application, Rate Limit or QoS.
    5. Click ADD.